-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy patholdHtmlCode.html
269 lines (216 loc) · 10.2 KB
/
oldHtmlCode.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Fight for Online Privacy</title>
<link rel="stylesheet" href="Privacy1-1.css">
</head>
<body>
<header>
<h1>Fight-4-Privacy</h1>
<!--What should the "click" be or lead to?-->
<h2>Empowering You to Safeguard Your Digital Rights</h2>
<a href="#" class="cta-button">Get Started</a>
<br />
<br />
<img src="https://blogs.canisius.edu/the-dome/wp-content/uploads/sites/13/2018/10/online-phishing-scam-emails.png" alt="MediaTrustImgPhishing" width="1000" height="500">
</header>
<section id="about">
<hr />
<p>*Don't wait until it's too late.*
<br />
<br />
<br />
<i>Scam: a dishonest plan for making money or getting an advantage, especially one that involves tricking people -Cambridge Dictionary</i>
<br />
<!--Make this list a detailed list of all the differents angles of attack on privacy -->
<!--Link each scam to full on examples for people to educate themselves and so it can help people who may be caught up in a scam currently-->
<hr />
<h3>Types of Scams</h3>
<br />
<br />
<a href="Phishing.html"><strong>Phishing emails:</strong></a> Scammers send deceptive emails that appear to be from legitimate sources, asking recipients to provide sensitive information like login credentials or personal details.
Phishing websites: Fraudulent websites mimic legitimate ones to trick users into entering their personal information.
<br />
<br />
<a href="Nigerian.html"><strong>Nigerian (419) Scams:</strong></a>
Scammers promise large sums of money or other rewards in exchange for a small upfront payment or personal information.
<br />
<br />
<a href="AFF.html"><strong>Advance Fee Fraud:</strong></a>
Victims are asked to pay an upfront fee to access a promised benefit or service, which is never delivered.
<br />
<br />
<a href="TSS.html"><strong>Tech Support Scams:</strong></a>
Scammers pose as tech support agents from well-known companies, claiming that the victim's computer has issues and offering to fix it for a fee.
<br />
<br />
<a href="ShoppingScam.html"><strong>Online Shopping Scams:</strong></a>
Fraudulent online stores offer products at attractive prices but never deliver them or provide fake or low-quality items.
<br />
<br />
<a href="romance.html"><strong>Romance Scams:</strong></a>
Scammers build romantic relationships with victims online, gain their trust, and then request money for various reasons, such as emergencies or travel expenses.
<br />
<br />
<a href="Ponzi.html"><strong>Investment and Ponzi Schemes:</strong></a>
Scammers offer investment opportunities that promise high returns but are actually pyramid schemes or fraudulent investments.
<br />
<br />
<a href="Lottery.html"><strong>Lottery or Prize Scams:</strong></a>
Victims receive notifications of winning a lottery or prize but must pay fees or taxes upfront to claim their winnings.
<br />
<br />
<a href="Job.html"><strong>Job and Employment Scams:</strong></a>
Scammers pose as potential employers and request personal information, payment for background checks, or training fees.
<br />
<br />
<a href="SES.html"><strong>Social Engineering Scams:</strong></a>
Scammers manipulate individuals into revealing sensitive information through phone calls, social engineering, or pretexting.
<br />
<br />
<a href="Ransom.html"><strong>Ransomware Attacks:</strong></a>
Malicious software is used to encrypt a victim's data, and a ransom is demanded in exchange for the decryption key.
<br />
<br />
<a href="419.html"><strong>419 Scams (Inheritance Scams):</strong></a>
Victims receive fake notifications about inheriting a large sum of money but must pay legal fees or taxes to claim the inheritance.
<br />
<br />
<a href="Impersonate.html"><strong>Impersonation Scams:</strong></a>
Scammers impersonate government officials, law enforcement, or utility companies, claiming that the victim owes money and threatening legal action.
<br />
<br />
<a href="Charity.html"><strong>Charity Fraud:</strong></a>
Scammers pose as charitable organizations, seeking donations for fake causes or disasters.
<br />
<br />
<a href="Loan.html"><strong>Loan Scams:</strong></a>
Fake lenders offer loans with attractive terms but require upfront fees or deposits before providing the loan.
