Want to create interactive content? It’s easy in Genially!

Get started free

Key activity digital survival guide

Ana Lucia Retes Lapizco

Created on November 14, 2023

Start designing with a free template

Discover more than 1500 professional designs like these:

Akihabara Agenda

Akihabara Content Repository

Correct Concepts

Interactive Scoreboard

Choice Board Flipcards

Semicircle Mind Map

Team Retrospective

Transcript

Digital survivor guide

Camila Peña A01743110
Ana Lucía Retes A01743148
Ximena Mejía A01742988
Alessandra Clouthier A01743253

>

<

Units or contents
Conclusions
Practices / activities

Cyber Scams

What is A cyber Scam?

Online shopping

Scam can be briefly summarized as a dishonest act to trick someone and usually involves money. Cyber scams on the other hand are the same as normal scams but happen online.

This is also a very common scam, they copy logos, designs. Many of these websites use popular brands but they lower the prices and once you buy it you never receive the cloth. Recently they have been using markets from social media and after they “buy” many pieces through their store they close it and disappear.

+ info

Job offers

In this type of scam the scammer sends an unwanted message or email. When you accept and receive your “payment” you get a check. This check says that it’s more than what your work actually pays to you. So the scammer asks for the difference back to finally realize that the check was fake and now you are out of money.

+ info

+ info

>

<

Unis or contents
Conclusions
Practices / activities

Strong Passwords

What is it?

A strong password is a code that is designed to be difficult for hackers and automated tools to get in your account and your data. They are important to prevent unauthorized access by others to your online accounts, identity theft and data breaches.

Characteristics

It is characterized for having at least eight characters which contain a mix of lowercase and uppercase letters, numbers and special characters. It shouldn’t have personal information or be predictable, it is better if you avoid easily guessable information and don’t reuse passwords. Instead of that, make sure that it is longer than eight characters and to update your passwords regularly, maybe consider using a password manager to generate strong passwords and securely store them.

+ info

>

<

Units or contents
Conclusions
Practices / activities

Phishing

TRY TO AVOID THEM!!

DEFINITION OF PHISHING

Phishing is another way of cyber attack. This consists in the reveal of sensitive information and personal data about the victim. This is usually done through text messages, deceptive emails and websites which appear legitimate.

+ info

A FRAUD HAPPENeD BECAUSE OF THIS

+ info

>

<

Digital probelms
Concept/solutions

Identity theft

Identity theft is when someone steals your name and personal information, like your social security number, and uses this information without your permission to do things that damage the person. Having your identity stolen can be really dangerous because the criminal who committed this can open new bank accounts, purchase items, take money from your credit cards, steal your social security number, apply for a loan, etc.

+ info

>

<

Units or contents
Conclusions
Practices / activities

Identity theft Strategies

>

Phishing and email scam

>

Data breaches

>

Social ENGINEERING

>

Credit card skimming

>

Lost wallet

>

Malware and spyware

>

<

Conclusions
Units or contents
Practices / activities

Information Privacy

How to take care of your digital privacy on the Internet

Information privacy is the concrete relation between a person’s collection of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. Some ways in which our privacy is violated is when medical conditions are shared without consent, or banking details are accessed, emails hacked, and even identity stolen.

+ info

Tompkins v. Detroit Airport Case: After a personal injury where the plaintiff sued the airport, the defense asked for a complete copy of the plaintiff’s Facebook account. The court denied the request, indicating that it was too broad and that the defense did “not have a generalized right to rummage at will through information that [the plaintiff had] limited from public view.”

How to take care of your digital privacy on the Internet

+ info

REFERENCES

¿Qué es el phishing? | IBM. (n.d.). https://www.ibm.com/es-es/topics/phishing ¿Qué es la privacidad de los datos? (2023). latam.kaspersky.com. https://latam.kaspersky.com/resource-center/threats/internet-and-individual-privacy-protection# Ahola, M. (2022). The 7 most damaging phishing attacks of all time. Usecure. https://blog.usecure.io/famous-phishing-attacks Choosing and protecting Passwords | CISA. (2009). Cybersecurity and Infrastructure Security Agency CISA. https://www.cisa.gov/news-events/news/choosing-and-protecting-passwords ECC University. (2023). The importance of strong passwords and how to create them. Accredited Online Cyber Security Degree Programs | EC-Council University. https://www.eccu.edu/blog/technology/the-importance-of-strong-secure-passwords/ Jones, C. (2022). The Most Significant Password Breaches Of 2021. Expert Insights. https://expertinsights.com/insights/the-most-significant-password-breaches/ Malwarebytes. (2019). ¿Qué es el phishing? | Cómo protegerse de los ataques de phishing. Malwarebytes. https://es.malwarebytes.com/phishing/ Paxton, K. (n. d.). What is Iden­ti­ty Theft?. Texas attorney general. https://www.texasattorneygeneral.gov/consumer-protection/identity-theft/what-identity-theft#:~:text=Identity%20theft%20happens%20when%20someone,accounts%2C%20or%20obtain%20medical%20services. Rafter, D. (2023), How to help prevent identity theft: 16 security tips. Life Lock. https://lifelock.norton.com/learn/identity-theft-resources/how-to-prevent-identity-theft Use strong passwords. (n. d.). Harvard University Information Security. https://security.harvard.edu/use-strong-passwords Valentine, N. (2023). What Is Identity Theft, and How Does It Happen?. Money. https://money.com/what-is-identity-theft/#:~:text=Financial%20identity%20theft&text=They%20might%20make%20fraudulent%20purchases,financial%20health%20and%20credit%20report. Kaspersky (n.d.) Top online Scams. https://www.kaspersky.com/resource-center/threats/top-scams-how-to-avoid-becoming-a-victim Young Scot (2022) What’s a cyber scam? https://young.scot/get-informed/digiknow-cyber-scams/

