Page 365 - Web_Application_v2.0_C12_Fb
P. 365

Ð  Ð  Ð  Malware Attacks: Malware attacks involve deploying malicious software (malware) to damage, disrupt, or
                         gain unauthorised access to computer systems, servers, or networks. These attacks can be perpetrated by
                         individuals, criminal organisations, or even state actors.
                    5.  Explain cyberbullying.

                  Ans.  Cyberbullying is a form of bullying that occurs through digital technologies. It can take place on any digital
                       platform, like social media, messaging platforms, gaming platforms, mobile phones, etc. It includes sending,
                       posting, or sharing negative, harmful, or private information about someone else causing embarrassment or
                       humiliation.
                       Sometimes, cyberbullying happens alongside face-to-face bullying. If you or someone you know is facing this
                       issue, then please report these instances to someone you trust.

                 C.   Competency-based/Application-based questions.

                    Case Study                                                                            [CBSE Handbook]
                    1.  In 2021, Air India suffered a massive data breach in which the personal information of over 4.5 million passengers
                       was exposed. This data included customer names, credit card details, and passport information, highlighting the
                       sensitivity of data airlines possess.
                    a.  What does the Air India data breach highlight about the sensitivity of data in the airline industry?

                  Ans.  The breach highlights the sensitivity of personal information that airlines possess, such as credit card details and
                       passport information, which are vulnerable to exposure if not properly secured.
                    b.  How many passengers were affected by the Air India data breach in 2021?

                  Ans.  Over 4.5 million passengers were affected by the breach.
                    2.  In 2021, Domino's India was targeted in a cyberattack resulting in a leak of 18 crore order records. This data breach
                       contained details like credit card information, phone numbers and addresses, demonstrating how seemingly
                       harmless food ordering data can become valuable to hackers.
                    a.  How many order records were leaked in the Domino's India data breach in 2021?

                  Ans.  18 crore order records were leaked in the data breach.
                    b.  What does the Domino's India data breach demonstrate about food ordering data?

                  Ans.  The breach demonstrates how seemingly harmless food ordering data can become valuable to hackers.
                    3.  Ravi receives an email claiming he has won a cash prize and is asked to provide his bank account details through
                       a link. What steps should Ravi take to ensure his cybersecurity?
                  Ans.  Ravi should not click on the link or provide his bank details. He should verify the sender's authenticity and report
                       the email as phishing if it seems suspicious.
                    4.  Arjun notices a pop-up message on his computer stating, "Your system is infected. Click here to remove the virus
                       now!". How should Arjun respond to this pop-up to protect his device?

                  Ans.  Arjun should not click on the pop-up. He should close the browser or application displaying it and run a trusted
                       antivirus scan on his computer.
                 D.  Assertion and Reasoning questions.
                     Direction: Questions 1-2, consist of two statements – Assertion (A) and Reasoning (R). Answer these questions by
                    selecting the appropriate option given below:
                     a.  Both A and R are true and R is the correct explanation of A.
                     b.  Both A and R are true but R is not the correct explanation of A.


                                                                                          Cyber Safety and Security  363
   360   361   362   363   364   365   366   367   368   369   370