Page 12 - Cyber Safety C-8
P. 12

IoT devices transmitting data

                          Background location tracking
                     Cybersecurity must therefore protect users 24×7.


                                                                                          21 st
                                                                                         Century   #Technology Literacy
                                                                                          Skills
                             Scan the QR code or watch the following video on Cybersecurity Trends for 2025
                             and Beyond at:

                             https://www.youtube.com/watch?v=kqaMIFEz15s

                             Answer the following question:
                                  What are two major cybersecurity trends highlighted in the video?









                                                                                                       21 st
                                           CREATE A DIGITAL FOOTPRINT MAP                            Century   #Creativity
                                                                                                      Skills

                  Create a visual map that shows how a digital footprint is left while using different online services. Include
                  elements  such as websites  visited,  apps  used,  social  media  interactions,  online searches, and any
                  information shared online.








                  MAJOR CYBER THREATS IN DAILY LIFE

                  Cyber threats come in various forms, targeting individuals, organisations, and national systems.
                  Understanding these threats is essential for evaluating why cybersecurity holds such significance
                  in a digitally dependent world.

                  Malware

                  Malware (malicious software) refers to any program designed to damage devices, steal data,

                  or gain unauthorised access. The term includes viruses, worms, trojans, spyware, adware, and
                  rootkits. Malware spreads through infected email attachments, pirated software, malicious apps,
                  and compromised websites.

                  Phishing

                  Phishing is a deceptive technique where attackers impersonate trusted entities to trick victims
                  into revealing sensitive information such as passwords, OTPs (a unique number sent to phone for
                  authentication), or bank details.



                   10   Computer Science - VIII
   7   8   9   10   11   12   13   14   15   16   17