CYBER SECURITY AWARENESS MEANING OF CYBERSECURITY – CYBER SECURITY THREATS (SS1)


 


CYBER SECURITY AWARENESS

MEANING OF CYBERSECURITY – CYBER SECURITY THREATS - VIRUSES, PHISHING AND SPOOFING, RANSOMWARE, PASSWORD ATTACK, INSIDER THREATS, DDOS (DISTRIBUTED DENIAL OF SERVICE)


INTRODUCTION

Cyber security awareness teaches people how to stay safe while using computers, mobile phones, and the internet. Many cyber-attacks succeed because users are not careful or informed.

MEANING OF CYBERSECURITY

Cyber security is the practice of protecting computers, mobile phones, networks, and data from unauthorized access, attacks, or damage.

It helps to:

(i) Protect personal information

(ii) Prevent data loss

(iii) Keep systems working properly

 

CYBER SECURITY THREATS

A cyber security threat is any action or program that tries to harm a computer system, steal data, or disrupt services. Common cyber security threats are:

(a) viruses

(b) Phishing and Spoofing

(c) Ransomware

(d) Password Attacks

(e) Insider Threats

(f) DDoS (Distributed Denial of Service)

(g) Cyber bullying

(a) Viruses

A computer virus is a harmful program that:

  • Attaches itself to files or software
  • Spreads from one computer to another
  • Can delete files or slow down systems

Examples:

  • Virus from infected flash drives
  • Downloading pirated software

Prevention:

  • Use antivirus software
  • Avoid unknown downloads

(b) Phishing and Spoofing

Phishing is when attackers trick users into giving personal information by pretending to be a trusted person or organization.

Spoofing is when attackers fake emails, websites, or phone numbers to look real.

Examples:

  • Fake bank messages
  • Emails asking for passwords

Prevention:

  • Do not click suspicious links
  • Verify messages before responding

(c) Ransomware

Ransomware is a type of attack where:

  • Files are locked or encrypted
  • The attacker demands money (ransom) to unlock them

Effects:

  • Loss of access to files
  • Financial loss

Prevention:

  • Regular data backup
  • Avoid unknown email attachments

(d) Password Attacks

A password attack happens when hackers try to:

  • Guess passwords
  • Use stolen passwords
  • Break weak passwords

 

Examples:

  • Using simple passwords like “1234”
  • Reusing the same password everywhere

Prevention:

  • Use strong passwords
  • Do not share passwords

 

(e) Insider Threats

An insider threat comes from:

  • People within an organization
  • Employees or students misusing access

Examples:

  • Sharing login details
  • Deleting important data intentionally

Prevention:

  • Limit access rights
  • Monitor system usage

 

(f) DDoS (Distributed Denial of Service)

A DDoS attack happens when:

  • Many computers attack a website at once
  • The website becomes slow or unavailable

Effects:

  • Website crashes
  • Online services stop working

Prevention:

  • Use firewalls
  • Network traffic monitoring

(g) Cyberbullying: 

This is harassment or bullying using digital devices.

Examples:

·       Threatening messages

   ·     Online insults 
Effects of Cyber bullying

    ·  Feelings of sadness, fear, and anger

·         Low self-esteem and loss of confidence

·            Loss of interest in school or activities

·       Poor academic performance

Prevention of Cyberbullying

·       Protect Personal Information -Do not share passwords

·       Report cyberbullying to the  school authorities

·       Do not handle cyberbullying alone

·       Do Not Respond to Bullies



Comments

Popular posts from this blog

MID TERM ASSIGNMENT JS1 FOR SECOND TERM 24/25 ACADEMIC SESSION

KODU AND ROVER MAZE ADVENTURE - MID TERM PROJECT (JS1)

3RD TERM MID TERM PROJECT _ JS1 (COMPUTER STUDIES)