Relacionar Columnas E-Safety and Threat onlineVersión en línea Different types of threats users can face online. por Jonathan Dunsby 1 Black Hat Hacker 2 PHISHING 3 VISHING 4 PERSONAL INFORMATION 5 SPAM 6 DIGITAL CITIZEN 7 Grooming 8 COMMUNICATING ONLINE 9 SCAM 10 PHARMING 11 PASSWORD 12 SMISHING 13 White Hat Hacking 14 Grey Hat Hacker 15 HACKING A trick/lie to fool people into doing something they did not intend to. Adults pretending to be children online in the hope of tricking children to meet them in real life or share images online. Redirects users to fake websites - which look the same as the original in order to steal personal or financial information, such as login details. Allows users to log in to an account with a username - a form of security. Uses hacking skills to identify security vulnerabilities in hardware, software or networks. Use of messaging systems to send multiple unsolicited messages to large numbers of people for the purpose of commercial advertising. Criminals who break into computer networks with malicious intent. They may also release malware that destroys files, steals data. A person who has the skills and knowledge to effectively use the internet and other digital technology, to be responsible in social activities. Uses fake mobile text messages to trick people into downloading malware, sharing sensitive information Use of phone calls to trick individuals into revealing personal information such as bank details. Don't share personal info, don't send photos of yourself, don't accept friend requests from strangers, don't be rude and aggressive. Gains illegal access to a system or network, then suggest to the system administrator that they can be hired to fix the problem for a fee. Address, Name, DOB, Phone Number, Email, Password. Compromising digital devices and networks through unauthorized access to an account or computer system. Sending of fraudulent emails/sms that appear to come from a legitimate and reputable source, usually through email and text messaging. Acting as bait.