Discursive - Passage 21
Discursive - Passage 21
(under the aegis of The Delhi Public School Society, East Of Kailash, New Delhi)
GRADE X
ENGLISH LANGUAGE AND LITERATURE
REVISION FOR PRE BOARD 2024-25
WORKSHEET 4: DISCURSIVE PASSAGE
18.11.24
Read the following passage carefully.
Cyber Security: An Imperative in the Digital Age
In today’s interconnected world, cybersecurity is a critical concern. With the rapid evolution of technology, the
ways in which we interact, transact, and store information have transformed dramatically. While this digital
revolution has brought about unparalleled convenience, it has also introduced significant risks. Cybersecurity
refers to the practices and technologies designed to protect systems, networks, and data from cyber threats.
This discursive passage explores the importance of cybersecurity, its challenges, the evolving nature of cyber
threats, and the strategies to mitigate them.
The reliance on digital platforms has made cybersecurity a cornerstone of modern life. Individuals,
businesses, and governments all depend on secure systems to protect sensitive information. For instance,
financial institutions safeguard customers’ banking details, healthcare systems protect medical records, and
governments secure classified data. A breach in any of these sectors can lead to disastrous consequences.
Cybersecurity is crucial not only for protecting data but also for maintaining trust. When individuals engage in
online banking, shopping, or even social networking, they expect that their information is handled securely.
A failure in cybersecurity can erode trust, as seen in the aftermath of major data breaches. For example, the
2017 Equifax breach exposed the personal data of over 147 million people, leading to financial losses and
widespread panic.
Cyber threats are diverse and constantly evolving. They range from simple phishing scams to sophisticated
state-sponsored attacks. Understanding the nature of these threats is essential to appreciate the complexity
of cybersecurity.
Malware: This includes viruses, worms, and ransomware designed to damage or disrupt systems.
Ransomware, for example, encrypts a victim’s data and demands payment for its release, a tactic that has
crippled hospitals and businesses alike.
Phishing: One of the most common threats, phishing involves tricking individuals into divulging sensitive
information, such as passwords or credit card details, by masquerading as a trustworthy entity.
Denial of Service (DoS) Attacks: These attacks aim to overwhelm a system or network, rendering it
unavailable to legitimate users. A notable example was the 2016 attack on Dyn, which disrupted major
websites like Twitter and Netflix.
Advanced Persistent Threats (APTs): These are prolonged and targeted attacks often carried out by
highly skilled actors, such as nation-states. They aim to steal sensitive information or compromise critical
infrastructure over time.
Zero-Day Exploits: These attacks exploit vulnerabilities in software that are unknown to the vendor. Since
there is no immediate fix, such vulnerabilities can be particularly devastating.
Despite the advancements in cybersecurity technologies, several challenges persist, making it difficult to
ensure comprehensive protection.
The Human Factor: Human error remains a significant vulnerability. Employees clicking on malicious
links, using weak passwords, or failing to follow security protocols can open the door to cyberattacks.
Rapid Technological Advancements: As technology evolves, so do the methods of cybercriminals. The
rise of IoT (Internet of Things) devices has expanded the attack surface, making it harder to secure every
endpoint.
Resource Constraints: Many organizations, especially small and medium-sized enterprises (SMEs), lack
the resources to implement robust cybersecurity measures. This makes them attractive targets for
attackers.
Sophistication of Attacks: Modern cyberattacks are often well-coordinated and sophisticated. State-
sponsored attackers, in particular, have access to extensive resources and advanced tools, making them
difficult to defend against.
Regulatory and Legal Complexities: Different countries have varying regulations regarding
cybersecurity and data protection. Navigating this complex legal landscape is a challenge for multinational
organizations.
Governments play a pivotal role in cybersecurity. They establish regulations, promote best practices, and
invest in cybersecurity infrastructure. Many countries have recognized cybersecurity as a matter of national
security and have set up dedicated agencies. For instance, the U.S. has the Cybersecurity and Infrastructure
Security Agency (CISA), while the EU has implemented the General Data Protection Regulation (GDPR) to
ensure data protection.
