Page 18 - Cyber Safety C-5
P. 18

It’s important to be cautious and aware of the potential dangers when talking to
                  people you don’t know in real life.



                              Online Predators                                          False Identities
                     Posing as friendly to cause                                        Strangers creating fake
                        harm or meet in person                                          profiles to deceive others





                               Privacy Risks                                                Grooming

                          Exploiting personal                                               Building trust over time
                         information shared                                                 to manipulate or harm
                       during conversations




                                      Cyberbullying                                 Online Scams
                             Harassment or bullying                                 Tricking individuals into sharing
                         through online interactions                                personal information or money





                                        “REMEMBER you cannot be sure who you are really talking to
                                             just by looking at the screen name or profile picture.”












                                                                                                    21 st
                                            MATCH THE TERMS TO THEIR DESCRIPTIONS                 Century   #Information Literacy
                                                                                                   Skills


                  Match the items in Column A with their correct descriptions in Column B.
                      Column A                                   Column B

                  1.  Phishing                                i.  Damages or steals data

                  2.  Malware                                 ii.  Your private details (e.g., name, address)
                  3.  Firewall                               iii.  Secure, encrypted website connection

                  4.  HTTPS                                  iv.  Blocks harmful traffic

                  5.  Personal Information                   v.  Fraudulent attempt to steal personal information







                   16   Computer Science - V
   13   14   15   16   17   18   19   20   21   22   23