Page 19 - Cyber Safety C-5
P. 19
It’s important to be cautious and aware of the potential dangers when talking to MIXED DANGERS — WHEN ONE RISK LEADS TO ANOTHER
people you don’t know in real life.
Online dangers do not always happen one at a time. Sometimes, different risks
combine and that is when things can get really tricky. For example:
Online Predators False Identities
Posing as friendly to cause Strangers creating fake
harm or meet in person profiles to deceive others A stranger may send you a link that looks fun or
harmless, like ‘Click here for free game coins!’
You click it and suddenly a virus enters your
Privacy Risks Grooming device, slowing it down or stealing information.
Exploiting personal Building trust over time
information shared to manipulate or harm
during conversations A scammer could break into your friend’s
social media or WhatsApp account and send
fake messages. When someone breaks into a
Cyberbullying Online Scams computer or account without permission, it is
Harassment or bullying Tricking individuals into sharing called hacking.
through online interactions personal information or money
A fake contest ad might take you to a website
“REMEMBER you cannot be sure who you are really talking to that secretly collects your photos or location
just by looking at the screen name or profile picture.” data. Later, that data could be used to send
you more scam offers or even guess your
passwords.
A pop-up ad might appear on a website,
claiming you've won a prize. You click on it and
21 st
MATCH THE TERMS TO THEIR DESCRIPTIONS Century #Information Literacy it asks for personal details like your address
Skills
or bank information, which are then used for
Match the items in Column A with their correct descriptions in Column B. fraudulent activities.
Column A Column B
1. Phishing i. Damages or steals data A fake job offer might be sent to your email,
2. Malware ii. Your private details (e.g., name, address) asking for your CV and other personal details.
After you send your information, the scammer
3. Firewall iii. Secure, encrypted website connection
could steal your identity or use your data for
4. HTTPS iv. Blocks harmful traffic other scams.
5. Personal Information v. Fraudulent attempt to steal personal information
These examples show how one unsafe action online can lead to many more
problems. A simple click, download or chat could lead to stolen data.
Hidden Threats in the Online World 17

