Page 72 - Cyber Safety C-8
P. 72

21 st
                                           DECRYPT MESSAGE                                   Century   #Critical Thinking
                                                                                              Skills

                  A secret agent is on a top-secret mission. A partner has sent an encrypted message containing critical
                  instructions. To complete the mission safely, the message must be decoded.
                  To read the message, shift each letter three places backward. Spaces remain unchanged.
                  Decrypt this message to reveal the instructions:
                  L DP JRLQJ WR GHOKL IRU LQYHVWLJDWLRQ







                  How WhatsApp Uses Encryption?

                  When we send a message like “Hi, how are you?” on WhatsApp, it does not travel openly across
                  the Internet. Instead:

                      WhatsApp encrypts the message, turning it into a secret coded form.
                      Even if someone tries to intercept the message, they will only see random letters and numbers.

                      Only friend’s phone has the unique key that can unlock the code and read the actual message.

                  This is why WhatsApp displays the message “Messages are end-to-end encrypted.”
                  It means the chat is protected and can only be read by the sender and the person being messaged.





                          Hello                   Hello                                                Hello




                      PLAIN TEXT               ENCRYPTION              SECURE CHANNEL              DECRYPTION


                   quick


                    Fill in the blanks.

                    1.   Personal data is any information that relates to an             .
                    2.                  save passwords, cookies, browsing history, and autofill details.
                    3.                  platforms allow choosing who can see profiles, posts, and personal information.




                  TIPS TO PROTECT PERSONAL DATA

                  In today’s digital world, personal data is constantly being collected, stored, and shared across
                  different apps and websites. This information includes details like name, phone number, email,
                  location, and even online activities. If not protected properly, it can be misused for scams, identity
                  theft, financial fraud, or privacy invasion.


                   70   Computer Science - VIII
   67   68   69   70   71   72   73   74   75   76   77