6.2 Online Threats

Understanding Online Threats

In today's digital world, being aware of online threats is crucial for maintaining your security and privacy. This lesson covers the most common types of online threats and how to protect yourself against them.

Why It Matters

Cybercriminals are constantly developing new methods to exploit vulnerabilities. Understanding these threats is the first step in protecting yourself online.

Malware

What is Malware?

Malicious software designed to harm or exploit devices, networks, or services.

Viruses

Self-replicating programs that attach to clean files and spread throughout a computer system.

Ransomware

Encrypts files and demands payment for their release.

Spyware

Secretly monitors and collects user information.

Trojans

Disguised as legitimate software to gain access to systems.

Protection Tips

  • Install reputable antivirus software
  • Keep your operating system and software updated
  • Be cautious with email attachments and downloads
  • Regularly back up important files

Phishing & Social Engineering

What is Phishing?

Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.

Common Phishing Methods

  • Email phishing (fake emails from banks, services, or contacts)
  • Spear phishing (targeted attacks on specific individuals)
  • Vishing (voice phishing via phone calls)
  • Smishing (SMS/text message phishing)

How to Spot Phishing

  • Check the sender's email address carefully
  • Look for poor grammar and spelling mistakes
  • Hover over links to see the actual URL
  • Be wary of urgent or threatening language
  • Verify requests for sensitive information through another channel

Identity Theft

What is Identity Theft?

When someone steals your personal information to commit fraud or other crimes.

Warning Signs

  • Unauthorized transactions on your accounts
  • Bills or statements you don't recognize
  • Debt collection calls for accounts you didn't open
  • Medical bills for services you didn't receive

Protection Measures

  • Use strong, unique passwords for each account
  • Enable two-factor authentication where available
  • Regularly monitor your financial statements
  • Shred documents containing personal information
  • Consider a credit freeze or fraud alert

Cyberbullying

Understanding Cyberbullying

The use of digital communication to bully, harass, or intimidate others.

Forms of Cyberbullying

  • Harassment (sending mean or threatening messages)
  • Denigration (spreading rumors or lies online)
  • Impersonation (pretending to be someone else)
  • Exclusion (intentionally leaving someone out of online groups)
  • Cyberstalking (repeated, intense harassment and denigration)

What to Do

  • Don't respond to the bully
  • Save the evidence (screenshots, messages)
  • Block the bully on social media and messaging apps
  • Report the behavior to the platform or website
  • Talk to a trusted adult, teacher, or authority figure

Knowledge Check

1. Which of the following is a sign of a phishing email?

2. What should you do if you receive a suspicious email asking for your password?