Page 58 - Cyber Safety C-7
P. 58
Unusual Network Traffic: Unrecognised devices or unusual data transfers on your network
may indicate unauthorized access or malware.
To mitigate cyber threats, one should take the following steps:
Strong Passwords
Complex and unique passwords for each account
Two-Factor Authentication
Extra security layer with second authentication form
Limited Access
Restrict access to sensitive data and systems
Regular Backups
Back to critical data to prevent data loss
User Education
Cybersecurity training for threat awareness
Firewalls & Encryption
Block malicious traffic and encrypt data
Incident Response
Act fast to contain threats and assess damage
21 st
Century #Critical Thinking
Skills
DIGITAL LIES
Ananya and Riya had recently become close friends in Grade 7. Both loved art and dance, so they
started a small private Instagram page to share their creative work. At first, classmates posted
supportive comments. Later the tone changed.
Some accounts began leaving mean comments about Ananya’s looks on her dance video. Riya
advised her to ignore them, but things soon escalated. Without warning, Ananya was removed from
the class WhatsApp study group. She felt hurt but chose to stay silent.
A week later, a mysterious account named ArtTruths247 posted a morphed photo of Ananya,
wrongly claiming she failed all exams. Students shared it and laughed. Soon after, a fake profile
appeared using Riya’s name and photo, posting edited versions of her artwork with captions like
Copy-paste artist.
Both girls were confused. The fake accounts used the same emojis, posted at similar times and
followed the same two classmates. These patterns suggested a familiar source.
Their friend Sameer noticed everything. He knew Ananya and Riya would never post such comments
themselves, but he was afraid of becoming the next target. Still, he quietly took screenshots and
wondered what to do. Should he help? Or stay silent?
56 Computer Science - VII

