Page 19 - Cyber Safety C-8
P. 19
21 st
Century #Critical Thinking
Skills
Hazel enjoyed browsing gaming websites after finishing her homework. One afternoon, a pop-up
appeared on the screen:
“FINAL CALL: Free Smartwatch! Click to download the verification app.”
The link looked strange, but Hazel clicked it quickly without checking. A file named “WatchSetup.
exe” downloaded to her phone. She ignored it, assuming it was part of the offer.
What Hazel did not know was that this file was a Trojan Horse. Since, she had skipped system
updates for over a month, the Trojan was secretly able to install spyware. The spyware recorded her
keystrokes and captured her password, H@zel123—a weak password she used for both her social
media and school email.
By evening, her phone slowed down, and she was suddenly logged out of her accounts. Her friends
began receiving urgent fake messages saying:
“Please send `1000! I am stuck outside home and need help.”
They informed Hazel who realised that her digital identity had been misused.
Based on the above case, answer the following questions:
1. Identify the six major cyber mistakes Hazel made. Tick the mistakes she actually committed.
a. Clicking an unfamiliar pop-up link
b. Checking the link carefully before clicking
c. Downloading a suspicious file (“WatchSetup.exe”)
d. Keeping her system updates OFF for a long time
e. Using the same password for multiple accounts
f. Ignoring slow performance and strange behaviour
g. Immediately informing a trusted adult
h. Believing the fake emergency messages
i. Using a weak password (H@zel123)
j. Reporting the issue quickly
2. How did ignoring system updates make her device easier to attack?
3. What clues told Hazel her device was infected?
4. List the steps that Hazel should now take to protect herself.
5. List two cyber safety habits Hazel should follow in the future.
A Modern Necessity 17

