Page 18 - Cyber Safety C-5
P. 18
It’s important to be cautious and aware of the potential dangers when talking to
people you don’t know in real life.
Online Predators False Identities
Posing as friendly to cause Strangers creating fake
harm or meet in person profiles to deceive others
Privacy Risks Grooming
Exploiting personal Building trust over time
information shared to manipulate or harm
during conversations
Cyberbullying Online Scams
Harassment or bullying Tricking individuals into sharing
through online interactions personal information or money
“REMEMBER you cannot be sure who you are really talking to
just by looking at the screen name or profile picture.”
21 st
MATCH THE TERMS TO THEIR DESCRIPTIONS Century #Information Literacy
Skills
Match the items in Column A with their correct descriptions in Column B.
Column A Column B
1. Phishing i. Damages or steals data
2. Malware ii. Your private details (e.g., name, address)
3. Firewall iii. Secure, encrypted website connection
4. HTTPS iv. Blocks harmful traffic
5. Personal Information v. Fraudulent attempt to steal personal information
16 Computer Science - V

