Unit 4 – Question 1


“Scam scenarios” that could use in the classroom for encouraging students to critically think about messages they receive and then they can create “fake scam” such as fake websites, email or text messages to share with the community so they can try and spot the tell-tale signs

“Scam scenarios”: Bank SMS

– Scammers can make messages look real. Even if you’ve previously received legitimate SMS messages from the same number, don’t assume all following messages are real. Scammers can ‘spoof’ real phone numbers or email addresses, to make it appear that they come from your actual bank or another legitimate contact.

– It’s different in style from the first SMS. The previous SMS is legitimate and it provides information only. It tells you to log into your account but provides no links that could lead to potentially malicious websites.

– It has a malicious link. The new SMS contains a link to a phishing website. These types of websites attempt to trick you into giving out personal information such as your bank account details, passwords, and credit card numbers.

– It has a sense of urgency. Scams often try to create a sense of urgency. Don’t rush – take the time to think about what the message is telling you to do and consider whether it’s real.

“Scam scenarios”: Social media.

– The scammers, after capturing their social network account, will use that account to send messages to their friends or relatives to ask to borrow money. Many people, believing it to be their real friends and relatives, and send money to these accounts and lost the money.

– After my students encounters a phishing application, personal information is stolen, including sensitive information such as credit cards, personal pictures, … and may even have their accounts taken over.

Another type of scam often appears in the form of comments with links under posts in groups. Students clicked out of curiosity, leading to their Facebook account and personal information being appropriated. Not to mention that link also comes with a request to install software such as Flash Player, which if the victim installs it on the computer, it will control the whole computer, lose important information and documents stored on the computer.

This activity helps students be aware and protect themselves by limiting sharing of personal information online.

+ There are no comments

Add yours