{"id":8445,"date":"2025-03-20T21:59:19","date_gmt":"2025-03-20T21:59:19","guid":{"rendered":"https:\/\/www.jagiellonczyklasin.edu.pl\/?p=8445"},"modified":"2025-03-21T10:05:05","modified_gmt":"2025-03-21T10:05:05","slug":"cyber-fraud-i-cyber-security","status":"publish","type":"post","link":"https:\/\/www.jagiellonczyklasin.edu.pl\/?p=8445","title":{"rendered":"CYBER FRAUD i CYBER SECURITY"},"content":{"rendered":"<div dir=\"auto\" style=\"text-align: justify;\"><span style=\"color: #000000;\">Celem zaj\u0119\u0107 z j\u0119zyka angielskiego by\u0142o zapoznanie uczni\u00f3w ze specjalistycznym s\u0142ownictwem zwi\u0105zanym z przest\u0119pczo\u015bci\u0105 internetow\u0105 oraz specyfik\u0105 tych przest\u0119pstw. Uczniowie poznali takie poj\u0119cia jak PHISHING, SCAM, IDENTITY THEFT, DATA LEAK i HACKING oraz byli w stanie kr\u00f3tko je zdefiniowa\u0107. Podczas zaj\u0119\u0107 om\u00f3wiono r\u00f3wnie\u017c mo\u017cliwo\u015bci zachowania bezpiecze\u0144stwa i zapobiegania przest\u0119pstwom internetowym w trakcie aktywno\u015bci sieciowej, a tak\u017ce na tej podstawie uczniowie zaproponowali mo\u017cliwe zachowania w przypadku bycia ofiar\u0105 jednego z omawianych przest\u0119pstw.<\/span><\/div>\n<div dir=\"auto\"><span class=\"html-span xdj266r x11i5rnm xat24cr x1mh8g0r xexx8yu x4uap5 x18d9i69 xkhd6sd x1hl2dhg x16tdsg8 x1vvkbs\"><a class=\"x1i10hfl xjbqb8w x1ejq31n xd10rxx x1sy0etr x17r0tee x972fbf xcfux6l x1qhh985 xm0m39n x9f619 x1ypdohk xt0psk2 xe8uvvx xdj266r x11i5rnm xat24cr x1mh8g0r xexx8yu x4uap5 x18d9i69 xkhd6sd x16tdsg8 x1hl2dhg xggy1nq x1a2a7pz xkrqix3 x1sur9pj x1fey0fg x1s688f\" tabindex=\"0\" role=\"link\" href=\"https:\/\/www.facebook.com\/hashtag\/z%C5%82oteszko%C5%82ynbp?__eep__=6&amp;__cft__[0]=AZVYW3Wlx3QH5zEytG4LuE9V-W1G1ywKCrLF0gRDifW2_7PjzaObbsPMiaUjUI0J5Z1Bc7fbgALaPZHmkeqsVWvB3fdBF0ny-cbaQcvW7hKs3n_v1aVPNJHnqqBhtmMNaZoONNsEAR2Y0H83haYdJRgxDtAP_3jQAiHt5AAMDDBDEa-Pzg1zcwiboRFa_YwPrNs&amp;__tn__=*NK-R\" target=\"_blank\" rel=\"noopener\">#Z\u0142oteSzko\u0142yNBP<\/a><\/span><\/div>\n<div dir=\"auto\"><div class=\"su-custom-gallery su-custom-gallery-title-hover su-lightbox-gallery\"><div class=\"su-custom-gallery-slide\"><a href=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485049739_1091420636124090_3326792705366710244_n.jpg\" title=\"CYBER FRAUD i CYBER SECURITY\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485049739_1091420636124090_3326792705366710244_n-380x380.jpg\" alt=\"CYBER FRAUD i CYBER SECURITY\" width=\"380\" height=\"380\" \/><span class=\"su-custom-gallery-title\">CYBER FRAUD i CYBER SECURITY<\/span><\/a><\/div><div class=\"su-custom-gallery-slide\"><a href=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n.jpg\" title=\"CYBER FRAUD i CYBER SECURITY\"><img decoding=\"async\" src=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n-380x380.jpg\" alt=\"CYBER FRAUD i CYBER SECURITY\" width=\"380\" height=\"380\" \/><span class=\"su-custom-gallery-title\">CYBER FRAUD i CYBER SECURITY<\/span><\/a><\/div><div class=\"su-custom-gallery-slide\"><a href=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485064031_1091420699457417_8027261509210977203_n.jpg\" title=\"CYBER FRAUD i CYBER SECURITY\"><img decoding=\"async\" src=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485064031_1091420699457417_8027261509210977203_n-380x380.jpg\" alt=\"CYBER FRAUD i CYBER SECURITY\" width=\"380\" height=\"380\" \/><span class=\"su-custom-gallery-title\">CYBER FRAUD i CYBER SECURITY<\/span><\/a><\/div><div class=\"su-custom-gallery-slide\"><a href=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485093640_1091420582790762_5929054200656380132_n.jpg\" title=\"CYBER FRAUD i CYBER SECURITY\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485093640_1091420582790762_5929054200656380132_n-380x380.jpg\" alt=\"CYBER FRAUD i CYBER SECURITY\" width=\"380\" height=\"380\" \/><span class=\"su-custom-gallery-title\">CYBER FRAUD i CYBER SECURITY<\/span><\/a><\/div><div class=\"su-custom-gallery-slide\"><a href=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485137076_1091420679457419_5797798903293401699_n.jpg\" title=\"CYBER FRAUD i CYBER SECURITY\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485137076_1091420679457419_5797798903293401699_n-380x380.jpg\" alt=\"CYBER FRAUD i CYBER SECURITY\" width=\"380\" height=\"380\" \/><span class=\"su-custom-gallery-title\">CYBER FRAUD i CYBER SECURITY<\/span><\/a><\/div><div class=\"su-custom-gallery-slide\"><a href=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485138073_1091420659457421_7762108304003747463_n.jpg\" title=\"CYBER FRAUD i CYBER