Page 12 - Cyber Safety C-8
P. 12
IoT devices transmitting data
Background location tracking
Cybersecurity must therefore protect users 24×7.
21 st
Century #Technology Literacy
Skills
Scan the QR code or watch the following video on Cybersecurity Trends for 2025
and Beyond at:
https://www.youtube.com/watch?v=kqaMIFEz15s
Answer the following question:
What are two major cybersecurity trends highlighted in the video?
21 st
CREATE A DIGITAL FOOTPRINT MAP Century #Creativity
Skills
Create a visual map that shows how a digital footprint is left while using different online services. Include
elements such as websites visited, apps used, social media interactions, online searches, and any
information shared online.
MAJOR CYBER THREATS IN DAILY LIFE
Cyber threats come in various forms, targeting individuals, organisations, and national systems.
Understanding these threats is essential for evaluating why cybersecurity holds such significance
in a digitally dependent world.
Malware
Malware (malicious software) refers to any program designed to damage devices, steal data,
or gain unauthorised access. The term includes viruses, worms, trojans, spyware, adware, and
rootkits. Malware spreads through infected email attachments, pirated software, malicious apps,
and compromised websites.
Phishing
Phishing is a deceptive technique where attackers impersonate trusted entities to trick victims
into revealing sensitive information such as passwords, OTPs (a unique number sent to phone for
authentication), or bank details.
10 Computer Science - VIII

