6.2 Online Threats
Understanding Online Threats
In today's digital world, being aware of online threats is crucial for maintaining your security and privacy. This lesson covers the most common types of online threats and how to protect yourself against them.
Why It Matters
Cybercriminals are constantly developing new methods to exploit vulnerabilities. Understanding these threats is the first step in protecting yourself online.
Malware
What is Malware?
Malicious software designed to harm or exploit devices, networks, or services.
Viruses
Self-replicating programs that attach to clean files and spread throughout a computer system.
Ransomware
Encrypts files and demands payment for their release.
Spyware
Secretly monitors and collects user information.
Trojans
Disguised as legitimate software to gain access to systems.
Protection Tips
- Install reputable antivirus software
 - Keep your operating system and software updated
 - Be cautious with email attachments and downloads
 - Regularly back up important files
 
Phishing & Social Engineering
What is Phishing?
Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Common Phishing Methods
- Email phishing (fake emails from banks, services, or contacts)
 - Spear phishing (targeted attacks on specific individuals)
 - Vishing (voice phishing via phone calls)
 - Smishing (SMS/text message phishing)
 
How to Spot Phishing
- Check the sender's email address carefully
 - Look for poor grammar and spelling mistakes
 - Hover over links to see the actual URL
 - Be wary of urgent or threatening language
 - Verify requests for sensitive information through another channel
 
Identity Theft
What is Identity Theft?
When someone steals your personal information to commit fraud or other crimes.
Warning Signs
- Unauthorized transactions on your accounts
 - Bills or statements you don't recognize
 - Debt collection calls for accounts you didn't open
 - Medical bills for services you didn't receive
 
Protection Measures
- Use strong, unique passwords for each account
 - Enable two-factor authentication where available
 - Regularly monitor your financial statements
 - Shred documents containing personal information
 - Consider a credit freeze or fraud alert
 
Cyberbullying
Understanding Cyberbullying
The use of digital communication to bully, harass, or intimidate others.
Forms of Cyberbullying
- Harassment (sending mean or threatening messages)
 - Denigration (spreading rumors or lies online)
 - Impersonation (pretending to be someone else)
 - Exclusion (intentionally leaving someone out of online groups)
 - Cyberstalking (repeated, intense harassment and denigration)
 
What to Do
- Don't respond to the bully
 - Save the evidence (screenshots, messages)
 - Block the bully on social media and messaging apps
 - Report the behavior to the platform or website
 - Talk to a trusted adult, teacher, or authority figure
 
Knowledge Check
1. Which of the following is a sign of a phishing email?
2. What should you do if you receive a suspicious email asking for your password?