Page 120 - Cyber Safety C-8
P. 120

21 st
                                           IOT RISK RADAR                                    Century   #Information Literacy
                                                                                              Skills


                  The city uses IoT-based streetlights, traffic systems and public safety sensors. Suddenly, streetlights stop
                  working for 30 minutes.
                  Now, write what a possible cyberattack might have happened and list three security steps that could
                  prevent it.






















                     In 2016, a massive cyberattack known as the Mirai Botnet took control of hundreds of thousands
                     of IoT devices such as CCTV cameras and home routers. These compromised devices were used
                     to launch one of the largest Distributed Denial of Service (DDoS) attacks in history, causing major
                     websites and online services across the world to shut down. This incident highlighted how insecure
                     IoT devices can be turned into powerful cyber weapons.


                  Cloud Security

                  Cloud security is a collection of technologies, controls, procedures and policies designed to protect
                  data, applications and infrastructure that operate in cloud environments. It ensures confidentiality,
                  integrity and availability of cloud-based systems through secure access management, encryption,
                  network protection and continuous monitoring.


                   118  Computer Science - VIII
   115   116   117   118   119   120   121   122   123   124   125