Page 50 - TP_iPlus_V2.1_Class7
P. 50
Cybercriminals may send e-mails from a fake account that can appear to be from a bank or credit
card service provider.
Cybercriminals may also fake their identity and call people pretending to be bank employee to
obtain a user’s banking details.
Types of Online Transaction Frauds
• Identify Theft: Sometimes, cybercriminals deliberately use someone else’s identity to gain
a financial advantage over someone else. Cybercriminals may also pose as someone else to
obtain credit and other benefits in the other person's name.
• Job Frauds: Cybercriminals portray incorrect details as an employer.
• Banking Frauds: Some cybercriminals fraudulently obtain money from users for investment
by posing as a bank or other financial institution.
Never install pirated software on your mobile
or computer. It is not only illegal but may also
compromise the security of your devices.
Avoid making online
Be sure to check for the bank's
transactions using a public Wi-Fi
security certificate details.
or a computer in a cyber cafe.
Some tips to
safeguard from
Regularly update your
online Always check the website
banking passwords and PIN of
transaction URL starts with HTTPS.
the debit/credit cards.
frauds
Never share your bank and card details
such as online account password, card
number, PIN, OTP, etc. with anyone.
#Digital Literacy
Let’s CatCh Up
Define the following:
a. Spamming - _____________________________________________________________________
b. Cyberbullying - _____________________________________________________________________
c. Phishing - _____________________________________________________________________
d. Hacking - _____________________________________________________________________
Individual Right to Privacy
We all know that technology has become an integral part of our life. That’s why the definition
of ”privacy“ has also changed. The Right to Privacy may be defined as the right of individuals
or groups of people to know and decide when, how, and to what extent their information may
be shared with others. Privacy issues arise when information that is collected for one specific
purpose is shared with other companies without informing the authorised owner.
48
iPlus (Ver. 2.1)-VII

