Page 31 - Cyber Safety C-5
P. 31

Email  Accounts  and  Social  Media Login  Details: Access  to  your personal
                                                                                     21 st
 communications and social profiles.                                                Century   #Leadership & Responsibility
                                                                                     Skills
   Personal Identification  Information  (PII):  Your  name,  address  and  date  of   A REWARD GONE WRONG
 birth, which can be used for identity theft.
                  Maya  enjoys participating  in online competitions  and frequently  receives  emails
 The above information can be used to make purchases with your money or obtain   claiming she has won a prize. One day, she gets an email with a link to claim her
 a bank loan in your name. To steal this private information, phishers set a trap.  reward. Excited, she clicks on the link, which takes her to a website that looks very

 There are various ways the bait (the trap) can be laid. Here are a few examples:  similar to the legitimate brand’s site. Without checking carefully, Maya enters her
                  personal details, including her bank account information, to claim her prize.
 The Bait (What they send)  The Trick (What the messages say)  A few days later, Maya notices unusual activity in her bank account and realises


 Fake SMS (Smishing)  “Your bank account will be frozen today! Click   she’s been scammed. The website she visited was a phishing site designed to steal
 this link right now to update your KYC.”  her financial details. Maya now understands that phishing scams can be disguised
                  as legitimate emails and websites. She decides to be more cautious with links in
 Fake Call (Vishing)  (A caller  pretends  to  be  from your  bank)
 “Hello, I am from the bank’s fraud department.   unsolicited  emails  and  always  double-checks  the  authenticity  of  the  site  before
 We  noticed  a  suspicious  transaction.  Please   entering any sensitive information.

 provide your card number and OTP to stop it!”  Based on the above case, answer the following questions:
                  1.  What allowed the phishing attack to succeed?
 Fake WhatsApp Message  “Congratulations! You have won a free iPhone!
 Click this link and fill in your details to claim
 your prize.”

 Fake Email  “Dear  customer, your  Amazon/Flipkart  order   2.  How can Maya avoid phishing scams in the future?

 requires  a refund. Click  here to  verify your
 account details.”





 21 st
 WORD COMPLETION CHALLENGE  Century   #Information Literacy
 Skills
                                       “Every phishing message leaves behind small clues, such as
 Fill in the missing words using the clues.
                                        spelling mistakes, strange links or alarming warnings. Let’s
 1.  A phishing message often creates u _ g _ n _ y.  learn to spot these signs and avoid the trap on time!”

 2.  A fake call pretending to be a bank is v _ s _ i _ g.

 3.  Fake SMS asking for details is s _ i _ h _ n g.

 4.  A fake website may steal your i _ f _ r _ a _ i _ n.  SPOTTING A PHISH

 5.  Phishing tries to trick people into sharing p _ r _ o _ a l details.  Phishing scams are designed to trick people into sharing personal information, but
                 there are clear warning signs to watch out for. Knowing how to spot a phishing

                 attempt is key to staying safe online. If something seems suspicious, take a moment
                 to check it carefully rather than risk being caught out by a scam.


                                                                                         Phishing: Don't Get Hooked  29
   26   27   28   29   30   31   32   33   34   35   36