Want to make creations as awesome as this one?

Transcript

Don't Feed the Phish

Internet scams are part of being online today, but many kids might not be aware of them. In this activity you will learn how to compare and contrast identity theft with other kinds of theft, describe different ways that identity theft can occur online, and use message clues to identify examples of phishing. Can you escape the scam?

GO!

Your Challenge

Collect all the numbers by completing each of the challenges, and enter them in order in the final section to escape the scam!

Introduction

Reward

01 Quiz

02 Find!

03 Correct image

04 Follow the series

BACK TO INDEX

INTRODUCTION

Key Vocabulary

  1. Identity theft - A type of crime in which your private information is stolen and used for criminal activity
  2. Private information - Information that can be used to identify you because it is unique to you (e.g., your full name or your address)
  3. Internet scam - An attempt to trick someone online, usually with the intention of stealing money or private information
  4. Phishing - When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information

Thieves use others' information to...

start

QUIZ

Complete the following quiz, and getthe first number towards beating the scam!

QUIZ

question 1/5

Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is also asked to enter his nickname, the names of any pets, and his mom's maiden name. Should he do it?

DO IT. The questions are silly, but it's worth it to win $10,000!

DON'T! Identity thieves use such "clues" to figure out people's passwords.

next

RIGHT!

QUIZ

Explanation:Correct! Never give out personal information.

question 2/5

Lew gets a notice from Apple. Because of new security rules, he must submit his Social Security number (SSN) immediately or he'll lose all his photos. He knows where Mom keeps the SSN card. Should he do it?

DON'T! Real companies don't do this. Thieves use such information to create false identities.

DO IT. It's an official notice from a company, and if he waits, he could lose everything.

QUIZ

NEXT

RIGHT!

QUIZ

Explanation:Companies will never ask for this type of information. If you want to double check, email the company's Customer Service.

QUESTION 3/5

Dana sees $200 wireless headphones on sale for just $5! She doesn't recognize the website. It only takes credit cards, not PayPal, and it asks for more detail than most sites do. She could use the credit card her parents gave her for emergencies. Should she do it?

DON'T! Identity thieves can charge people's accounts for fake sales. Ask Mom or Dad first.

DO IT. So long as she pays her parents back right away, it should be all right.

QUIZ

NEXT

RIGHT!

QUIZ

Explanation:If you think you may be getting scammed, always check in with an adult.

QUESTION 4/5

What is phishing?

the sport or business of catching fish

A technique for attempting to acquire sensitive data

QUIZ

NEXT

RIGHT!

QUIZ

Explanation:Phishing is when someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information.

QUESTION 5/5

Which of the following is a common tactic used in phishing attacks to deceive individuals?

Requesting individuals to update their passwords through secure authentication processes.

Sending official-looking emails that contain malicious links or attachments.

Providing accurate and trustworthy information in online messages.

QUIZ

NEXT

RIGHT!

QUIZ

Explanation:You have learned a lot about phishing!Well done.

Wrong!Go back and try again.Read the options carefully.

ERROR!

TRY AGAIN

QUIZ

FIND!

Use the spotlight to find the correct answer and the next number.

  • Sense of urgency: When the sender says you only have a limited time to respond.
  • Spelling and grammar errors: A real company does not send out messages with such errors.
  • Alert! Alert!: The message sounds urgent, making you worry that something is wrong with
  • your account.
  • "Friend" in trouble: You see a photo of someone you know, but the message isn't really
  • from them.
  • Shortened URL: A web address that has been condensed and that could mislead a user into going into a risky website.
  • Too good to be true: Identity thieves often offer easy chances to win free money or prizes.
  • Generic or missing greeting: Real companies send messages that address customers by name.

Phishing Clues

START

CLICK on the message that seems most legitmate (not a scam). 1/3

You can drag the light to search through the darkness

Do Good. Feel Good.We will award every one of your contacts with a free pizza if you donate $1 to the world peace fun.

CONGRATULATIONS!You maybe win VIP pass to season finale of "America's Star."Click here!

Hi Snpchat Fan,We recently updated our login site. Please re-enter your password here. Then click Ver.fi.ed link to submit.

Hey! Sorry that you are sick for our play. Bummer! You can watch the livestream: https://livestream.com/accounts/13786002/events/11021271

CLICK ON THE INCORRECT STATEMENT.2/3

You can drag the light to search through the darkness

Phishing attacks often involve the use of deceptive emails that appear to be from trusted sources.

Phishers often make spelling and grammar mistakes in their emails.

Phishing attacks only occur through personal email communication.

Often phishing attempts are too good to be true.

RIGHT!

CLICK on the message that seems most legitmate (not a scam).3/3

You can drag the light to search through the darkness

World's oddest pet!Click here and retweet: wwzw.LookNow

AweSome Video Games award the first 200 subscribers free game. Click here.

Canva: new designs have landed. Access your account.

you got cash!This is to inform you that you The Bank of US has a gift from your relative. Click here to redeem.

RIGHT!

ERROR!

Wrong!Try again.

TRY AGAIN

CORRECT IMAGE

Choose the correct image to reveal the next number.

start

Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.

RIGHT!

Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.

RIGHT!

Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.

RIGHT!

Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.

RIGHT!

Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.

ERROR!

TRY AGAIN

START

Stay Alert and Clever!

Test your wit and choose the correct shape in the series.

WHAT SHAPE GOES NEXT?

Choose the correct shape:

?

Option 01

Option 02

Option 03

Option 04

Option 05

Option 06

WHAT SHAPE GOES NEXT?

Choose the correct shape:

?

Option 01

Option 02

Option 03

Option 04

Option 05

Option 06

RIGHT!

WHAT SHAPE GOES NEXT?

RIGHT!

Choose the correct shape:

?

Option 01

Option 02

Option 03

Option 04

Option 05

Option 06

ERROR!

Wrong!Keep trying! You got this.

ERROR!

TRY AGAIN

7

GREAT!

THE FIRST NUMBER IS:

BACK TO INDEX

0

GREAT!

THE SECOND NUMBER IS:

BACK TO INDEX

9

GREAT!

THE THIRD NUMBER IS:

BACK TO INDEX

2

GREAT!

THE FOURTH NUMBER IS:

BACK TO INDEX

ENTER THE Verification CODE

Congratulations!

You now know how to keep yourself safe from phishers and scammers. Stay alert! And, always ask for help.