Page 31 - Cyber Safety C-5
P. 31
Email Accounts and Social Media Login Details: Access to your personal
21 st
communications and social profiles. Century #Leadership & Responsibility
Skills
Personal Identification Information (PII): Your name, address and date of A REWARD GONE WRONG
birth, which can be used for identity theft.
Maya enjoys participating in online competitions and frequently receives emails
The above information can be used to make purchases with your money or obtain claiming she has won a prize. One day, she gets an email with a link to claim her
a bank loan in your name. To steal this private information, phishers set a trap. reward. Excited, she clicks on the link, which takes her to a website that looks very
There are various ways the bait (the trap) can be laid. Here are a few examples: similar to the legitimate brand’s site. Without checking carefully, Maya enters her
personal details, including her bank account information, to claim her prize.
The Bait (What they send) The Trick (What the messages say) A few days later, Maya notices unusual activity in her bank account and realises
Fake SMS (Smishing) “Your bank account will be frozen today! Click she’s been scammed. The website she visited was a phishing site designed to steal
this link right now to update your KYC.” her financial details. Maya now understands that phishing scams can be disguised
as legitimate emails and websites. She decides to be more cautious with links in
Fake Call (Vishing) (A caller pretends to be from your bank)
“Hello, I am from the bank’s fraud department. unsolicited emails and always double-checks the authenticity of the site before
We noticed a suspicious transaction. Please entering any sensitive information.
provide your card number and OTP to stop it!” Based on the above case, answer the following questions:
1. What allowed the phishing attack to succeed?
Fake WhatsApp Message “Congratulations! You have won a free iPhone!
Click this link and fill in your details to claim
your prize.”
Fake Email “Dear customer, your Amazon/Flipkart order 2. How can Maya avoid phishing scams in the future?
requires a refund. Click here to verify your
account details.”
21 st
WORD COMPLETION CHALLENGE Century #Information Literacy
Skills
“Every phishing message leaves behind small clues, such as
Fill in the missing words using the clues.
spelling mistakes, strange links or alarming warnings. Let’s
1. A phishing message often creates u _ g _ n _ y. learn to spot these signs and avoid the trap on time!”
2. A fake call pretending to be a bank is v _ s _ i _ g.
3. Fake SMS asking for details is s _ i _ h _ n g.
4. A fake website may steal your i _ f _ r _ a _ i _ n. SPOTTING A PHISH
5. Phishing tries to trick people into sharing p _ r _ o _ a l details. Phishing scams are designed to trick people into sharing personal information, but
there are clear warning signs to watch out for. Knowing how to spot a phishing
attempt is key to staying safe online. If something seems suspicious, take a moment
to check it carefully rather than risk being caught out by a scam.
Phishing: Don't Get Hooked 29

