0% found this document useful (0 votes)
4 views3 pages

Unit3NotesGR11 Updated

The document covers key concepts in cyber safety, including securing online accounts, understanding phishing, and the importance of cybersecurity. It discusses various cyber threats, data protection laws, and ethical considerations in technology use. Additionally, it highlights the challenges of enforcing cyber laws in a global context.

Uploaded by

kkoushika057
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

Unit3NotesGR11 Updated

The document covers key concepts in cyber safety, including securing online accounts, understanding phishing, and the importance of cybersecurity. It discusses various cyber threats, data protection laws, and ethical considerations in technology use. Additionally, it highlights the challenges of enforcing cyber laws in a global context.

Uploaded by

kkoushika057
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber Safety

Multiple Choice Questions (MCQs)

1. Which of the following is the best way to secure your online accounts?
o a) Use a simple and easy-to-remember password
o b) Use the same password for all accounts
o c) Enable two-factor authentication
o d) Share your password with trusted friends
o Answer: c) Enable two-factor authentication
2. Phishing is an example of:
o a) A virus
o b) Identity theft
o c) Hardware malfunction
o d) Software bug
o Answer: b) Identity theft
3. Which of the following is NOT a secure way to store your passwords?
o a) In a password manager
o b) Written down in a notebook
o c) Memorized
o d) In an encrypted file
o Answer: b) Written down in a notebook

Short Answer Questions

1. What is a strong password and why is it important?


o A strong password contains a mix of upper and lower case letters, numbers,
and special characters. It is important because it makes it harder for hackers to
guess or crack your password, thereby protecting your online accounts.
2. Explain the concept of two-factor authentication.
o Two-factor authentication (2FA) is a security process in which the user
provides two different authentication factors to verify themselves. This adds
an extra layer of security beyond just the password.
3. What are the risks of using public Wi-Fi and how can you mitigate them?
o Public Wi-Fi networks are often unsecured, making it easy for cybercriminals
to intercept data. Mitigation strategies include using a VPN, avoiding sensitive
transactions, and ensuring websites use HTTPS.
4. What is malware and what are its common types?
o Malware is malicious software designed to harm, exploit, or otherwise
compromise a computer system. Common types include viruses, worms,
trojans, ransomware, and spyware.
5. Explain the concept of phishing and how to recognize it.
o Phishing is a cyberattack where attackers disguise themselves as trustworthy
entities to steal sensitive information. Indicators of phishing include suspicious
email addresses, generic greetings, and urgent or alarming messages.

Long Answer Questions


1. Discuss the importance of cybersecurity in the digital age.
o In the digital age, cybersecurity is crucial because it protects our data, personal
information, and financial transactions from cybercriminals. With the
increasing number of cyberattacks, robust cybersecurity measures are
necessary to safeguard individuals, businesses, and governments from
potential threats and breaches.
2. Describe the different types of cyber threats and how to protect against them.
o Cyber threats include viruses, malware, phishing, and ransomware. Protection
against these threats involves using antivirus software, enabling firewalls,
regularly updating software, educating oneself about phishing tactics, and
using strong, unique passwords along with two-factor authentication.
3. How can individuals protect their personal information on social media?
o Individuals can protect their personal information by adjusting privacy
settings, avoiding sharing sensitive details, being cautious about friend
requests, and being aware of the platform’s data policies. It is also important
to use strong passwords and enable two-factor authentication.
4. Discuss the impact of data breaches on individuals and businesses.
o Data breaches can lead to financial loss, identity theft, and damage to
reputation. For businesses, breaches can result in legal consequences, loss of
customer trust, and financial penalties. Both individuals and organizations
need to implement strong security measures to prevent data breaches.
5. What are some common signs of a cyberattack and how should one respond?
o Common signs include unusual account activity, slow computer performance,
unexpected pop-ups, and unauthorized software installations. Immediate
responses should include disconnecting from the internet, running antivirus
scans, changing passwords, and reporting the attack to relevant authorities.

Society, Law, and Ethics

Multiple Choice Questions (MCQs)

1. Which of the following is an example of intellectual property?


o a) A company's financial records
o b) A patented invention
o c) Employee personal data
o d) A physical office building
o Answer: b) A patented invention
2. The GDPR is a regulation related to:
o a) Trade policies
o b) Environmental protection
o c) Data protection and privacy
o d) Employment laws
o Answer: c) Data protection and privacy
3. Cyberbullying is:
o a) A legal activity
o b) A harmless prank
o c) A form of online harassment
o d) Encouraged online behavior
o Answer: c) A form of online harassment
Short Answer Questions

1. What is the importance of data protection laws?


o Data protection laws are important because they safeguard individuals' privacy
and personal information from misuse, unauthorized access, and breaches.
They ensure that organizations handle data responsibly and transparently.
2. Explain the ethical considerations in using artificial intelligence.
o Ethical considerations in using artificial intelligence include ensuring AI
systems are fair and unbiased, respecting user privacy, and being transparent
about AI decision-making processes. It is also important to consider the
potential impact of AI on employment and society.
3. What is the significance of intellectual property rights in the digital age?
o Intellectual property rights protect creators' innovations, ensuring they receive
recognition and financial benefits. In the digital age, these rights are crucial for
promoting creativity, encouraging investment in new ideas, and preventing
unauthorized use of intellectual property.
4. Explain the concept of digital citizenship and its importance.
o Digital citizenship refers to responsible and ethical behavior when using
technology. It is important because it promotes safe and respectful online
interactions, protects personal information, and ensures compliance with laws
and regulations.
5. What are the challenges of enforcing cyber laws?

• Global Nature: Cybercrimes often span multiple countries, complicating


jurisdictional matters.
• Differing Legal Frameworks: Variations in cyber laws across nations hinder
effective international cooperation.
• Rapid Technological Changes: Continuous advancements in technology outpace the
development of corresponding laws.
• Limited Resources: Law enforcement agencies often lack the necessary expertise
and funding to combat complex cybercrimes.
• Balancing Privacy: Ensuring cybersecurity while protecting individual privacy and
civil liberties is a delicate balance.
• Anonymity: Cybercriminals use techniques to remain anonymous, making it difficult
to trace their activities.
• International Cooperation: Disparities in legal definitions and enforcement
practices impede global efforts.
• Data Sovereignty: Cross-border data flow and data localization requirements create
legal complexities.
• False Flags: Attackers use misleading techniques to obscure the true origin of their
attacks.
• Need for Harmonization: Harmonizing cyber laws and international collaboration
are essential to address these challenges effectively.

You might also like