Page 8 - Cyber Safety C-5
P. 8
contents
1 Hidden Threats in the Online World ............................................................................. 7
Digital Access Staying Safe in the Digital World
Understanding Hidden Threats Online Scams
Malware and Viruses Interacting with Unknowns on the Internet
Mixed Dangers — When One Risk Leads to Another
2 Phishing: Don't Get Hooked ........................................................................................... 24
Phishing The Process Behind Phishing
Spotting a Phish Actions to Take if Phished
Common Phishing Scams Preventing Phishing Attacks
Test Sheet - 1 ................................................................................................................................. 42
3 App Permissions: Your Digital Gatekeeper ................................................................ 44
App Permissions Common App Permissions
When to Say NO Managing App Permissions
Understanding the Risks of Over-Permission Tips to Stay Safe
4 Passwords and Posts ..................................................................................................... 64
Securing Your Digital World Strong and Weak Passwords
Taking Control of Your Passwords Sharing Posts and Photos Online
Risks of Oversharing Online Think Before You Post
Being a Smart and Responsible Digital Citizen
5 I have Been Hacked! ....................................................................................................... 82
Hacking Common Types of Hacking
A Shield Against Hacking Staying Safe from Hacks
Test Sheet - 2 ................................................................................................................................. 97
Digital Tale ..................................................................................................................................... 99

