Page 60 - Cyber Safety C-8
P. 60

C.  Fill in the blanks using the given hints:
                     1.  If laptops, mobile phones, or pen drives containing important data go         Hints
                         missing, criminals can                the information.                   security weaknesses

                     2.                  attackers trick people into revealing important               misuse
                         information by pretending to be trusted individuals.                     photos, documents
                                                                                                       malware
                     3.   Fake messages often attempt to collect personal information or install
                                         on a system.                                              Social engineering
                     4.   Regular updates repairs                that attackers may attempt to
                         exploit.

                     5.   A backup is a separate copy of important                and files stored on an external drive or
                         cloud service.

                  D.  Answer the following questions:
                     1.  Why should public Wi-Fi not be used for banking or academic work?






                     2.  Why is installing antivirus important?





                     3.  Describe any two causes of cyber attacks.










                     4.  Why is secure Wi-Fi important when performing important online tasks?











                     5.  Explain any two cyber safety steps against cyber attacks.

















                   58   Computer Science - VIII
   55   56   57   58   59   60   61   62   63   64   65