Page 11 - Cyber Safety C-8
P. 11
Integrity: Ensuring that information remains accurate,
complete, and unaltered. Techniques include checksums,
digital signatures, and version control.
Before typing any
Availability: Ensuring that information and systems are password or making a
accessible when required. Techniques include server payment online, look
redundancy, backup systems, and network monitoring. for https:// and a
Cyber attacks often target one or more of these principles. For lock symbol in the Web
example, ransomware attacks focus on limiting availability, browser.
while phishing attacks compromise confidentiality.
ROLE OF CYBERSECURITY IN DAILY LIFE
To illustrate the role of cybersecurity in daily life, consider a typical digital day. This section maps
ordinary actions to potential security risks.
Morning interactions: A modern day often begins by checking a smartphone (messages,
notifications, emails, and social media)
During this process, several risks emerge:
Malicious links in unread messages
Apps requesting unnecessary permissions
Phishing emails disguised as alerts
A single click on a fake link can lead to credential theft.
Daytime digital activities: Throughout the day, users move between educational, professional,
and personal digital tasks:
Attending online classes or meetings
Accessing cloud storage
Using banking or payment apps
Browsing websites or social media
Each activity involves the exchange of data, which, if intercepted, can be misused. Public
Wi-Fi networks, for example, are a known risk area where cybercriminals can perform
man-in-the-middle attacks.
Evening interactions: Online entertainment, such as streaming movies, gaming, or social
networking also carries risks. Fake gaming mods, proxy apps, and illegal streaming sites often
carry malware.
Night-time digital footprint: Even when a user is asleep, their digital identity is active:
Scheduled app updates
Cloud sync
A Modern Necessity 9

