1/30
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Identity Theft
The illegal use of someone else's personal information, typically for financial gain.
Phishing
Scams that attempt to trick individuals into revealing personal information like bank account numbers or passwords.
Smishing
A form of phishing where scammers send text messages pretending to be from legitimate sources to obtain personal information.
Vishing
Scammers calling individuals pretending to be someone else to extract personal information.
Whaling
Scams targeting high-profile individuals to obtain their personal financial information.
Doxing
Releasing personal information about a victim online, often for harassment purposes.
SSL (Secure Sockets Layer)
A data protocol used to secure online transactions and connections.
Equifax, Experian, TransUnion
Major credit bureaus where individuals can order credit reports and report fraud.
Secure Website
Websites with a lock icon and "https://" in the address bar indicate a secure and encrypted connection.
Fraud Recovery Plan
Steps to take if you suspect you have been a victim of identity theft, including reporting to authorities and credit bureaus.
Identity Theft
The act of stealing someone's personal information to commit fraud or other crimes.
Fraud
Deceptive practices that aim to gain something of value through dishonest means.
Protecting Yourself Online
Strategies to safeguard your personal information and finances while using the internet.
Protecting Yourself in Real Life and Out and About
Measures to prevent identity theft and fraud in physical settings outside of the online realm.
Protecting Yourself at Home and on Your Devices
Steps to secure your information and finances within your residence and on electronic devices.
Scam
A fraudulent scheme or deceptive practice designed to trick individuals into giving away their personal information or money.
Ad
An advertisement or promotional message that may sometimes be misleading or deceptive in nature.
Clone Phishing
Resending an email with a malicious attachment or link to deceive recipients.
Credit bureau
A company that collects and stores information about individuals' financial accounts and history to generate credit reports and scores.
Doxing
Releasing personal information about a victim online, such as their address or phone number, as a form of harassment.
Identity theft
Fraudulently using someone else's information for financial gain.
Malware
Software designed to harm or disable computers and computer systems.
Pharming
Redirecting internet users to a fake website to obtain personal financial information.