Page 44 - Cyber Safety C-8
P. 44
Causes of Cyber Attacks
Weak Computer Systems
Social Lost or Stolen
Engineering Devices
Causes of
Cyber Attack
Insider Threats Third-party Risks
These causes are described below:
Weak computer systems: When a computer or network lacks strong security, hackers can
easily find vulnerabilities and launch attacks.
Example: A school website without proper protection got hacked, leading to leaked exam
papers.
Lost or stolen devices: If laptops, mobile phones, or pen drives containing important data go
missing, criminals can misuse the information.
Example: A student’s USB drive with project files and saved passwords is stolen on the metro.
Insider threats: Sometimes employees intentionally leak, steal, or misuse information, causing
harm to the organisation.
Example: A former employee shared company's passwords with outsiders after leaving the job.
Third-party risks: If a partner company or service provider gets hacked, attackers may also
access the connected organisation’s data.
Example: A food delivery app was hacked, and because it is linked to online wallets, customers’
payment details got exposed.
Social engineering: Attackers trick people into revealing important information by pretending
to be trusted individuals.
Example: A student receives a call from someone claiming to be a bank officer, asking for an
OTP and unknowingly shares it.
42 Computer Science - VIII

