Page 61 - Cyber Safety C-8
P. 61

21 st
                                                                                                Century   #Critical Thinking
                                                                                                 Skills
                 1.  Arun noticed that his computer was running much slower than usual. After running a system scan, he
                    discovered that a computer virus was modifying system files. What kind of malicious software is likely
                    causing this issue?
                 2.  Priya received an email claiming her bank account had been suspended and asking her to log in
                    through a link provided in the email. After clicking the link and entering her credentials, she realised
                    that her account was compromised. What type of cyberattack did Priya fall victim?
                 3.  Anjali received a phone call from someone claiming to be a bank representative asking for her One-
                    Time Password (OTP) for security verification. What is this an example of?



                                                                                          21 st
                                                                                         Century   #Technology Literacy
                                                                                          Skills
                        The Google Phishing Quiz is an interactive online quiz, created by Jigsaw (part of
                        Google), that helps users learn to spot phishing emails and fake messages.

                        Take the Phishing Quiz. Spot the Scam! Go to https://phishingquiz.withgoogle.com/








































                        For each email or message shown, decide if it’s real or a phishing attempt. At the end, note
                        down one new trick you learned to spot fake messages!










                                                                                 Cyber Protection and Security Basics  59
   56   57   58   59   60   61   62   63   64   65   66