Page 21 - Cyber Safety C-8
P. 21
3. Which principle of the CIA Triad ensures information is accessed only by authorised individuals?
(i) Availability (ii) Identity
(iii) Confidentiality (iv) Control
4. Phishing attacks try to steal sensitive details such as .
(i) games (ii) clothes
(iii) passwords and OTPs (iv) photos only
5. Which cyber threat encrypts files and demands payment to unlock them?
(i) Social engineering (ii) Identity theft
(iii) Phishing (iv) Ransomware
B. Write ‘T’ for true and ‘F’ for false.
1. Students rely on online platforms for assignments, virtual classrooms, digital libraries, and
communication tools.
2. Integrity means information can be changed anytime by anyone.
3. Malware cannot damage devices or steal data.
4. Online frauds often use fake UPI links and fraudulent QR codes.
5. Strong cybersecurity helps prevent financial loss and keeps online transactions safe.
C. Fill in the blanks using the given hints: Hints
1. Students and professionals depend on services for online pirated
meetings and storage. PAN
2. A digital footprint includes search history, location data, photos and cloud-based
interaction. social
3. Malware spreads through infected email attachments and Availability
software.
4. Identity theft occurs when attackers steal personal details like Aadhaar
numbers and details.
5. ensures that information and systems are accessible when required.
D. Answer the following questions:
1. Why has a global shift from offline to online systems created a need for cybersecurity?
2. Explain the CIA Triad.
A Modern Necessity 19