SECURITY\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485138073_1091420659457421_7762108304003747463_n-380x380.jpg\" alt=\"CYBER FRAUD i CYBER SECURITY\" width=\"380\" height=\"380\" \/><span class=\"su-custom-gallery-title\">CYBER FRAUD i CYBER SECURITY<\/span><\/a><\/div><div class=\"su-custom-gallery-slide\"><a href=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485787933_1091420546124099_4112811706665798005_n.jpg\" title=\"CYBER FRAUD i CYBER SECURITY\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485787933_1091420546124099_4112811706665798005_n-380x380.jpg\" alt=\"CYBER FRAUD i CYBER SECURITY\" width=\"380\" height=\"380\" \/><span class=\"su-custom-gallery-title\">CYBER FRAUD i CYBER SECURITY<\/span><\/a><\/div><div class=\"su-clear\"><\/div><\/div><\/div>\n<div dir=\"auto\">\n<p style=\"font-size: 8pt; text-align: right;\">(\u017ar\u00f3d\u0142o:\u00a0 ZSP \u0141asin)<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Celem zaj\u0119\u0107 z j\u0119zyka angielskiego by\u0142o zapoznanie uczni\u00f3w ze specjalistycznym s\u0142ownictwem zwi\u0105zanym z przest\u0119pczo\u015bci\u0105 internetow\u0105 oraz specyfik\u0105 tych przest\u0119pstw. Uczniowie poznali takie poj\u0119cia jak PHISHING, SCAM, IDENTITY THEFT, DATA LEAK i HACKING oraz byli w stanie kr\u00f3tko je zdefiniowa\u0107. Podczas zaj\u0119\u0107 om\u00f3wiono r\u00f3wnie\u017c mo\u017cliwo\u015bci zachowania bezpiecze\u0144stwa i zapobiegania przest\u0119pstwom internetowym w trakcie aktywno\u015bci sieciowej, a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8447,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"footnotes":""},"categories":[96],"tags":[],"blocksy_meta":[],"featured_image_urls":{"full":["https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n.jpg",2048,1536,false],"thumbnail":["https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n-150x150.jpg",150,150,true],"medium":["https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n-300x225.jpg",300,225,true],"medium_large":["https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n-768x576.jpg",768,576,true],"large":["https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n-1024x768.jpg",1024,768,true],"1536x1536":["https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n-1536x1152.jpg",1536,1152,true],"2048x2048":["https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n.jpg",2048,1536,false],"htliser_size_396x360":["https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n-396x360.jpg",396,360,true],"htslider_size_1170x536":["https:\/\/www.jagiellonczyklasin.edu.pl\/wp-content\/uploads\/2025\/03\/485061080_1091420616124092_4813998347168273928_n-1170x536.jpg",1170,536,true]},"post_excerpt_stackable":"<p>Celem zaj\u0119\u0107 z j\u0119zyka angielskiego by\u0142o zapoznanie uczni\u00f3w ze specjalistycznym s\u0142ownictwem zwi\u0105zanym z przest\u0119pczo\u015bci\u0105 internetow\u0105 oraz specyfik\u0105 tych przest\u0119pstw. Uczniowie poznali takie poj\u0119cia jak PHISHING, SCAM, IDENTITY THEFT, DATA LEAK i HACKING oraz byli w stanie kr\u00f3tko je zdefiniowa\u0107. Podczas zaj\u0119\u0107 om\u00f3wiono r\u00f3wnie\u017c mo\u017cliwo\u015bci zachowania bezpiecze\u0144stwa i zapobiegania przest\u0119pstwom internetowym w trakcie aktywno\u015bci sieciowej, a tak\u017ce na tej podstawie uczniowie zaproponowali mo\u017cliwe zachowania w przypadku bycia ofiar\u0105 jednego z omawianych przest\u0119pstw. #Z\u0142oteSzko\u0142yNBP CYBER FRAUD i CYBER SECURITYCYBER FRAUD i CYBER SECURITYCYBER FRAUD i CYBER SECURITYCYBER FRAUD i CYBER SECURITYCYBER FRAUD i CYBER SECURITYCYBER FRAUD i CYBER SECURITYCYBER FRAUD i CYBER&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/www.jagiellonczyklasin.edu.pl\/?cat=96\" rel=\"category\">Aktualno\u015bci<\/a>","author_info":{"name":"admin","url":"https:\/\/www.jagiellonczyklasin.edu.pl\/?author=1"},"comments_num":"0 comments","_links":{"self":[{"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/8445"}],"collection":[{"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8445"}],"version-history":[{"count":2,"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/8445\/revisions"}],"predecessor-version":[{"id":8454,"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/8445\/revisions\/8454"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=\/wp\/v2\/media\/8447"}],"wp:attachment":[{"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8445"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8445"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jagiellonczyklasin.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}