However, cyber threats often transcend national boundaries, necessitating international cooperation.
Organizations such as the United Nations and NATO have taken steps to foster global collaboration in
combating cybercrime. Sharing threat intelligence, coordinating responses, and establishing norms for state
behaviour in cyberspace are crucial for a cohesive defence strategy.
While no system is entirely immune to cyber threats, several strategies can significantly reduce the risk.
Education and Awareness: Educating individuals and employees about cybersecurity risks is one of the
most effective defences. Awareness programs help people recognize phishing attempts, use strong
passwords, and follow security protocols.
Regular Updates and Patching: Ensuring that software and systems are regularly updated helps close
vulnerabilities that could be exploited by attackers.
Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring users to verify their
identity through multiple means, such as a password and a verification code sent to their phone.
Encryption: Encrypting sensitive data ensures that even if it is intercepted, it cannot be easily read or
misused.
Incident Response Plans: Organizations should have a clear plan for responding to cyber incidents. This
includes identifying the breach, containing it, and recovering from its impact.
Threat Intelligence: Staying informed about emerging threats enables organizations to adapt their
defences proactively.
Penetration Testing: Regularly testing systems for vulnerabilities through simulated attacks helps
organizations identify and address weaknesses before real attackers can exploit them.
The future of cybersecurity is both promising and daunting. On one hand, advancements in technology, such
as artificial intelligence (AI) and machine learning, offer new tools for detecting and preventing cyber threats.
AI can analyze vast amounts of data to identify patterns and anomalies, enabling faster and more accurate
threat detection.
On the other hand, the increasing integration of technology into every aspect of life, from smart homes to
autonomous vehicles, creates new vulnerabilities. As quantum computing becomes a reality, it could render
current encryption methods obsolete, posing a significant challenge to cybersecurity.
The rise of cyber warfare is another concern. As geopolitical tensions escalate, nations may increasingly
resort to cyberattacks to achieve their objectives. This highlights the need for robust international agreements
to prevent the escalation of cyber conflicts.
In the digital age, cybersecurity is no longer a luxury but a necessity. As cyber threats continue to evolve, so
must our defences. It is a shared responsibility that requires the collaboration of individuals, organizations,
and governments. By staying vigilant, investing in advanced technologies, and fostering international
cooperation, we can build a secure digital environment. The stakes are high, but with a proactive approach,
the benefits of the digital revolution can be enjoyed without compromising security.
On the basis of the above passage answer the following questions.
1. How would you describe the writer’s tone? Does the writer come across as cautious, informative,
or persuasive? (1)
2. Evaluate the writing style of the above passage. How does this style of writing help in explaining
the complexities of cybersecurity to the reader? (2)
3. Based on the information in the passage about the human factor in cybersecurity, infer the possible
real-life situation that might lead to a cybersecurity breach. What are the challenges organizations
face with human behaviour in terms of cyber threats? (2)
4. Which of the following best describes why cybersecurity is considered a cornerstone of modern
life?
(1)
a) It ensures the smooth functioning of all digital devices.
b) It provides entertainment and convenience to users.
c) It protects sensitive information and maintains trust in digital systems.
d) It allows organizations to avoid using physical storage systems.
5. What is a key challenge faced by small and medium-sized enterprises (SMEs) in implementing
cybersecurity? (1)
a) Lack of interest in cybersecurity.
b) Limited access to basic digital tools.
c) Insufficient financial and technical resources.
d) Over-reliance on government cybersecurity policies.
6. Why is international cooperation crucial in addressing cybersecurity threats? (1)
7. According to the passage, how can organizations reduce the risk of cyber threats caused by
human error? (1)
a) By investing in advanced hardware.
b) By eliminating the use of passwords altogether.
c) Through regular employee training and awareness programs.
d) By relying solely on automated security systems.
8. What future challenge to cybersecurity is posed by advancements in quantum computing, as
discussed in the passage? (1)