Page 83 - Cyber Safety C-8
P. 83
Example: If the password is sunshine, football, welcome123, password1, etc. These are all in
dictionary lists. Attackers download dictionaries with millions of words and combine them
with numbers like sunil123, hello2024, india@123, etc.
Social engineering-based guessing: Attackers guess passwords based on the victim’s
personal information. sources attackers observe social media (birthday, pet name, school
name), public profiles, photos, and conversations.
Common passwords people create:
Sunil2009 (name + birth year)
Aditi@123 (name + 123)
Tommy55 (pet name)
Delhi@2020 (city + year)
Keylogging: Keylogging uses malicious software (keylogger) to record every keystroke entered
on a computer.
If a keylogger is installed, the email and password typed on the keyboard are recorded, and
all the recorded information is then secretly sent to the attacker.
21 st
EMAIL SAFETY SCAN Century #Media Literacy
Skills
Is an email account truly safe? Find out whether your account has been part of any data breach. For this,
visit the following link: https://haveibeenpwned.com/
Enter the email ID on the website and check the number of data breaches associated with that account.
How many breaches are listed?
Advanced Password Protection 81

