Page 11 - Cyber Safety C-8
P. 11

Integrity: Ensuring that information remains accurate,
                    complete, and unaltered. Techniques include checksums,
                    digital signatures, and version control.
                                                                                             Before typing any
                     Availability: Ensuring that information and systems are              password or making a
                    accessible  when required. Techniques  include  server                 payment online, look
                    redundancy, backup systems, and network monitoring.                     for https:// and a

                 Cyber attacks often target one or more of these principles. For          lock symbol in the Web
                 example, ransomware attacks focus on limiting availability,                     browser.
                 while phishing attacks compromise confidentiality.



                 ROLE OF CYBERSECURITY IN DAILY LIFE


                 To illustrate the role of cybersecurity in daily life, consider a typical digital day. This section maps
                 ordinary actions to potential security risks.
                     Morning interactions: A modern day often begins by checking a smartphone (messages,
                    notifications, emails, and social media)

                    During this process, several risks emerge:

                         Malicious links in unread messages
                         Apps requesting unnecessary permissions

                         Phishing emails disguised as alerts

                    A single click on a fake link can lead to credential theft.
                     Daytime digital activities: Throughout the day, users move between educational, professional,

                    and personal digital tasks:
                         Attending online classes or meetings

                         Accessing cloud storage

                         Using banking or payment apps
                         Browsing websites or social media

                 Each  activity  involves the  exchange  of data,  which, if intercepted,  can  be  misused.  Public
                 Wi-Fi  networks, for example,  are a known risk  area  where cybercriminals  can perform
                 man-in-the-middle attacks.

                     Evening  interactions: Online entertainment,  such as streaming  movies,  gaming,  or social
                    networking also carries risks. Fake gaming mods, proxy apps, and illegal streaming sites often
                    carry malware.

                     Night-time digital footprint: Even when a user is asleep, their digital identity is active:

                         Scheduled app updates
                         Cloud sync


                                                                                               A Modern Necessity  9
   6   7   8   9   10   11   12   13   14   15   16