{"version":"1.0","provider_name":"Senior Digital Literacy","provider_url":"https:\/\/www.indianatech.edu\/sdl","author_name":"Joel Kuhn","author_url":"https:\/\/www.indianatech.edu\/sdl\/author\/jak05-t\/","title":"Online Safety and Cybersecurity - Senior Digital Literacy","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"DGJ31efWFs\"><a href=\"https:\/\/www.indianatech.edu\/sdl\/online-safety-and-cybersecurity\/\">Online Safety and Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.indianatech.edu\/sdl\/online-safety-and-cybersecurity\/embed\/#?secret=DGJ31efWFs\" width=\"600\" height=\"338\" title=\"&#8220;Online Safety and Cybersecurity&#8221; &#8212; Senior Digital Literacy\" data-secret=\"DGJ31efWFs\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.indianatech.edu\/sdl\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Online Safety and Cybersecurity This module introduces various types of scams and vulnerabilities that you will encounter online, such as phishing emails, insecure passwords, and insecure websites. Lesson Content Recognizing Scams Identifying phishing emails What is a phishing email? Phishing emails will have a sense of urgency, using deadlines or words like \u201curgent\u201d or \u201cact [&hellip;]","thumbnail_url":"https:\/\/www.indianatech.edu\/sdl\/wp-content\/uploads\/sites\/91\/martin-topp.png","thumbnail_width":851,"thumbnail_height":1049}