Page 19 - Cyber Safety C-5
P. 19

It’s important to be cautious and aware of the potential dangers when talking to   MIXED DANGERS — WHEN ONE RISK LEADS TO ANOTHER
 people you don’t know in real life.
                 Online dangers do not always happen one at a time. Sometimes, different risks
                 combine and that is when things can get really tricky. For example:
 Online Predators  False Identities
 Posing as friendly to cause   Strangers creating fake
 harm or meet in person  profiles to deceive others     A stranger may send you a link that looks fun or
                     harmless, like ‘Click here for free game coins!’

                     You  click  it  and  suddenly  a virus enters your
 Privacy Risks  Grooming  device, slowing it down or stealing information.

 Exploiting personal   Building trust over time
 information shared   to manipulate or harm
 during conversations                                       A scammer could  break into  your friend’s
                                                            social  media  or WhatsApp  account  and  send
                                                            fake messages. When someone breaks into a
 Cyberbullying  Online Scams                                computer or account without permission, it is
 Harassment or bullying   Tricking individuals into sharing   called hacking.
 through online interactions  personal information or money



                      A fake contest ad might take you to a website
 “REMEMBER you cannot be sure who you are really talking to   that  secretly  collects your  photos  or location
 just by looking at the screen name or profile picture.”  data.  Later,  that  data  could  be  used  to  send
                     you  more  scam  offers or even guess  your

                     passwords.



                                                            A  pop-up  ad  might appear  on  a  website,
                                                            claiming you've won a prize. You click on it and
 21 st
 MATCH THE TERMS TO THEIR DESCRIPTIONS  Century   #Information Literacy  it  asks for  personal details  like  your address
 Skills
                                                            or bank  information,  which are then used  for

 Match the items in Column A with their correct descriptions in Column B.  fraudulent activities.
    Column A     Column B

 1.  Phishing   i.  Damages or steals data     A fake job offer might  be  sent  to  your email,

 2.  Malware   ii.  Your private details (e.g., name, address)  asking for your CV and other personal details.
                     After you send your information, the scammer
 3.  Firewall   iii.  Secure, encrypted website connection
                     could steal  your identity  or use your data for
 4.  HTTPS   iv.  Blocks harmful traffic  other scams.

 5.  Personal Information   v.  Fraudulent attempt to steal personal information
                 These examples show how one unsafe action online can lead to many more
                 problems. A simple click, download or chat could lead to stolen data.



                                                                                   Hidden Threats in the Online World  17
   14   15   16   17   18   19   20   21   22   23   24