This worksheet provides examples of various cyber security threats and asks students to match them to their definitions. Some threats discussed include phishing attacks, email spoofing, ransomware, Wi-Fi hacking, malware, and password theft. Correct answers are also given such as linking phishing attacks to getting users to enter personal data on a fake site and ransomware to encrypting files until a ransom is paid.
This worksheet provides examples of various cyber security threats and asks students to match them to their definitions. Some threats discussed include phishing attacks, email spoofing, ransomware, Wi-Fi hacking, malware, and password theft. Correct answers are also given such as linking phishing attacks to getting users to enter personal data on a fake site and ransomware to encrypting files until a ransom is paid.
This worksheet provides examples of various cyber security threats and asks students to match them to their definitions. Some threats discussed include phishing attacks, email spoofing, ransomware, Wi-Fi hacking, malware, and password theft. Correct answers are also given such as linking phishing attacks to getting users to enter personal data on a fake site and ransomware to encrypting files until a ransom is paid.
This worksheet provides examples of various cyber security threats and asks students to match them to their definitions. Some threats discussed include phishing attacks, email spoofing, ransomware, Wi-Fi hacking, malware, and password theft. Correct answers are also given such as linking phishing attacks to getting users to enter personal data on a fake site and ransomware to encrypting files until a ransom is paid.
Match the columns : Phishing attacks Hacking Wi-Fi password (WEP password) of his neighbour and was able to read all his private communications
Email Spoofing Example:- . Personal details of
77 million users were accessed with potential access to 12,000 encrypted credit card
Ransom ware sent via email and ask users to
click on a link which redirects to a dummy site where an attacker wants victim to enter their personal data or respond to an email which will steal all your personal information.
Section 67 and 67A of One day, he got an SMS “Click
here to get the Latest Paid the IT Act Games Online for free”.
Wi-Fi Hacks forgery of an e-mail header so
that the message appears to have originated from someone genuine whereas it is actually not
Game Threats Can be reduced by use of long,
secure passwords and not a dictionary word
Malware encrypted many important les
on the computer and did not allow him to access it. As the name suggests, the attacker demands for a “Ransom” (money) in order to unlock and restore the les
Password Theft punishment for publishing,
storing or transmitting obscene material in electronic form (Imprisonment from 2 – 10 years with ne up to 10 lakhs)