Page 58 - Cyber Safety C-8
P. 58
Step 3 Select the Two-step verification option.
Step 4 Tap Turn on to enable the feature.
Step 5 Enter a 6-digit PIN that can easily remember, then re-enter it to confirm and tap
on the Save button.
WhatsApp will then prompt for an email address to help recover the PIN in case it
is forgotten.
Step 6 Tap Add email to include one (optional but recommended).
So, WhatsApp is only one of many apps where cyber safety matters.
A cyber threat is any risk that aims to harm a computer, smartphone, or online account.
Understanding different types of cyber threats helps in preventing, preparing for, and
responding to attacks more effectively.
Malware is malicious software intentionally developed to infiltrate, damage, or disrupt
computer systems without the user’s informed consent.
Social Engineering is a psychological manipulation technique used to deceive individuals into
divulging confidential or sensitive information.
Protection against cyber attacks refers to methods, tools, and practices that safeguard digital
devices, networks, data, and online services from unauthorised access, misuse, damage, or
disruption.
Cyber attackers use various techniques such as malware, phishing, ransomware, and social
engineering to exploit weaknesses in systems.
56 Computer Science - VIII

