Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Internet Safety Rockingham County Public Schools
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
How to protect yourself, your computer, and others on the internet
You are responsible for security of your internet banking transactions ONLINE.
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Internet Online Safety How to have FUN and Stay in Control.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
How to stay safe online A guide for students. e-Safety e-Safety relies on selecting appropriate privacy levels, knowing how to behave online and understanding.
Cyber Bullying Grade 3.
What do I need to know?.   Instant Messages  Social Networking.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Internet Safety and Kids Ms. Lee’s Classroom Computers are NOT bad Computers can be used to help kids learn and play. They can be used safely, if parents.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
GUIDANCE LESSON INTERNET SAFETY/NETIQUETTE IF YOU DO NOT WANT IT TO BE TOMORROW’S FRONT PAGE NEWS, DO NOT SEND IT THROUGH TECHNOLOGY!!!
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
U.S. SECRET SERVICE “Worthy of Trust and Confidence” !!! SCAMS !!! $$$ SCAMMER KNOW WHAT TO LOOK FOR.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Information guide.
Reliability & Desirability of Data
Helping Telemarketing Fraud Victims. Fraud victims may feel a range of emotions  Anger and betrayal toward perpetrator  Shame and embarrassment  Guilt.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Safe Use of Social Media Cadets – Air Force’s Future.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Common Scams Lewis Collantine & Clare Cunningham Thurrock Trading Standards 8 th September 2015.
Hertfordshire Trading Standards Scams Susie Helliwell Trading Standards Officer.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
Internet safety By Kyle Allan. Top tip No:10 Don’t give out personal information such as a : Phone numbers and also addresses.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Imagine receiving a real live from Walt Disney, Jr. himself? Hard to believe but enough people actually did to make this Disney hoax a real problem.
Protecting Your Assets By Preventing Identity Theft 1.
Identifying and Avoiding Scams 1. What a scam is Why scams work Types of scams Warning signs of scams Building scam defenses What We’ll Discuss 2.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
REACTION AND ACTION RESPONDING TO FRAUD 1. THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Brighton & Hove Healthy Schools Team E-safety and Cyberbullying Information for Parents and Carers.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Protecting Your Assets By Preventing Identity Theft
Gosbecks E-Safety Guide
Fraud Protection.
Identifying and Avoiding Scams
Fraud protection.
Unit 4 IT Security.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Rules for Being Safe on the Internet for Kids
Presentation transcript:

Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is meant by the term “phishing”; Name the different ways in which these s appear in your inbox; 2

Outline of this module By the end of this module, you will be able to: Understand why people respond to fraudulent s; Know what to do if you think you have received one of these s; and Know who to contact if you have responded to a fraudulent . 2

Important information A copy of this presentation and the accompanying training booklet are available for download at: 4

Meet Beryl and Alan

Getting started… Have you ever received an that you thought might be false? Why didn’t you think it was genuine? 6

What is advanced fee fraud? Essentially, it is an which asks for a small amount of money with the promise of a larger amount of money in the future. Once you send an initial amount, there will always be requests for further money and you will never receive the larger promised amount.

What is advanced fee fraud? There are many ways that these s can appear in your inbox, but no matter what the story, all s will ask for money. Lottery notifications Inheritance notifications Investment opportunities Charity contributions Romance fraud

What is phishing? Essentially, it is an which asks for your personal information. It might be from a bank, telephone service provider or any other agency that you do business with. It might look genuine and seem plausible. It might ask you to reply or provide a link for you to enter your personal details.

Revision questions 10

Revision questions 11

Revision questions 12

How well did you do?

How to protect yourself from fraud There are several strategies which can help you protect yourself from responding to a fraudulent . By following these simple steps, you will greatly reduce the chances of this occurring.

Protecting yourself from fraud 1)Use an filter An filter can automatically delete fraudulent s before they reach your inbox. However, just because an is in your inbox, doesn’t mean it isn’t fraud. 2)Use the delete key Never be afraid to delete an that you are suspicious of. You are not obliged to reply to an , just because it has been sent to you. 15

Protecting yourself from fraud 3)Never reply to an with personal details Fraudulent s will not always be obvious. Talk to someone if you are unsure of an . Don’t feel pressured to respond. 4)Never send money in response to an The situation may seem genuine and you may trust the person, but once you have sent the money there is no way you can get it back. 16

If you think you are a fraud victim There are steps you can take if you think that you may have become a victim of fraud. Don’t panic or ignore it! 1) If you have sent personal details Contact relevant agencies to cancel accounts or change passwords. 17

If you think you are a fraud victim 2)If you have sent money, there are a few things you can do: Contact your bank and see if the transaction can be cancelled. Contact the wire transfer service to see if the transaction can be cancelled. Contact the police to report your loss. You are unlikely to get the money back, but it is important for you to report it. 18

Online fraud victimisation It is hard to understand how a person becomes a victim of this type of fraud. This type of fraud can have devastating consequences for victims, which are more than just financial losses. Most victims feel too embarrassed or ashamed to tell anyone (including police) and don’t get the help and support they need.

Reporting Fraud You can report fraudulent s to the Australian Communications and Media Authority via at: You can report cybercrime to the Australian Cybercrime Online Reporting Network (ACORN): 20

Conclusion is a great way of sharing and communicating with family and friends, however care must be taken when doing this. Not all s you receive will be genuine. By following the steps outlined in this presentation, you should be able to enjoy using your in a safe and confident manner. 21

Revision scenario 22

Revision scenario 23

Revision scenario 24

Revision scenario 25

Revision scenario 26

Questions?

Further information… For more information about other modules in this series: For more information about reporting cybercrime: For more information about online security issues: or For more information about computers and technology: 28