Relacionar Columnas E-Safety and Threat onlineVersión en línea Different types of threats users can face online. por Jonathan Dunsby 1 PHISHING 2 PHARMING 3 SPAM 4 White Hat Hacking 5 Grey Hat Hacker 6 VISHING 7 PERSONAL INFORMATION 8 SMISHING 9 Black Hat Hacker 10 HACKING 11 DIGITAL CITIZEN 12 SCAM 13 COMMUNICATING ONLINE 14 Grooming 15 PASSWORD Address, Name, DOB, Phone Number, Email, Password. Allows users to log in to an account with a username - a form of security. Use of phone calls to trick individuals into revealing personal information such as bank details. Don't share personal info, don't send photos of yourself, don't accept friend requests from strangers, don't be rude and aggressive. Gains illegal access to a system or network, then suggest to the system administrator that they can be hired to fix the problem for a fee. Use of messaging systems to send multiple unsolicited messages to large numbers of people for the purpose of commercial advertising. Redirects users to fake websites - which look the same as the original in order to steal personal or financial information, such as login details. Sending of fraudulent emails/sms that appear to come from a legitimate and reputable source, usually through email and text messaging. Acting as bait. A person who has the skills and knowledge to effectively use the internet and other digital technology, to be responsible in social activities. Uses fake mobile text messages to trick people into downloading malware, sharing sensitive information Compromising digital devices and networks through unauthorized access to an account or computer system. Adults pretending to be children online in the hope of tricking children to meet them in real life or share images online. Criminals who break into computer networks with malicious intent. They may also release malware that destroys files, steals data. Uses hacking skills to identify security vulnerabilities in hardware, software or networks. A trick/lie to fool people into doing something they did not intend to.