Intro To Computers 100 Point Learning Contract
Computer and Internet Security and Safety
Answer the questions in the handout by reading the linked articles

Recognize Phishing and Fradulent Emails - Microsoft.com What To Do If You've Responded to a Phishing Scam - Microsoft.com How to Choose Good Passwords - Carnegie-Mellon School of Computer Science Social Networking Sites: Safety Tips for Tweens and Teens - FTC.gov
  • What is phishing?
  • What is a con artist?
  • What kinds of personal information are con artists trying to get when they do a phishing scam?
  • What kind of companies do the con artists usually pretend to be?
  • Why is the phrase “verify your account” a sign that you are being “phished”?
  • Why is the phrase “If you don’t respond within 48 hours” a sign that you are being “phished”?
  • Why is the phrase “Dear Valued Customer” a sign that you are being “phished”?
  • Why is the phrase “Click the link below to gain access to your account” a sign that you are being “phished”?
  • What is a masked link?
  • How can you tell if a link is “masked”?
  • In Step 1, what are the 3 authorities Microsoft suggests you contact if you find out you’ve responded to a phishing scam?
  • What is Step 2?
  • What is Step 3?

 

Using the suggestions in What Not To Do When Choosing a Password, make up 6 examples of passwords that are easy to guess.

Using the suggestions in Best Method for Choosing Passwords, make up 6 examples of passwords that would be hard to guess, but not too hard to remember.

List the 10 suggestions from this article
Download handout for Internet Safety Articles