Page 137 - Cyber Safety C-8
P. 137

21 st
                                                                                           Century   #Technology Literacy
                                                                                            Skills

                  Read the following case study and answer the questions that follow:
                  Skyfield School was known for its modern digital ecosystem—smart attendance scanners, AI-based
                  learning tools, online portals, secure cloud storage, and IoT-enabled classrooms. Students loved the
                  convenience, teachers appreciated the speed, and everything worked smoothly… until two separate
                  student mistakes collided into the biggest cyber disruption the school had ever seen.

                  Dev, a bright Class 8 student, received an email one evening announcing:
                  “Congratulations! You are selected for the National Science Scholarship—Verify details here.”
                  The email looked official, carried the school logo, and even mentioned his science project title. Without
                  verifying the sender, Dev clicked the link. The URL was odd, but he ignored it. The page asked him to log
                  in, so he happily typed the password he used everywhere: Dev@123.
                  Within minutes, a hacker gained access to his school portal account.
                  Using Dev’s credentials, the attacker sent teachers a “student marks update” file. A few teachers
                  opened it — unknowingly installing ransomware that locked their files with a message:
                  “Pay `200,000 to recover your documents.”
                  Meanwhile, IoT devices in the school started malfunctioning. The attendance system failed, AC units
                  fluctuated, and classroom lights blinked on their own. The hacker had jumped from a teacher’s infected
                  laptop into the school’s unsecured IoT system, which still used default passwords.
                  At the same time, Ishita, a very organised student in the same class, was preparing her group notes.
                  She downloaded a new “Study Buddy AI” app that promised instant summaries using Artificial
                  Intelligence. It looked professional, so she installed it without checking the developer. The app
                  immediately asked for:
                       Microphone access                                 Contacts access

                       File access                                       Cloud sync access
                  Busy studying, Ishita clicked Allow without thinking. That single click installed spyware.
                  By morning:

                       Her phone battery drained unusually fast
                       Her cloud account showed logins from another city

                       Her Instagram suggested unknown contacts
                       Her microphone logs showed activity at midnight
                  The spyware had copied her passwords, accessed her files, and collected her personal data.

                  Then came the financial scam. Her best friend Tara received a message from Ishita’s number:
                  “I’m stuck outside home. Please send `2,000 urgently to get the new set of keys made.”
                  Tara was confused as Ishita was sitting right next to her!






                                                                                                      Digital Tale  135
   132   133   134   135   136   137   138