Page 43 - Cyber Safety C-8
P. 43
Just like burglars try to enter a home, cybercriminals attempt to break into the digital space.
21 st
SPOT THE THREAT Century #Critical Thinking
Skills
Read the statements below and identify whether each one shows a cyber threat or not. Write Threat or
Not a Threat next to each line.
A student receives a call asking for an OTP.
A laptop is left unlocked in a public place.
A school website uses weak security settings.
A friend requests a project file through secure cloud storage.
A stolen USB drive contains saved passwords.
An employee shares company passwords with outsiders.
A food delivery app gets hacked.
A mobile phone has no antivirus installed.
A message claims to be from a bank and asks for account details.
A student updates device software regularly.
Cyber Protection and Security Basics 41

