1) When personal details are stolen and used to obtain goods or services by deception. Such as open a bank account; obtain credit cards, loans and state benefits; order goods in your name; take over your existing accounts; take out a mobile phone contract; obtain genuine documents, such as passports and driving licences, in your name. a) Unwanted Marketing Spam b) Financial Fraud c) Online Harassment and Cyberbullying d) Identity Theft/Fraud 2) When scammers impersonate a trustworthy source and trick you into revealing sensitive data like passwords, credit card numbers, or personally identifiable information. Attacks often begin with scammers sending a malicious link or attachment via email, social media, or text—possibly triggering a malware download. a) Location tracking b) Reputation Damage c) Identity Theft/Fraud d) Phishing Scams 3) When scammers try to manipulate someone into giving up sensitive information, usually through exploiting human error or taking advantage of trust in digital communications. It works by building false trust, exploiting human error, and using persuasion to gain access to sensitive or confidential information. a) Online Harassment and Cyberbullying b) Location tracking c) Social engineering attacks d) Identity Theft/Fraud 4) The use of information and communication technologies used to repeatedly cause harm to another person. It can involve threats, embarrassment, or humiliation in an online setting. The harassment may target a specific person either by directly contacting them or by disseminating their personal information, causing distress, fear, or anger. a) Identity Theft/Fraud b) Unwanted Marketing Spam c) Phishing Scams d) Online Harassment and Cyberbullying 5) When criminals use one of many geolocation services to send a text message to your phone number. These services allow people to track anyone by paying as little as one dollar! The text message you receive contains a link usually disguised as a joke or a picture of an animal that needs your help. a) Location tracking b) Account takeover (ATO) c) Social engineering attacks d) Online Harassment and Cyberbullying 6) Any unwanted, unsolicited message that appears in any marketing channel. That includes email, social media, text messages, phone calls and direct mail. The recipient did not request them and perceives them as having extremely low value. These messages are mostly advertising, bots, phishing and other scams. a) Unwanted Marketing Spam b) Location tracking c) Identity Theft/Fraud d) Social engineering attacks 7) It occurs when cybercriminals gain access to accounts using stolen credentials, often obtained through data breaches, phishing attacks, or social engineering. The attacker may change login credentials to lock out the original owner. This is a growing cybersecurity threat, leading to significant financial losses for consumers. a) Location tracking b) Online Harassment and Cyberbullying c) Account takeover (ATO) d) Identity Theft/Fraud 8) It involves deceptive tactics aimed at illegally acquiring financial resources or assets. It can take various forms, including:false insurance claims, identity theft, accounting fraud, embezzlement, forgeries, phishing attacks, etc. a) Reputation Damage b) Unwanted Marketing Spam c) Phishing Scams d) Financial Fraud 9) When a company’s public image suffers, often due to negative media, unmet stakeholder expectations, or legal issues. This can stem from product recalls, data breaches, or unethical behavior, leading to public outrage and a loss of trust. It can arise from negative reviews, mismanagement of social media or data breaches. a) Social engineering attacks b) Reputation Damage c) Identity Theft/Fraud d) Location tracking
0%
Going online - What are the Risks?
Share
Share
Share
by
Pecelagneaux
Adult education
Online Safety
Edit Content
Print
Embed
More
Assignments
Leaderboard
Show more
Show less
This leaderboard is currently private. Click
Share
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
Revert Options
Gameshow quiz
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Visual style
Fonts
Subscription required
Options
Switch template
Show all
More formats will appear as you play the activity.
Open results
Copy link
QR code
Delete
Continue editing:
?