Page 138 - Cyber Safety C-8
P. 138
Before she even understood the situation, it escalated further. A deepfake video profile of Ishita appeared
online—her face on another body, paired with a fake AI-generated voice. A classmate, Karan, spread
rumours based on the deepfake, claiming Ishita was secretly ill and hiding things from the school.
Ishita was devastated. Her digital identity had been stolen, manipulated, and misused.
Both cyber incidents collided on the same day. The school’s cyber team noticed:
Mass ransomware alerts IoT device failures
Students receiving scam messages Fake videos circulating
Massive login attempts from unknown locations
It became clear: multiple systems were under attack at once.
Teachers informed the Cyber Cell. Officers arrived and traced:
The portal breach to Dev’s phishing email
The spyware and deepfake creation to Ishita’s AI app
The IoT takeover to weak device passwords
The spread of rumours to student misuse
Dev and Ishita were not criminals—but their careless actions had caused a chain reaction affecting the
entire school.
Based on the above case, answer the following questions:
1. What was Dev’s first mistake?
a. Ignoring the email
b. Clicking a phishing link and entering his password
c. Updating his portal
d. Opening a safe file
2. What type of malware locked the teachers’ files?
a. Spyware b. Ransomware
c. Adware d. Worm
3. What did Ishita accidentally install through the AI app?
a. Antivirus b. Spyware
c. VPN d. Game
4. Which feature did the malicious AI app misuse?
a. Camera and speaker b. Microphone, contacts, and files
c. Bluetooth d. Keyboard
Science
- VIII
136136 Computer Science - VIII
Computer

