Page 45 - Cyber Safety C-8
P. 45

21 st
                                           CAUSE AND EFFECT                                 Century   #Information Literacy
                                                                                             Skills

                 Match the cause of a cyber attack with its correct effect.

                             Causes                                             Effects

                   1. Weak computer systems       a. A stolen laptop is used to open stored email accounts.

                   2. Lost or stolen devices      b. A service provider breach exposes customer addresses.

                   3. Insider threats             c. A caller pretends to be a teacher and asks for login details.

                   4. Third-party risks           d. A staff member shares confidential files with outsiders.

                   5. Social engineering          e.  Attackers enter a system because password protection is
                                                    missing.









                                "Anyone can be tricked. Hence, it is important, we stay alert. Let us next study
                                                   about the various types of cyber threats."






                 TYPES OF CYBER THREATS

                 Understanding different types of cyber threats helps in preventing, preparing for, and responding
                 to attacks more effectively. These threats arise because increasing digital connectivity has created

                 more data and more points of access. This growth also provides opportunities for hackers to take
                 advantage of weaknesses in computer systems and cause damage.












                           Malware          Ransomware      Social Engineering    Phishing       Zero-day Threats












                                  Internal threats      Emotet   Denial of Service / Distributed  Cloud Vulnerability
                                                                      denial of Service
                                                                                 Cyber Protection and Security Basics  43
   40   41   42   43   44   45   46   47   48   49   50