Page 42 - Cyber Safety C-8
P. 42

Cyber Protection and



                          Security Basics







                                                                                           3












                          Cyber Threats                                       Types of Cyber Threats

                          Real Scenario of Cyber Scam                         Protection Against Cyber Attacks






                  As digital technology grows, it has changed how people shop, work, communicate, and store
                  data. Many essential services and critical systems now run online, making them potential targets
                  for cyber threats. With so much sensitive information shared digitally, strong cyber protection is

                  necessary to keep data safe and ensure that critical services continue to function properly.
                  Cyber  protection  includes  the tools,  practices, and responsible  behaviours  used  to  secure

                  computers, networks, and information from attacks. Its success depends not only on technology
                  but also on people. Carelessness or lack of awareness can create weaknesses that cybercriminals
                  exploit. By following safe digital habits and staying informed, individuals help keep systems secure
                  and prevent attacks.



                  CYBER THREAT

                  A cyber threat is any risk that aims to harm a computer, smartphone, or online account. Such
                  threats  may steal  personal data,  spread  harmful software, block  access  to  devices,  or trick
                  individuals into losing money.











                   40   Computer Science - VIII
   37   38   39   40   41   42   43   44   45   46   47