Page 21 - Cyber Safety C-8
P. 21

3.  Which principle of the CIA Triad ensures information is accessed only by authorised individuals?

                                 (i)  Availability                         (ii)  Identity

                                (iii)  Confidentiality                    (iv)  Control

                    4.  Phishing attacks try to steal sensitive details such as           .
                                 (i)  games                                (ii)  clothes


                                (iii)  passwords and OTPs                 (iv)  photos only
                    5.  Which cyber threat encrypts files and demands payment to unlock them?

                                 (i)  Social engineering                   (ii)  Identity theft

                                (iii)  Phishing                           (iv)  Ransomware


                 B.  Write ‘T’ for true and ‘F’ for false.

                    1.   Students rely on online platforms for assignments, virtual classrooms, digital libraries, and
                        communication tools.

                    2.  Integrity means information can be changed anytime by anyone.

                    3.  Malware cannot damage devices or steal data.

                    4.  Online frauds often use fake UPI links and fraudulent QR codes.

                    5.  Strong cybersecurity helps prevent financial loss and keeps online transactions safe.


                 C.  Fill in the blanks using the given hints:                                           Hints
                    1.  Students and professionals depend on                 services for online         pirated
                        meetings and storage.                                                             PAN
                    2.   A digital footprint includes search history, location data, photos and       cloud-based
                                        interaction.                                                     social
                    3.   Malware spreads through infected email attachments and                        Availability
                        software.
                    4.   Identity theft occurs when attackers steal personal details like Aadhaar
                        numbers and                  details.
                    5.                  ensures that information and systems are accessible when required.

                 D.  Answer the following questions:

                    1.  Why has a global shift from offline to online systems created a need for cybersecurity?





                    2.  Explain the CIA Triad.








                                                                                               A Modern Necessity  19
   16   17   18   19   20   21   22   23   24   25   26