Media education: from passive consumers to active creators

Slides:



Advertisements
Similar presentations
Avoid Identity Theft TCU Technology Resources
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Checking Account Debit Card Safety Tips card-safety-10-tips.htm October.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Scams & Schemes Common Sense Media.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
LIBS100 Etiquette and Hoaxes May 16, 2005 L. Galloway.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Consumer Protection Shop Safely and Guard Your Financial Information.
A Matter of Your Personal Security Phishing Revised 11/30/15.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Jeff loses his identity! Lesson 5: Identity Theft.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
The Quiz Game Students from Italy 2 nd High School Of Ioannina Greece nd year, 9-14/3/2015, Ioannina, Greece This project has been funded with.
Internet Safety.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
Fraud Protection.
Scams & Schemes Common Sense Media.
Fraud protection.
Learn how to protect yourself against common attacks
Personal spaces.
How to use the internet safely and How to protect my personal data?
Protecting Your Identity:
Lesson 3 Safe Computing.
Insert Institutional your logo here
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Protecting Yourself from Fraud including Identity Theft
Protecting Senior Citizens from Phishing s
Phishing Don’t fall for fake
Protecting Yourself from Fraud including Identity Theft
Bethesda Cybersecurity Club
Lesson 2: Epic Security Considerations
What is Phishing? Pronounced “Fishing”
Protecting Yourself from Fraud including Identity Theft
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Media education: from passive consumers to active creators PHISHING ALERT Media education: from passive consumers to active creators PHISHING ALERT Lucia Siliprandi, Italy Lesson Plan attached #2

Media education: from passive consumers to active creators What is phishing? Phishing is an online scam that appears to be from a trusted source. It is carried out in order to steal usernames, passwords, credit card informatiom, and any other sensitive data

Media education: from passive consumers to active creators Why is understanding the risk of Phishing important? Phishing attacks are becoming increasingly sophisticated. Your “privacy” and personal information may be seriously compromised

Media education: from passive consumers to active creators How can you avoid a Phishing scam? Never give out any personal information in the emails. Banks, institutions or otherwise will ever ask you for this information via email.

Media education: from passive consumers to active creators What happens if you click a phishing scam link? You may compromise your computer, your account and even your personal data

Media education: from passive consumers to active creators What happens if your computer was compromised? Your computer has to be cleaned and restored to the pre-link clicking

Media education: from passive consumers to active creators What should you do if you receive a probable phishing scam email? If you receive an email you are not sure about, do not reply If the URL does not match the text of the link do not click it

Media education: from passive consumers to active creators What if your personal email account, bank account or any other account were compromised? Change immediately your passwords for any potentially compromised accounts

Media education: from passive consumers to active creators Contact your bank or any other institution to inform them that your accounts may be compromised Ask your bank or any other institution to put a fraud alert on your accounts Check regularly your bank statements and credit reports in order to identify any false charge or suspicious activity

Media education: from passive consumers to active creators How can you avoid certain consequences of your social networking? Do not post anything on your personal blog or any social networking site that could reveal your personal data

Media education: from passive consumers to active creators Consider to use a fakename if you plan to post anything on line Open a free email account to use specifically for social networking

Media education: from passive consumers to active creators Sources Generation Safe www.ikeepsafe.org//generation-safe/ Western Michigan University https://wmich.edu/phishing/phising-facts Berkeley University https://security.berkeley.edu/faqs/phishing

This project has been funded with support from the European Commission. This communication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.