online safety
skimming
identity theft
phishing
cyber bullying
censorship
online predators
atm
special machines
could find unintentional things
seeing things you should not be seeing
things like pornographic material
attacks vulnerable people
finds similarities to befriend victim
keep safe scanning card
camera filming pin
easy to do
reads magnetic strip
old or young
keeps details
can buy alcohol and expensive items in your name
keeps card from victim
bullied online
can affect mental health
report it on various websites (ceop, childline)
malicious code & virus'
hacking
what is hacking
should we be scared
using tech for things it wasnt intended for
black hat hackers
legal hackers
make trains run faster
easy to do
victim calls for help
phisher 'helps' and gets pin
white hackers are legal hackers
we can stop it by having secure and different passwords
software that can be used to cause harm
can use you identity against you
encouraging you to purchase items that you have viewed
pretents to be someone their not
bribes you into meeting them in public
click to edit
Identity theft occurs when someone uses another's personally identity, like their name, identifying their phone number, or credit card, without their permission, to use their identity against them
Online predators are people who do child sexual abuse that starts on the Internet.
Censorship can be done by the government, private institutions, and other controllers
skimming is a form of fraud where the skimmer can access your bank money and payments
Cyberbullying are also known as online bullying. It has become very common among teenagers
a legal hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
Malicious code is the word used to describe any code in any part of a software system or script that is used to effects, like the security of a website
me
phishing is a fraudulent way to obtain someone's information. for example they can identify your name, where you live and passwords/card details
they gather your information
can use to take cash of others
video highlighting aspects on skimming
there are many types of skimming.
-e-skimming, web skimming, digital skimming, online skimming
i chose this link as it gave good, brief and useful points
the information is stored by the skimmer and they can duplicate the credit card and access the account of the victim
this link provides stages and different accounts of cyberbullying. it also gives help if you are a victim of cyber bullying
here are some websites that can provide help if you are affected by cyber bullying