I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.

Slides:



Advertisements
Similar presentations
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Advertisements

Primary Threats to Computer Security
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BY REBECCA HIGGINS Identity Theft. What is Identity Theft? Identity Theft is when someone illegally steals your personal information, usually for personal.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
How can you protect yourself from online identity theft?
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
Now scroll to move on to the next slide. What is e-safety? E-safety is keeping safe when you are online. It means: Not giving out personal information.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
ICT & Crime Introduction. Homework read THREE stories from ict.com/news/news_stories/news_crime.htm & produce a 3-fold leaflet describing/discussing.
Computer crimes.
Phishing and online fraud What parents need to know.
By: Nikki Tucker MARSHALL MIDDLE SCHOOL 7 TH GRADE MR. DRYER.
Scams and Schemes I can… Understand what identity theft is and why it is important to guard against it. Learn to recognize strategies that scam artists.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Mrs. Esman Computer Special
Fraud Protection.
Scams & Schemes Common Sense Media.
Fraud protection.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Lesson 2- Protecting Yourself Online
Scams and Schemes.
Starter What is identity theft?
Ethics Tutorial Assignment#2
Phishing Don’t fall for fake
Digital Citizenship Unit 1 * Digital Life * Strategic Searches
Being Aware of What You Share
Lesson 2- Protecting Yourself Online
Presentation transcript:

I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access private information.  Learn how to guard against phishing and identity theft.  Answer one of the following: 1. Do you know someone who has been scammed? What happened? 2. What is the purpose of a scam? What tricks do people use to carry out a scam? 3. Can people get scammed on the Internet? How?

 Scam-an attempt to trick someone, usually with the intention of stealing money or private information  Identity theft- a type of crime in which your private information is stolen and used for criminal activity Write down kinds of personal information identity thieves look for on the front of this flash card with the definition on the back  Vulnerable-in a position that makes it easier for you to be harmed or attacked  Phishing-when people send you phony s, pop- up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information

 Spotting Scams Student Handout  Complete in pairs (15 working minutes)  Share with another group to compare answers when time is called (4 working minutes)

 Students will create a phishing with at least four of the seven features of a phishing listed in your Spotting Scams Student Handout.  Do not plagiarize the samples from the handout.  Type the in word and save as OnlineScam in your tech folder  Print and turn in to the top of the black box  Due

I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access private information.  Learn how to guard against phishing and identity theft.  List 2 of the 7 features of a phishing .  List two kinds of personal information that identity thieves look for.

 Scams and Schemes Quiz Friday  Vocabulary Quiz Friday  Online Scam paper due 11-15