Page 114 - Cyber Safety C-7
P. 114
One of the comments said:
“Wait till everyone sees the English notes!”
Aanya felt tears burning her eyes. Why was this happening? Who was behind this? That evening,
Aanya’s mother asked her to show photos from a family picnic. When she opened her gallery, Aanya
noticed something odd:
A screenshot of her ExamPrep2026 folder was in the “Recent” section—taken at 3 a.m.
She had been asleep then. A sudden fear gripped her. Had someone accessed her laptop?
She checked her laptop settings. And there it was:
Recent Wi-Fi Connections “StudyHub_FreeWiFi”
She had connected to this at her coaching centre.
Her sister, older and tech-savvy, explained:
“That open Wi-Fi could have allowed someone to see your online activity. If your firewall or antivirus
was off, they could have captured screenshots.”
Aanya remembered switching off her antivirus because it slowed down her video playback.
Everything connected:
Her notes leaked
Fake accounts used her content
Suspicious email
Strange Wi-Fi
Screenshot at 3 a.m.
This was not a random mistake—someone had used a weak Wi-Fi connection, a turned-off antivirus
and her online footprint to target her.
Based on the above case, answer the following questions:
1. What was the first clue that Aanya’s data had leaked?
2. Identify three signs the “Google Storage” email was fake.
3. Which data protection tools could have prevented the leak?
4. What forms of cyberbullying (direct or indirect) did Aanya face?
5. How did Aanya’s digital footprint make her vulnerable?
6. Which THINK rule(s) were violated by the StudyGenius page?
7. What steps should Aanya take to recover safely?
112 Computer Science - VII

