Page 45 - Cyber Safety C-8
P. 45
21 st
CAUSE AND EFFECT Century #Information Literacy
Skills
Match the cause of a cyber attack with its correct effect.
Causes Effects
1. Weak computer systems a. A stolen laptop is used to open stored email accounts.
2. Lost or stolen devices b. A service provider breach exposes customer addresses.
3. Insider threats c. A caller pretends to be a teacher and asks for login details.
4. Third-party risks d. A staff member shares confidential files with outsiders.
5. Social engineering e. Attackers enter a system because password protection is
missing.
"Anyone can be tricked. Hence, it is important, we stay alert. Let us next study
about the various types of cyber threats."
TYPES OF CYBER THREATS
Understanding different types of cyber threats helps in preventing, preparing for, and responding
to attacks more effectively. These threats arise because increasing digital connectivity has created
more data and more points of access. This growth also provides opportunities for hackers to take
advantage of weaknesses in computer systems and cause damage.
Malware Ransomware Social Engineering Phishing Zero-day Threats
Internal threats Emotet Denial of Service / Distributed Cloud Vulnerability
denial of Service
Cyber Protection and Security Basics 43

