0% found this document useful (0 votes)
41 views23 pages

C7Q3W2 Dont Fall For Fake Part 2

Uploaded by

Rose Ann Yamco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views23 pages

C7Q3W2 Dont Fall For Fake Part 2

Uploaded by

Rose Ann Yamco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Before you click on a

- Does it look professional?


link or enter your
- Does the site’s URL match the
password in a site... product’s company’s name and
information you’re looking for?
- Are there misspellings?
- Does the URL start with https://
with a green padlock on the left of
it?
- Is the email offering something
too good to be true?
- Does the message sound weird?
Don’t bite that
phishing hook!

g.co/BeInternetAwesome
Goals:
- Learn techniques people use to steal identity
- Review ways to prevent identity theft
- Know to talk to a trusted adult if they think
they’re victim of identity theft
- Recognize the signs of phising attemps
- Be careful about how and with whom they
share personal info
Who are you,
really?

g.co/BeInternetAwesome
Goals:
- Understand that people online may not be who
they say they are
- Be sure the person is who they say they is
before replying
- Ask questions or get help from an adult if its
hard to tell who the person is
How do we verify a
person’s identity
online?
Hereare
Here are tips
tips to to spot
help spotSUS persons!
phishing emails:

1. Is their profile photo suspicious?


Hereare
Here are tips
tips to to spot
help spotSUS persons!
phishing emails:

2. Does their username contain their real


name?
Hereare
Here are tips
tips to to spot
help spotSUS persons!
phishing emails:

3. Do they have a profile bio?


Hereare
Here are tips
tips to to spot
help spotSUS persons!
phishing emails:

4. How long has the account been active?


Does the activity you see line up with your
expectations?
Let’s
Here are spot
tips tothe SUS
help among
spot us…
phishing emails:

Scenario 1
You get a follow request online from a
stranger. “Hey! You seem like a fun person
to hang out with. Letʼs have some fun
together! Can you follow me? — Rob”
Let’s
Here are spot
tips tothe SUS
help among
spot us…
phishing emails:

Scenario 2
You get a text message on your cell phone
from someone you donʼt recognize. “Hey,
this is Corey! Remember me from last
summer?”
Let’s
Here are spot
tips tothe SUS
help among
spot us…
phishing emails:

Scenario 3
You get a message from someone you
donʼt follow. “Hey! Love your posts, youʼre
SO funny! Give me your phone number
and we can talk more!”
Let’s
Here are spot
tips tothe SUS
help among
spot us…
phishing emails:

Scenario 4
You get a chat from someone you don’t
know. “I saw you in the hall today. U R
CUTE! What is your address? I can come
over 2 hang out.”
Let’s
Here are spot
tips tothe SUS
help among
spot us…
phishing emails:

Scenario 5
You receive a message online. “Hey, I just
met your friend Sam! She told me about
you, I want 2 meet u. Where do u live?”
Congratulations!

You are now officially


Internet Alert!
Flexible Learning Task
1. Search Interland in Google
2. Conquer Reality River!
3. After you accomplish it you will receive
a certificate!
4. Upload it to the FLT submission bin.

You might also like