Credit card skimming happens when a criminal illegally installs a device on an ATM, store terminal or gas station pump and the device captures your credit card information. The criminal can then use it to make purchases or create a fake credit card to steal your funds.

Criminals can load malware or spyware onto your computer if you click on a malicious link or download a malicious app. Once the spyware or malware is installed on your device, criminals have access to your passwords and other sensitive information they can use to steal your identity.

When you lose your wallet you are having a high risk of getting your belongings and personal information steal. Someone can take your ID and impersonate you, use your credit cards, purchase items, make phone calls to your relatives, etc. It is important if you lose your wallet to inform your bank to avoid any scam.

How to take care of your digital privacy on the Internet:

Check the privacy settings on your networks. Don't use public storage for private information. Avoid tracking. Use messaging apps with end-to-end encryption. Disable lock screen notifications.

How does this happen?

The thief sends an email that appears to be a legitimate communication from a known source, like a bank. The email will request personal information like your passwords, Social Security number or bank account numbers.

To avoid phishing attacks, the users must be conscious of this and apply these practices. Do not open mails that don't look familiar or trustworthy, and also, do not click on links inside a mail except if you know what it is about. To be sure it is about a trust link, look at the URL and check if it starts with HTTPS, that way you would be sure it is a safe website. If you are not sure what it is about, it is better if you enter the webpage manually by writing the link by yourself, but don’t click directly. If you want, you can use a software that gives security to your account and personal data.

Past issues

Something that has been happening with people who reuse their passwords and are easy to know, is that when employees use these kinds of passwords, it is easy for hackers to access sensitive corporate information. In 2021 happened to the rivals of Ticketmaster and DailyQuiz in January, among others.

One case of phishing that may convince you to make this practices happened in 2015, when Ubiquiti Networks lost $39 million dollars to CEO Fraud. This was about a cybercriminal pretending to be a senior executive, he asked an employee of the company to handle an urgent money transfer, but he didn’t pay attention to the link and just dropped the money before knowing that it was a phishing scam.

Social engineering scams use human actions, like impersonation, lying and blackmail, to steal personal information. Someone might call you pretending to be a relative or a government representative and ask for personal information.

What to do if it's too late?

If you ever come across this scam and you accept it. Make sure to tell your bank to secure your account and verify that the check is authentic. And once you receive the message asking for the difference you will realize that you are involved in a scam and do not proceed with the further steps that the scammer tells you.

Sometimes you can ask your bank to give you a refund if you have proof to show to them that you got scammed, sometimes they do give you a refund.

Social engineering scams use human actions, like impersonation, lying and blackmail, to steal personal information. Someone might call you pretending to be a relative or a government representative and ask for personal information.

Warnings

IA warning sign clearly is when you see an article at a price that is too good to be true. Another warning sign is when the seller is asking for electronic payment and immediately. And they often try to sell giveaways or cheap deals.

a criminal gains unauthorized access to sensitive information. Data breaches can occur in business, government, education or healthcare, and often compromise the personal information of many individuals. This can be accidental due to a mistake, but also malicious when a hacker gets security information by hacking.

Cyber scams happen through:

● Doggy emails and websites ● Fake accounts on social media

Cyber scammers usually contact you via email, text, phone calls or social media. They tend to pretend to be someone you trust or you might worry about. Cyber scams increased during the coronavirus pandemic so here are some of the most common types of cyber scams.

What to do if you suffer a case in which your information privacy is violated

Change or update your passwords. Sign up for a two-factor authenticator. Consider identity theft protection services. being affected by a data breach can be alarming, and in the worst-case scenario, it can lead to identity theft and financial complications. But if you know what to expect, and you take a few simple steps to protect yourself and stay vigilant, you can overcome the risks and hassles of a data breach.