Page 60 - Cyber Safety C-8
P. 60
C. Fill in the blanks using the given hints:
1. If laptops, mobile phones, or pen drives containing important data go Hints
missing, criminals can the information. security weaknesses
2. attackers trick people into revealing important misuse
information by pretending to be trusted individuals. photos, documents
malware
3. Fake messages often attempt to collect personal information or install
on a system. Social engineering
4. Regular updates repairs that attackers may attempt to
exploit.
5. A backup is a separate copy of important and files stored on an external drive or
cloud service.
D. Answer the following questions:
1. Why should public Wi-Fi not be used for banking or academic work?
2. Why is installing antivirus important?
3. Describe any two causes of cyber attacks.
4. Why is secure Wi-Fi important when performing important online tasks?
5. Explain any two cyber safety steps against cyber attacks.
58 Computer Science - VIII

