Page 58 - Cyber Safety C-7
P. 58

Unusual Network Traffic: Unrecognised devices or unusual data transfers on your network
                     may indicate unauthorized access or malware.

                  To mitigate cyber threats, one should take the  following steps:

                                                Strong Passwords
                                                Complex and unique passwords for each account

                                                  Two-Factor Authentication
                                                  Extra security layer with second authentication form
                                                    Limited Access
                                                    Restrict access to sensitive data and systems
                                                      Regular Backups
                                                      Back to critical data to prevent data loss
                                                         User Education
                                                         Cybersecurity training for threat awareness

                                                           Firewalls & Encryption
                                                           Block malicious traffic and encrypt data
                                                              Incident Response
                                                              Act fast to contain threats and assess damage









                                                                                                21 st
                                                                                               Century   #Critical Thinking
                                                                                                Skills
                                                               DIGITAL LIES
                      Ananya and Riya had recently become close friends in Grade 7. Both loved art and dance, so they
                      started a small private Instagram page to share their creative work. At first, classmates posted
                      supportive comments. Later the tone changed.

                      Some accounts began leaving mean comments about Ananya’s looks on her dance video. Riya
                      advised her to ignore them, but things soon escalated. Without warning, Ananya was removed from
                      the class WhatsApp study group. She felt hurt but chose to stay silent.
                      A week  later, a mysterious  account  named  ArtTruths247  posted  a morphed  photo  of Ananya,
                      wrongly claiming she failed all exams. Students shared it and laughed. Soon after, a fake profile
                      appeared using Riya’s name and photo, posting edited versions of her artwork with captions like
                      Copy-paste artist.

                      Both girls were confused. The fake accounts used the same emojis, posted at similar times and
                      followed the same two classmates. These patterns suggested a familiar source.
                      Their friend Sameer noticed everything. He knew Ananya and Riya would never post such comments
                      themselves, but he was afraid of becoming the next target. Still, he quietly took screenshots and
                      wondered what to do. Should he help? Or stay silent?









                   56   Computer Science - VII
   53   54   55   56   57   58   59   60   61   62   63