Page 48 - Cyber Safety C-8
P. 48

21 st
                                                                                          Century   #Media Literacy
                                                                                           Skills
                             Scan the QR code or watch the following video on Cybersecurity Threats at:
                             https://www.youtube.com/watch?v=awhqnSskWjU

                             Answer the following questions:

                                  Name three types of cybersecurity threats mentioned in the video.


                                 Describe what a “Man-in-the-Middle (MitM)” attack involves.













                     The WannaCry ransomware attack  of  May  2017 spread  rapidly  across  the  world, infecting
                     over 200,000  computers in more than  150 countries. The attack  severely  disrupted  many
                     organisations, including several UK National Health Service (NHS) hospitals, where computer
                     systems were locked and medical services were interrupted.






                                                                                                 21 st
                                                                                               Century   #Critical Thinking
                                         RANSOMWARE ATTACK: A LESSON IN CYBERSECURITY           Skills
                    Aarohi was working on her science project when she received an email that appeared to be from
                    her school. It read:
                    “Download the attached file for updated project guidelines.”

                    Without verifying the source, she downloaded the attached PDF. The moment she opened it, her
                    laptop screen froze, and a message appeared:
                    “Your files are locked. Pay `500,000 to unlock them.”
                    All her photos, notes, and school assignments were encrypted and inaccessible. Aarohi’s father
                    explained  that  this  was  a ransomware  attack.  The  attacker  had  used  the  fake  email  and  its
                    attachment to install malware that locked her files. In the end, Aarohi had to buy a new laptop. She
                    lost all her data and had to begin her project again.
                    Based on the above case, answer the following questions:
                    1.  What made Aarohi believe the email was from her school?


                    2.  What type of cyber threat attacked her device?






                   46   Computer Science - VIII
   43   44   45   46   47   48   49   50   51   52   53