Page 58 - Cyber Safety C-8
P. 58

Step 3        Select the Two-step verification option.

                      Step 4        Tap Turn on to enable the feature.
































                      Step 5         Enter a 6-digit PIN that can easily remember, then re-enter it to confirm and tap
                                     on the Save button.
                                       WhatsApp will then prompt for an email address to help recover the PIN in case it
                                     is forgotten.

                      Step 6        Tap Add email to include one (optional but recommended).
                                       So, WhatsApp is only one of many apps where cyber safety matters.











                           A cyber threat is any risk that aims to harm a computer, smartphone, or online account.
                           Understanding  different types  of cyber  threats  helps in preventing, preparing for,  and
                            responding to attacks more effectively.
                            Malware is  malicious  software  intentionally  developed  to  infiltrate,  damage,  or disrupt
                            computer systems without the user’s informed consent.
                            Social Engineering is a psychological manipulation technique used to deceive individuals into
                            divulging confidential or sensitive information.
                            Protection against cyber attacks refers to methods, tools, and practices that safeguard digital
                            devices, networks, data, and online services from unauthorised access, misuse, damage, or
                            disruption.
                            Cyber attackers use various techniques such as malware, phishing, ransomware, and social
                            engineering to exploit weaknesses in systems.



                   56   Computer Science - VIII
   53   54   55   56   57   58   59   60   61   62   63