online safety

skimming

identity theft

phishing

cyber bullying

censorship

online predators

atm

special machines

could find unintentional things

seeing things you should not be seeing

things like pornographic material

attacks vulnerable people

finds similarities to befriend victim

keep safe scanning card

camera filming pin

easy to do

reads magnetic strip

old or young

keeps details

can buy alcohol and expensive items in your name

keeps card from victim

bullied online

can affect mental health

report it on various websites (ceop, childline)

malicious code & virus'

hacking

what is hacking

should we be scared

using tech for things it wasnt intended for

black hat hackers

legal hackers

make trains run faster

easy to do

victim calls for help

phisher 'helps' and gets pin

white hackers are legal hackers

we can stop it by having secure and different passwords

software that can be used to cause harm

can use you identity against you

encouraging you to purchase items that you have viewed

pretents to be someone their not

bribes you into meeting them in public

image

click to edit

image

image

image

image

image

image

image

Identity theft occurs when someone uses another's personally identity, like their name, identifying their phone number, or credit card, without their permission, to use their identity against them

Online predators are people who do child sexual abuse that starts on the Internet.

Censorship can be done by the government, private institutions, and other controllers

skimming is a form of fraud where the skimmer can access your bank money and payments

Cyberbullying are also known as online bullying. It has become very common among teenagers

a legal hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.

Malicious code is the word used to describe any code in any part of a software system or script that is used to effects, like the security of a website

image me

phishing is a fraudulent way to obtain someone's information. for example they can identify your name, where you live and passwords/card details

they gather your information

can use to take cash of others

video highlighting aspects on skimming

there are many types of skimming.

-e-skimming, web skimming, digital skimming, online skimming

i chose this link as it gave good, brief and useful points

the information is stored by the skimmer and they can duplicate the credit card and access the account of the victim

this link provides stages and different accounts of cyberbullying. it also gives help if you are a victim of cyber bullying

here are some websites that can provide help if you are affected by cyber bullying