Page 113 - Cyber Safety C-8
P. 113
21 st
Century #Critical Thinking
Skills
EXAM HACKING AND LEGAL CONSEQUENCES
In 2020, a group of students in Maharashtra tried to hack into their school’s online exam portal
to access the question papers before the exam. They intended to get an unfair advantage in the
upcoming exam. However, their hacking attempt was detected by the school’s IT team, who noticed
unusual activity on the portal. The school authorities were immediately informed, and the students
were caught before they could access the exam papers.
The students involved in this case likely believed that hacking into the portal would guarantee them
a good grade, but they failed to understand the serious consequences of their actions. Instead of
preparing for the exam honestly, they sought a shortcut. Their actions not only violated the principles
of fairness and honesty but also exposed them to disciplinary action from the school and legal
penalties. The hacking attempt disrupted the exam process and raised concerns about the security
of online systems.
Following the discovery, the school took strict disciplinary actions, including suspending the students
and disqualifying them from the exam. The case was also reported to the police, and legal action
was taken under the Information Technology Act (IT Act), which covers cybercrimes like hacking
and online fraud. This case served as a powerful lesson on the importance of academic integrity, the
legal consequences of cybercrimes, and the need for students to approach exams with hard work
and honesty.
Based on the above case, answer the following questions:
1. What are the risks of trying to cheat in an exam, and how can it affect you?
2. How can knowing about cyber laws help you avoid getting into trouble online?
Identity Theft: Using someone else's personal information, like their name or credit card
details, without permission to steal or commit fraud.
Digital Signatures: An electronic way to sign documents online, proving who you are and
making sure the information is secure.
Block Cipher: A block cipher encrypts data in fixed-size blocks, one block at a time.
Defense-in-depth: Defense-in-depth means using multiple layers of security so that if one
layer fails, another layer still protects the system.
Cyber Law Awareness 111

