Page 44 - Cyber Safety C-8
P. 44

Causes of Cyber Attacks


                                                         Weak Computer Systems









                                     Social                                               Lost or Stolen
                                   Engineering                                               Devices
                                                                Causes of
                                                              Cyber Attack










                                                  Insider Threats        Third-party Risks


                  These causes are described below:

                      Weak computer systems: When a computer or network lacks strong security, hackers can
                     easily find vulnerabilities and launch attacks.

                     Example: A school website without proper protection got hacked, leading to leaked exam
                     papers.

                      Lost or stolen devices: If laptops, mobile phones, or pen drives containing important data go
                     missing, criminals can misuse the information.
                     Example: A student’s USB drive with project files and saved passwords is stolen on the metro.

                      Insider threats: Sometimes employees intentionally leak, steal, or misuse information, causing
                     harm to the organisation.

                     Example: A former employee shared company's passwords with outsiders after leaving the job.

                      Third-party risks: If a partner company or service provider gets hacked, attackers may also
                     access the connected organisation’s data.

                     Example: A food delivery app was hacked, and because it is linked to online wallets, customers’
                     payment details got exposed.
                      Social engineering: Attackers trick people into revealing important information by pretending
                     to be trusted individuals.

                     Example: A student receives a call from someone claiming to be a bank officer, asking for an
                     OTP and unknowingly shares it.






                   42   Computer Science - VIII
   39   40   41   42   43   44   45   46   47   48   49