Site icon Cyber Security & Awareness

Unit 4- Question 1

  1. What are some student-friendly “scam scenarios” that you could use in the classroom for encouraging students to critically think about messages they receive? Create your own “fake scam” to share with the community so they can try and spot the tell-tale signs!

The Internet can be an environment for children to learn, play, explore, but on the other hand, it is completely a dark and dangerous world, full of dangers and attackers targeting children. Unfortunately, children and young people are particularly vulnerable.

From online predators to sensitive social media posts, the harmful effects of the Internet can have serious, costly, even lifelong consequences for your child. Protecting children on the Internet is a matter of clear and far-reaching awareness—knowing what dangers lurk and how to protect them.

Online scams are a sort of cyber assault to prey on helpless web clients. They come in numerous shapes such as emails, content messages, online shopping or social media scams. E-mail and content message tricks frequently endeavor to trap casualties to uncover their individual data. Online shopping scams include deluding somebody into paying for something that they will not get, or giving defective quality reproductions. Social media scammers make fake profiles on social media stages or dating websites to enter wrong connections with the purposeful of deluding individuals, preparing or for money related picks up. Scammers utilize the taking after common approaches to delude young students:

The taking after example shows how to spot a phishing trick from a managing an account content message (SMS). The site gives more assets to assist you to perceive scams.

The phishing test from the OpenDNS (Cisco) could be an asset for students to assess their explanatory aptitudes on identifying tricks.

Another type of online scam is the risk of posting sensitive information on social networks. Some users use social networks but do not know how to protect information when posting on these platforms. As a result, children can post a lot of information as harmless as family outing flights with travel times, ticket codes… Now the bad guys can know the schedule, or even find information about parents.

Exploiting children’s social networking sites, hackers can also capture children’s names, addresses, phone numbers or hobbies and interests. For example, if they know that a child likes a certain toy, a bad guy can impersonate a toy company and send a gift via a link. If clicked, the parent’s computer may be infected with malicious code and be exploited for information or blackmail.

In conclusion, to reduce the risk of online scamming for young learners, parents and teachers should educate children and the elderly about the sense of protecting personal information on the Internet, and cyber fraud. Families can also apply technical prevention measures such as installing a layer of protection from the modem to access the network, creating separate accounts for the elderly and children when sharing computers…

.

Understanding how to protect ourselves from cyber attacks is an essential skill in the digital era. Education and awareness can start as soon as students begin to access digital technologies.  However, there are limitations with humans being solely responsible for monitoring and avoiding cyber attacks, even for those who are cyber security experts. We are faced with the challenge of human error and also the difficulty in monitoring such vast amounts of incoming information. Computer Scientists and Technologists for some time now have been building technology into email platforms that filter out potentially harmful or annoying email. Artificial Intelligence (AI) technology is now being used to enhance this process to protect users and businesses. AI is the ability for machines to mimic human capabilities. In the context of recognising potentially harmful cyber attacks in incoming emails, AI-driven tools can automatically detect features of phishing emails and other ‘spam’. Reading emails for features that we know are representative of common phishing scams, as outlined in the graphic above. AI can also continue to learn and improve on its own. However, these programs designed to protect us are not perfect and still require a level of vigilance from humans! In this video below, Kevin Skapinetz, Strategy Leader at IBM Security explains how they are using AI in cyber security.

If you are interested in learning more about Artificial Intelligence methods and how you can teach it in the classroom, you might like to visit our latest MOOCs on the topic.

Fake News

Fake news (or hoaxes) have existed before the advent of the internet and with the emergence of digital media, fake news has spread quickly, even going viral. Fake news are fictitious stories, deliberately fabricated to deceive readers. Some stories are partially accurate, quoting only a part of a statement to invent a story. Research shows that most people are concerned about the effect that fake news has on them. Distinguishing fake news or sources from legitimate sources needs rational and critical thinking.  These are essential skills to develop in tech-savvy future generations who will be increasingly using technology in their lives and careers.

The following video from Mind Tools provides a guide to spot fake news.

According to a Stanford study, only 25% of high school students were able to identify a legitimate news story when also given fake news. Students also found it challenging to distinguish between real and fake photographs and videos. This resulted in the development of ‘The 5 C’s of Critical Consuming’, which can help people critically analyse news media.
Can AI detect fake news? The following video from the Wall Street Journal discusses how Facebook uses Artificial Intelligence algorithms to detect fake news.

Students use the web to extract information for their schoolwork. While the Internet is a valuable tool for enhancing learning and development, it also comes with potential risks of unreliable content. We have curated some tips to consider when selecting content from the web. Using the CSER Web Evaluation Guide will help students assess the quality and accuracy of the information they find.

Exit mobile version