Online Safety

Online Predators

Identity Theft

Phishing

Hackers

Cyber-bullying

Censorship

Viruses and malicious malware

Skimming

Phishing is when a scammer tricks a victim into giving personal information over the email that they can then use illicitly. They will normally try to get you to click a link to a fake website that is almost identical to the real one.

Victims will fall for this by clicking a link and entering personal detail in hopes they will win a prize. There are many mistakes that a scammer could make that could tell you that it is fake. For instance, a bank would never directly call you or email you asking for your personal information.

Although emails feel like a quick, easy way to contact someone it is really easy for a hacker to confuse you. Spam emails could offer unreal discounts, free money and prizes!

Preventation?


Most email clients offer automatic organisation to a spam (or junk) folder. As your email client may misunderstand some emails as junk you should still look through your junk. To avoid it try to limit signing up to programs that you do not trust.

To avoid phishing try to limit signing up to programs that you do not trust.

spam-phishing-img-02

Skimming is a method the scammers use to retrieve information from a victim's card. One way that they can do this is by placing a device over a card reader which will scan the victim's card. A camera is usually mounted to this device which will capture the pin.

It is very important to cover your pin when you enter it. There may also be a device on a pin pad which can detect what your pin is. To avoid ATM skimming try to use cardless transactions, try to cover your pin when entering it and try wiggling the card reader before your transaction.

Identity theft is when someone pretends to be you online. It usually happens when your personal identity is exposed through hacking. The criminal may make use of this by buying expensive things or doing illegal things online.

Cifas is the UK's leading fraud prevention service, helping to protect individuals and organisations from fraud and financial crime. In the US alone 15 million people experience identity theft every year. This equates to about 4.5% of the popoulation

Censorship is the examination of different forms of media and the suppression of parts considered unacceptable. Media can be deemed unacceptable for numerous purposes including being violent, sexually explicit or using bad language. Censorship is there because there is a lot of material that is not suitable for a certain age group.

Online predators are usually people who try to exploit children or teens for sexual or violent purposes. They tend to build up trust with there victim pouncing when they're weak.

A black hat hacker is someone who usually starts by trying to exploit security systems. They usually work for a sophisticated criminal agency for a purpose to make money or pleasure. Often none of these are the reasons they hack, they sometimes do it to scare people.

White Hat Hackers use there swift skills, just like a black hat hacker, but they use there skills to pinpoint security issues and report to agencies to prevent black hat hacker organisations from exploiting and abusing systems.

Malware is any program with an intent to harm a computer whilst a virus, which is much more dangerous. It starts when you download a corrupt file or an infected application. Then, it self-replicates to spread to other devices on a system

They do this by breaking barriers to get closer and closer to the child. To prevent online predators, try and talk to your child about it warning them of the risks.

Cyber-bullying is bullying or harassment using electronic devices. There is no physical contact between the bully and the victim due to the online nature of the harm. These hostile actions can be very damaging and can effect anyone. It is more common among children as they are granted access to the internet and devices at an age where they're not mature enough.

click to edit

Link

Link

download

download (3)

download (1)

download (2)

download (4)

download (5)

download (3)