Page 42 - Cyber Safety C-8
P. 42
Cyber Protection and
Security Basics
3
Cyber Threats Types of Cyber Threats
Real Scenario of Cyber Scam Protection Against Cyber Attacks
As digital technology grows, it has changed how people shop, work, communicate, and store
data. Many essential services and critical systems now run online, making them potential targets
for cyber threats. With so much sensitive information shared digitally, strong cyber protection is
necessary to keep data safe and ensure that critical services continue to function properly.
Cyber protection includes the tools, practices, and responsible behaviours used to secure
computers, networks, and information from attacks. Its success depends not only on technology
but also on people. Carelessness or lack of awareness can create weaknesses that cybercriminals
exploit. By following safe digital habits and staying informed, individuals help keep systems secure
and prevent attacks.
CYBER THREAT
A cyber threat is any risk that aims to harm a computer, smartphone, or online account. Such
threats may steal personal data, spread harmful software, block access to devices, or trick
individuals into losing money.
40 Computer Science - VIII

