Page 20 - Cyber Safety C-8
P. 20

Cloud services: Online services that allow users to run applications or access computing
                         resources over the Internet.

                         Cloud storage: An online space where users can store, access, and manage their files on
                         remote servers instead of on their device.


                         Digital footprint: A trail of data left behind whenever the Internet is used or digital devices
                         are interacted with.


                         Rootkit: A hidden malicious software that gives attackers secret control over a device
                         without the user noticing.









                           Cybersecurity refers to the collection of technologies, processes, and practices designed to
                            protect digital systems, networks, programs, and data from cyber attacks.
                           The foundation of cybersecurity rests on three principles commonly known as the CIA Triad.

                           Cyber threats come in various forms, targeting individuals, organisations, and national systems.
                           Malware (malicious software) refers to any program designed to damage devices, steal data,
                            or gain unauthorised access.
                           Ransomware encrypts the victim’s files and demands payment (usually in cryptocurrency) in
                            exchange for decryption.
                           Cybersecurity keeps our personal data safe.
                           Hackers try to break into accounts to steal photos, post harmful content, or bully others.











                  A.  Tick ( ) the correct option.
                     1.  The continuous trail of data created by online activities is called a          .

                                  (i)  malware trail                        (ii)  digital footprint

                                 (iii)  cyber attack                       (iv)  private record

                     2.  Cybersecurity refers to collection of technologies, processes, and practices designed to protect
                                         .

                                  (i)  books and notebooks                  (ii)  digital systems, networks, and data

                                 (iii)  school bags                        (iv)  home appliances



                    18  Computer Science - VIII
   15   16   17   18   19   20   21   22   23   24   25