Back to: Diploma in Cyber Security and Digital Safety
Module 5: Social Media Safety & Digital Reputation
🎯 Learning Objectives
By the end of this lesson, students should be able to:
- Identify common threats and risks on popular social media platforms.
- Understand how scammers, predators, and bullies operate online.
- Recognize how personal behavior affects safety and reputation.
🌐 1. What Is Social Media?
Social media refers to digital platforms that allow users to create, share, and interact with content and people. Examples include:
- WhatsApp (messaging, voice/video calls)
- Facebook (posts, groups, marketplace)
- Instagram (photos, reels, stories)
- TikTok (short videos, trends)
- X (formerly Twitter) (tweets, threads, hashtags)
These platforms are powerful—but they also come with risks.
⚠️ 2. Common Social Media Threats
| Threat | Description | Example in Zimbabwe |
|---|---|---|
| Phishing scams | Fake messages or links that steal login info or money | “EcoCash promotion” links asking for PIN |
| Impersonation | Fake accounts pretending to be someone else | Celebrities or politicians offering giveaways |
| Oversharing | Posting too much personal info that can be misused | Sharing ID numbers, travel plans, or location |
| Cyberbullying | Harassment, threats, or humiliation online | School WhatsApp groups used to shame peers |
| Grooming & manipulation | Predators building trust to exploit victims | Strangers offering “modeling contracts” |
🔍 3. How These Threats Work
Phishing:
Scammers send messages that look real—often with logos or urgent language. They ask you to click a link, enter your password, or send money.
Impersonation:
Fake profiles copy photos and names to trick followers. They may ask for donations, promote fake businesses, or spread misinformation.
Oversharing:
Even innocent posts can reveal too much. A birthday post might include your full name and birthdate—useful for identity theft.
Cyberbullying:
Hurtful comments, exclusion from groups, or spreading rumors can cause emotional harm and even legal consequences.
Grooming:
Predators may offer gifts, compliments, or opportunities to gain trust—then exploit victims emotionally or sexually.
🧪 4. Case Study: The “Scholarship Scam”
A student receives a Facebook message offering a scholarship. They’re asked to pay a “processing fee” via mobile money. The page looks official—but it’s fake.
Discussion Questions:
- What signs show this is a scam?
- How could the student verify the offer?
- What should they do next?
🛡️ 5. How to Stay Safe
- Think before you click: Don’t open suspicious links or attachments.
- Verify profiles: Look for blue checkmarks or official contact info.
- Limit personal info: Avoid posting your phone number, address, or ID.
- Use privacy settings: Control who sees your posts and stories.
- Report and block: Don’t engage with bullies or scammers—report them.
📝 6. Quick Review Questions
- What is phishing and how does it work?
- Why is oversharing dangerous on social media?
- What are signs that a profile might be fake?
- How can you protect yourself from cyberbullying?
📌 Summary
Social media is a powerful tool—but it’s also a hunting ground for scammers, bullies, and predators. By staying alert, thinking critically, and protecting your personal information, you can enjoy the benefits of social media without falling into its traps.