complicated legal and technical topics and focus just
on the problem and solution. Please take a look, and
if you have access to a computer, test your
knowledge of information security using the
interactive multiple choice quizzes we put together
on the CD. We hope the materials help you learn to
ask yourself the right questions and practice “good
behaviors” as members of internet society.
(From the Foreword)
2.1 Target Audiences
The textbook and CD were distributed for free to
national, prefectural, and municipal universities and
technical colleges. A number of universities are
using the materials as part of information security
training for their students. Some schools have
uploaded the CD contents to their campus servers or
authentication servers so that students have access
from on and off campus. In addition, we continue to
introduce the materials to university instructors at
information security seminars around the country.
2.2 Emphasis on Interactive Learning
It is difficult to teach students about information
security. We need to cater to the needs of kids who
were raised on the internet and video games.
Working with the cooperation of members of the NII
Information Security Measures Policy Team, we
have developed an interactive game to teach the
latest knowledge about internet risk and safety in an
entertaining way.
Following are the sample of the scenarios from the
materials. The dialogue is intended to appeal to
freshmen students.
2.2.1 Beware of Phishing!
Scenario 2: Beware of Phishing!
Keita and Tsubasa are talking at the bus stop. Let’s
listen in.
It sounds like Tsubasa got an email from a credit
card company asking him to re-register his card
number and expiration date as a safety precaution.
The instructions say to click on a link that will take
him to the registration page. Tsubasa thinks
something smells fishy, but at the same time he
wants to make sure his credit card isn’t cancelled.
He asks Keita about it.
2.2.2 Question
What should Tsubasa do?
A: Try entering his card information.
B: Call the phone number listed in the email.
C: Ignore the email.
The right answer is:
C: Ignore the email.
Why is it C?
Banks and credit card companies will never send
you an email asking for your card information or
telling you to enter it online. You can be sure it’s a
scam. If you enter your information on a fake
website, it will probably be sent to fraudsters. That’s
called phishing. You shouldn’t reply to the email
either. Whoever sent it got your email address from
some kind of mass list, and if you reply or click on
link, it is likely that you will be put on yet another
one as a person who is likely to be tricked. The best
policy is to ignore these kinds of emails.
How dangerous is A?
If you send your card information to fraudsters, they
can use it to make purchases that you could be held
responsible for. Some of them even arrange for the
credit card company’s real website to pop up after
you enter your data. They try very hard to keep you
from realizing that you’ve been scammed.
Isn’t B okay too?
The phone number is probably fake, but if it does
connect to the fraudsters, you’ve be giving them
your phone number. In the case of fake bills, you
might be threatened or harassed. If you have
questions, you should call the customer service
number listed on the back of your credit card.
2.2.3 Lecture Part
What should Tsubasa have done?
Always ignore phishing and fake bills. If you
respond, you’ll make yourself prone to more attacks.
Emails can be faked, so don’t carelessly click on
whatever links you see in them. Another good
security measure is to set up your email so that it
doesn’t show HTML.
Thanks to the popularity of online services, a lot of
internet auction and shopping merchants, banks,
credit card companies, and payment agent
companies are falling prey to phishing fraud
schemes. When you access their websites, manually
enter the URL and bookmark it on your computer
for future use instead of following links from the
email you receive. It is also risky to access the links
using search engines since the search results can be
fraudulently manipulated. Even portal sites are prone
to cross-site scripting and can be dangerous.
CSEDU 2010 - 2nd International Conference on Computer Supported Education
432