0% found this document useful (0 votes)
40 views

Cyber It

This worksheet provides examples of various cyber security threats and asks students to match them to their definitions. Some threats discussed include phishing attacks, email spoofing, ransomware, Wi-Fi hacking, malware, and password theft. Correct answers are also given such as linking phishing attacks to getting users to enter personal data on a fake site and ransomware to encrypting files until a ransom is paid.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

Cyber It

This worksheet provides examples of various cyber security threats and asks students to match them to their definitions. Some threats discussed include phishing attacks, email spoofing, ransomware, Wi-Fi hacking, malware, and password theft. Correct answers are also given such as linking phishing attacks to getting users to enter personal data on a fake site and ransomware to encrypting files until a ransom is paid.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

NEERI Modern School

Worksheet for Cyber Security


Match the columns :
Phishing attacks Hacking Wi-Fi password (WEP
password) of his neighbour and
was able to read all his private
communications

Email Spoofing Example:- . Personal details of


77 million users were accessed
with potential access to 12,000
encrypted credit card

Ransom ware sent via email and ask users to


click on a link which redirects to
a dummy site where an attacker
wants victim to enter their
personal data or respond to an
email which will steal all your
personal information.

Section 67 and 67A of One day, he got an SMS “Click


here to get the Latest Paid
the IT Act Games Online for free”.

Wi-Fi Hacks forgery of an e-mail header so


that the message appears to
have originated from someone
genuine whereas it is actually
not

Game Threats Can be reduced by use of long,


secure passwords and not a
dictionary word

Malware encrypted many important les


on the computer and did not
allow him to access it. As the
name suggests, the attacker
demands for a “Ransom”
(money) in order to unlock and
restore the les

Password Theft punishment for publishing,


storing or transmitting obscene
material in electronic form
(Imprisonment from 2 – 10
years with ne up to 10 lakhs)

You might also like