Please enable JavaScript.
Coggle requires JavaScript to display documents.
Online Safety, spam-phishing-img-02 , How to prevent online predators-…
Online Safety
Online Predators
Online predators are usually people who try to exploit children or teens for sexual or violent purposes. They tend to build up trust with there victim pouncing when they're weak.
They do this by breaking barriers to get closer and closer to the child. To prevent online predators, try and talk to your child about it warning them of the risks.
Identity Theft
Identity theft is when someone pretends to be you online. It usually happens when your personal identity is exposed through hacking. The criminal may make use of this by buying expensive things or doing illegal things online.
Cifas is the UK's leading fraud prevention service, helping to protect individuals and organisations from fraud and financial crime. In the US alone 15 million people experience identity theft every year. This equates to about 4.5% of the popoulation
Phishing
Phishing is when a scammer tricks a victim into giving personal information over the email that they can then use illicitly. They will normally try to get you to click a link to a fake website that is almost identical to the real one.
Victims will fall for this by clicking a link and entering personal detail in hopes they will win a prize. There are many mistakes that a scammer could make that could tell you that it is fake. For instance, a bank would never directly call you or email you asking for your personal information.
Although emails feel like a quick, easy way to contact someone it is really easy for a hacker to confuse you. Spam emails could offer unreal discounts, free money and prizes!
Preventation?
Most email clients offer automatic organisation to a spam (or junk) folder. As your email client may misunderstand some emails as junk you should still look through your junk. To avoid it try to limit signing up to programs that you do not trust.
-
-
Hackers
A black hat hacker is someone who usually starts by trying to exploit security systems. They usually work for a sophisticated criminal agency for a purpose to make money or pleasure. Often none of these are the reasons they hack, they sometimes do it to scare people.
White Hat Hackers use there swift skills, just like a black hat hacker, but they use there skills to pinpoint security issues and report to agencies to prevent black hat hacker organisations from exploiting and abusing systems.
-
Cyber-bullying
Cyber-bullying is bullying or harassment using electronic devices. There is no physical contact between the bully and the victim due to the online nature of the harm. These hostile actions can be very damaging and can effect anyone. It is more common among children as they are granted access to the internet and devices at an age where they're not mature enough.
-
-
Censorship
Censorship is the examination of different forms of media and the suppression of parts considered unacceptable. Media can be deemed unacceptable for numerous purposes including being violent, sexually explicit or using bad language. Censorship is there because there is a lot of material that is not suitable for a certain age group.
-
Skimming
Skimming is a method the scammers use to retrieve information from a victim's card. One way that they can do this is by placing a device over a card reader which will scan the victim's card. A camera is usually mounted to this device which will capture the pin.
It is very important to cover your pin when you enter it. There may also be a device on a pin pad which can detect what your pin is. To avoid ATM skimming try to use cardless transactions, try to cover your pin when entering it and try wiggling the card reader before your transaction.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-