Page 30 - Cyber Safety C-5
P. 30
Email Accounts and Social Media Login Details: Access to your personal
communications and social profiles.
Personal Identification Information (PII): Your name, address and date of
birth, which can be used for identity theft.
The above information can be used to make purchases with your money or obtain
a bank loan in your name. To steal this private information, phishers set a trap.
There are various ways the bait (the trap) can be laid. Here are a few examples:
The Bait (What they send) The Trick (What the messages say)
Fake SMS (Smishing) “Your bank account will be frozen today! Click
this link right now to update your KYC.”
Fake Call (Vishing) (A caller pretends to be from your bank)
“Hello, I am from the bank’s fraud department.
We noticed a suspicious transaction. Please
provide your card number and OTP to stop it!”
Fake WhatsApp Message “Congratulations! You have won a free iPhone!
Click this link and fill in your details to claim
your prize.”
Fake Email “Dear customer, your Amazon/Flipkart order
requires a refund. Click here to verify your
account details.”
21 st
WORD COMPLETION CHALLENGE Century #Information Literacy
Skills
Fill in the missing words using the clues.
1. A phishing message often creates u _ g _ n _ y.
2. A fake call pretending to be a bank is v _ s _ i _ g.
3. Fake SMS asking for details is s _ i _ h _ n g.
4. A fake website may steal your i _ f _ r _ a _ i _ n.
5. Phishing tries to trick people into sharing p _ r _ o _ a l details.
28 Computer Science - V

