Page 120 - Cyber Safety C-8
P. 120
21 st
IOT RISK RADAR Century #Information Literacy
Skills
The city uses IoT-based streetlights, traffic systems and public safety sensors. Suddenly, streetlights stop
working for 30 minutes.
Now, write what a possible cyberattack might have happened and list three security steps that could
prevent it.
In 2016, a massive cyberattack known as the Mirai Botnet took control of hundreds of thousands
of IoT devices such as CCTV cameras and home routers. These compromised devices were used
to launch one of the largest Distributed Denial of Service (DDoS) attacks in history, causing major
websites and online services across the world to shut down. This incident highlighted how insecure
IoT devices can be turned into powerful cyber weapons.
Cloud Security
Cloud security is a collection of technologies, controls, procedures and policies designed to protect
data, applications and infrastructure that operate in cloud environments. It ensures confidentiality,
integrity and availability of cloud-based systems through secure access management, encryption,
network protection and continuous monitoring.
118 Computer Science - VIII

