Lesson Objective
Participants will recognize when their own or others’ accounts may be compromised and know which steps to take next.
Participants will recognize when their own or others’ accounts may be compromised and know which steps to take next.
Ready?
Begin Lesson
Hacking is unauthorized access to your accounts or devices. There are different methods for hacking, including brute force, phishing and scams, some of which we will discuss in more detail in later modules.
A hacker is someone who uses your personal information for unethical purposes. They might use your personal information to control your devices, create false identities, install malware or ransomware on your devices or share your personal information for their own gain.
Possible Threats
Once a hacker has access to your device or personal accounts and information, they may try to:
Hacking is a security concern for your own accounts as well as the accounts of your friends, family and other people you interact with online. Compromised accounts can cause serious financial consequences, but also can have a negative impact on your online reputation.
This lesson will teach you about warning signs that an account or device has been compromised. You will also learn what steps to take if your account is compromised.
Notice unusual behavior
Your recovery steps will be different depending on whether you can still access your account, which application or device is compromised and a variety of other factors:
1.Contact the account provider:
2.Change passwords and settings
3.Notify others:
Congrats!
You've finished the lesson
Students will learn how to keep their online information more secure by using and maintaining strong passwords. Students will learn about the principles of strong password design and the potential problems of password sharing.
View PageStudents will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View PageStudents will learn what information verification is and why it is important for news consumers to verify the stories they read or view.
View PageStudents will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of a news image or video.
View PageStudents will define what a scrape (a copy from an original) is and explain why this can make the verification process more difficult.
View PageStudents will learn how to keep their online information more secure by using and maintaining strong passwords. Students will learn about the principles of strong password design and the potential problems of password sharing.
View PageStudents will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View PageStudents will learn what information verification is and why it is important for news consumers to verify the stories they read or view.
View PageStudents will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of a news image or video.
View PageStudents will define what a scrape (a copy from an original) is and explain why this can make the verification process more difficult.
View Page