Matching Pairs E-Safety and Threat onlineOnline version Different types of threats users can face online. by Jonathan Dunsby 1 White Hat Hacking 2 PHARMING 3 SCAM 4 PERSONAL INFORMATION 5 PASSWORD 6 SMISHING 7 Grey Hat Hacker 8 DIGITAL CITIZEN 9 SPAM 10 Black Hat Hacker 11 HACKING 12 VISHING 13 Grooming 14 COMMUNICATING ONLINE 15 PHISHING Adults pretending to be children online in the hope of tricking children to meet them in real life or share images online. Allows users to log in to an account with a username - a form of security. Uses fake mobile text messages to trick people into downloading malware, sharing sensitive information Use of messaging systems to send multiple unsolicited messages to large numbers of people for the purpose of commercial advertising. Uses hacking skills to identify security vulnerabilities in hardware, software or networks. A person who has the skills and knowledge to effectively use the internet and other digital technology, to be responsible in social activities. Criminals who break into computer networks with malicious intent. They may also release malware that destroys files, steals data. Address, Name, DOB, Phone Number, Email, Password. Sending of fraudulent emails/sms that appear to come from a legitimate and reputable source, usually through email and text messaging. Acting as bait. A trick/lie to fool people into doing something they did not intend to. Redirects users to fake websites - which look the same as the original in order to steal personal or financial information, such as login details. Compromising digital devices and networks through unauthorized access to an account or computer system. Gains illegal access to a system or network, then suggest to the system administrator that they can be hired to fix the problem for a fee. Don't share personal info, don't send photos of yourself, don't accept friend requests from strangers, don't be rude and aggressive. Use of phone calls to trick individuals into revealing personal information such as bank details.