Relier Pairs E-Safety and Threat onlineVersion en ligne Different types of threats users can face online. par Jonathan Dunsby 1 PHISHING 2 VISHING 3 Grooming 4 White Hat Hacking 5 SMISHING 6 PHARMING 7 Black Hat Hacker 8 HACKING 9 COMMUNICATING ONLINE 10 PERSONAL INFORMATION 11 PASSWORD 12 DIGITAL CITIZEN 13 SPAM 14 Grey Hat Hacker 15 SCAM Compromising digital devices and networks through unauthorized access to an account or computer system. Don't share personal info, don't send photos of yourself, don't accept friend requests from strangers, don't be rude and aggressive. Uses hacking skills to identify security vulnerabilities in hardware, software or networks. Sending of fraudulent emails/sms that appear to come from a legitimate and reputable source, usually through email and text messaging. Acting as bait. Use of phone calls to trick individuals into revealing personal information such as bank details. Use of messaging systems to send multiple unsolicited messages to large numbers of people for the purpose of commercial advertising. A trick/lie to fool people into doing something they did not intend to. Uses fake mobile text messages to trick people into downloading malware, sharing sensitive information Gains illegal access to a system or network, then suggest to the system administrator that they can be hired to fix the problem for a fee. Redirects users to fake websites - which look the same as the original in order to steal personal or financial information, such as login details. Address, Name, DOB, Phone Number, Email, Password. Adults pretending to be children online in the hope of tricking children to meet them in real life or share images online. Allows users to log in to an account with a username - a form of security. Criminals who break into computer networks with malicious intent. They may also release malware that destroys files, steals data. A person who has the skills and knowledge to effectively use the internet and other digital technology, to be responsible in social activities.