hoax-spam+etc

Digital Literacy Day# || Phishing, Vishing, SMS, Hoax, Scam, virus, identity theft, malware, pharming, Trojan Horse, Spyware, Puddle Attack Spear Phishing, || [|vmyths.com] [|Hoaxbusters] [|urbanlegends.com] [|Trend Micro Hoax Library] [|Snopes rumors, hoaxes, etc] [|HoaxSlayer.com] [|www.truthorfiction.com] || Write a phishing email for your teacher and send it to his gaggle account. ||
 * = **LFS Lesson Plan**
 * **Unit EQ: Why should you use computers responsibly?** ||
 * **LEQ: How do people misuse the internet to steal money and information from you?** ||
 * **Activating Strategies:** ||
 * **Acceleration/Previewing/Vocabulary:**
 * **Teaching Strategies and Distributed Guided Practice/Summarizing Prompts:**
 * Phishing,** Tricking someone into giving up private data by masquerading as an authority. Usually involves a spoof website that tricks you into believing you are on a real web site for the business you think you are dealing with.
 * Vishing,** Using VOIP (robocalls) to phish over the phone system.
 * SMishing,** using test messaging to phish.
 * Hoax**,is a deliberate attempt to dupe, deceive or trick an audience into believing, or accepting, that something is real
 * Scam,** A fraudulent business scheme; a swindle. Often involves false business claims or advertising
 * Virus,** computer program that can copy itself and infect a computer without the permission or knowledge of the owner
 * Identity theft** fraud that involves someone pretending to be someone else in order to steal money or get other benefits.
 * Malware** software such as a virus, worm, trojan horse, or spyware that is installed on a system with harmful or malicious intent.
 * Pharming,** is a hacker's attack aiming to redirect a website's traffic to another, bogus website.
 * Trojan Horse,** Trojan horse is a program that appears harmless but has a hidden agenda.
 * Spyware,** is computer software that is installed surreptitiously on a personal computer to collect information about a user,
 * Puddle Attack** A phishing attack targeting the clients of a small financial institution, typically with very limited geographical coverage
 * Spear Phishing,** the attacker infers or manipulates the context of his intended victim, and then "personalizes" his attack. ||
 * **Summarizing Strategies:**
 * **Homework:**