<br />
<br />
</p>
</ul>
<strong><p style="color: #140d0b;">It's essential to be cautious and skeptical when interacting online, especially with unfamiliar sources. Always verify the legitimacy of offers, businesses, or individuals before providing personal or financial information. If something seems too good to be true, it often is.</style></strong>
<!-- Add more detailed information for other scams here -->
<br />
<br />
<hr />
<br />
<br />
</p>
</section>
<hr />
<section id="statistics">
<h3>Impactful Statistics:</h3>
</section>
<section>
<!--Make the below list more detailed, this was a brief AI generated list. Currently researching sites-->
<p>
<ul>
<li>2000:</li>
Internet usage was growing rapidly, but privacy concerns were not as prominent.
The focus was more on the spread of viruses, malware, and email spam.
<br />
<br />
<li>2005:</li>
Identity theft and data breaches began to gain more attention.
The need for anti-phishing measures started to emerge.
<br />
<br />
<li>2010:</li>
Social media usage exploded, raising concerns about data privacy.
Major data breaches started to affect millions of users.
<br />
<br />
<li>2015:</li>
Widespread data breaches, like the Ashley Madison hack, emphasized the importance of online security.
Encryption and end-to-end encryption (E2E) for messaging apps became more popular.
<br />
<br />
<li>2020:</li>
The European Union's General Data Protection Regulation (GDPR) came into effect, imposing strict data protection requirements.
Increased awareness of privacy issues due to high-profile cases like the Cambridge Analytica scandal involving Facebook.
<br />
<br />
<li>2023:</li>
The debate over online privacy continues, with increasing concerns about surveillance, data mining, and online tracking.
Emerging technologies like AI and IoT pose new privacy challenges.
Ongoing efforts to strengthen privacy regulations and laws worldwide.
For specific statistics and data regarding online privacy and security for each of these years, you would need to consult relevant research, reports, and studies published by organizations, government agencies, and cybersecurity firms. These sources often compile and analyze data related to data breaches, cyberattacks, identity theft, and privacy breaches over the years.</p>
</ul>
<!--Center header and get a good government image to add in. structure this better-->
<!--don't go all in on making it sound like the government is bad........but stress the importance of knowing the current laws and changes that are going on to see the big picture.-->
<hr />
<h2 class="govern">Let's talk Government</h2>
<ol>
<!--Probably just do links to redirect to good source instead of dumping all this reading material that will just cause the site to be messy-->
<li><a href="PatriotAct.html">USA Patriot Act 2001</a></li>
<ul>
<!--Picture deleted from here-->
</ul>
<li><a href="FOIA.html">Freedom of Information Act (FOIA)</a></li>
<ul>
<!--Picture deleted from here-->
</ul>
<li><a href="ECPA.html">The Electronic Communications Privacy Act</a></li>
<ul>
<!--Picture deleted from here-->
</ul>
<li>The Human Rights Act 1998</li>
<ul></ul>
<li>The Freedom of Information Act 2000</li>
<ul></ul>
<li>Computer Fraud and Abuse Act</li>
<ul></ul>
</ol>
<hr />
</section>
<!--I have not done much with anything below this line, this isn't the biggest priority right now-->
<section id="advocacy">
<div class="cta-banner">
<h3>Act Now for a Safer Online World.</h3>
<a href="#" class="cta-button">Join Us</a>
</div>
<blockquote>
<p> ”Without privacy, there was no point in being an individual.” – Jonathan Franzen.</p>
</blockquote>
</section>
<hr />
<section id="information">
<h2>What We Offer:</h2>
<p>Brief explanation of what your website offers. Use concise, impactful language.</p>
</section>
<section id="resources">
<h2>Key Resources:</h2>
<ul>
<li><a href="#">Online Security Guides</a></li>
<li><a href="#">Privacy Tools</a></li>
<li><a href="#">Relevant Legislation</a></li>
<li><a href="IntelStudies.html">Intelligence Studies</a></li>
</ul>
</section>
<section id="latest-news">
<h2>Latest News:</h2>
<ul>
<li><a href="#">Recent Blog Post 1</a></li>
<li><a href="#">Recent Blog Post 2</a></li>
<li><a href="#">Recent Blog Post 3</a></li>
</ul>
</section>
<footer>
<div id="contact">
<h3>Contact Us:</h3>
<p>Email: <a href="mailto:[email protected]">[email protected]</a></p>
</div>
<div id="social-media">
<h3>Follow Us:</h3>
<a href="#"><img src="facebook-icon.png" alt="Facebook"></a>
<a href="#"><img src="twitter-icon.png" alt="Twitter"></a>
<br />
<br />
</div>
</footer>
</body>
</html>