Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

How to protect yourself, your computer, and others on the internet
Part I: Making Good Online Choices
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Internet Online Safety How to have FUN and Stay in Control.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Kimberly Siebott Lynn Yip. Definition  A crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
How It Applies In A Virtual World
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
You. are at risk for the fastest growing crimes crime.
Cyber Safety Jamie Salazar.
Phishing and online fraud What parents need to know.
Protecting Your Assets By Preventing Identity Theft 1.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Protecting Your Assets By Preventing Identity Theft
Internet Safety How to stay safe online.
Mrs. Esman Computer Special
Fraud Protection.
Scams & Schemes Common Sense Media.
Fraud protection.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Lesson 3 Safe Computing.
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Scams and Schemes.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Digital Citizenship Unit 1 * Digital Life * Strategic Searches
Being Aware of What You Share
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Scams and Schemes

Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that scam artists use to access private information, and I can guard against phishing and identity theft. I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that scam artists use to access private information, and I can guard against phishing and identity theft. I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that scam artists use to access private information, and I can guard against phishing and identity theft. I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that scam artists use to access private information, and I can guard against phishing and identity theft. –phishing and identity theft

Warm Up Questions Do you know someone who has been scammed? Do you know someone who has been scammed? –What happened?

Warm Up Questions #2 What is the purpose of a scam? What is the purpose of a scam? What tricks do people use to carry out a scam? What tricks do people use to carry out a scam?

Warm Up Questions #3 Can people get scammed on the Internet? Can people get scammed on the Internet? How? How?

In this lesson you will learn About a variety of online scams, including which kinds of information scammers look for, and how that information can be used. About a variety of online scams, including which kinds of information scammers look for, and how that information can be used. And you will also learn how to protect yourselves against online scams. And you will also learn how to protect yourselves against online scams.

What Is Identity Theft?

Identity Theft A type of crime in which your private information is stolen and used for criminal activity A type of crime in which your private information is stolen and used for criminal activity

You need to understand People who scam others online don’t always have to get money from them directly. People who scam others online don’t always have to get money from them directly. Instead, they use a variety of strategies to trick people into giving out private information. They then use this information to access their bank and credit card accounts or other personal accounts. They can even “re-create” someone’s identity and produce false documents, such as Social Security cards, credit cards, or drivers’ licenses in someone else’s name. Instead, they use a variety of strategies to trick people into giving out private information. They then use this information to access their bank and credit card accounts or other personal accounts. They can even “re-create” someone’s identity and produce false documents, such as Social Security cards, credit cards, or drivers’ licenses in someone else’s name.

Can You Guess? What kinds of private information identity thieves might look for? What kinds of private information identity thieves might look for?

Private Information such as: Full name Full name Date of birth and where you were born Date of birth and where you were born Current and previous addresses and Current and previous addresses and phone numbers phone numbers Driver’s license or passport number Driver’s license or passport number Account numbers and the companies Account numbers and the companies where you hold accounts (e.g., Amazon, PayPal, etc.) where you hold accounts (e.g., Amazon, PayPal, etc.) Passwords Passwords Social Security number Social Security number

Who can tell me what Vulnerable means?

Vulnerable You are in a position that makes it easier for you to be harmed or attacked You are in a position that makes it easier for you to be harmed or attacked

Anyone is Vulnerable Anyone is vulnerable to an online scam. Anyone is vulnerable to an online scam. Although teens might not think they’re at risk, there are a few important reasons why they are vulnerable to identity theft – and why it matters Although teens might not think they’re at risk, there are a few important reasons why they are vulnerable to identity theft – and why it matters

Why Identity thieves look for “clean” Social Security numbers that haven’t yet been used to get credit. Therefore, They target teens and kids, who often have Social Security numbers that have no credit history yet. Identity thieves look for “clean” Social Security numbers that haven’t yet been used to get credit. Therefore, They target teens and kids, who often have Social Security numbers that have no credit history yet. Identity thieves might sell or use these numbers, which would allow someone else to get a credit card or loan and build up debt under your name. Identity thieves might sell or use these numbers, which would allow someone else to get a credit card or loan and build up debt under your name.

Identity Theft can ruin YOU! Being a victim of identity theft can ruin your financial future and your ability to obtain loans and purchase things. For example, it could affect your ability to get a student loan for college or a loan to buy a car. Being a victim of identity theft can ruin your financial future and your ability to obtain loans and purchase things. For example, it could affect your ability to get a student loan for college or a loan to buy a car.

You could put your parents at risk In addition, if you use your parents’ accounts and credit cards online, or fill out forms with your parents’ information, you are sharing information that could potentially put your parents’ identities at risk. In addition, if you use your parents’ accounts and credit cards online, or fill out forms with your parents’ information, you are sharing information that could potentially put your parents’ identities at risk.

Could be time consuming and expensive It can take months, even years, to recover your identity if it’s stolen. Cleaning up such a mess takes a lot of time and energy, and it can also be expensive. It can take months, even years, to recover your identity if it’s stolen. Cleaning up such a mess takes a lot of time and energy, and it can also be expensive.

How do you think identity thieves might try to get your information?

Phishing When people send you phony s, pop- up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information When people send you phony s, pop- up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information

Best way to avoid Phishing The best way to avoid phishing scams is to be skeptical about any online request for personal information. It’s also good to be skeptical of online messages or posts from friends that seem out of character for them, which is a warning sign that your accounts have been hacked. The best way to avoid phishing scams is to be skeptical about any online request for personal information. It’s also good to be skeptical of online messages or posts from friends that seem out of character for them, which is a warning sign that your accounts have been hacked.

Features of Phishing Need to verify account information: Phony s will try to trick you into giving up account information, passwords, or clicking on a phishing link, where you fill out information that identity thieves can collect and use. Usually what they’re asking for doesn’t make sense if you think about it, because they should already have that information! Need to verify account information: Phony s will try to trick you into giving up account information, passwords, or clicking on a phishing link, where you fill out information that identity thieves can collect and use. Usually what they’re asking for doesn’t make sense if you think about it, because they should already have that information!

Features of Phishing Sense of urgency: When the message says you only have a limited time to respond, it is often the sign of a scam Sense of urgency: When the message says you only have a limited time to respond, it is often the sign of a scam

Features of Phishing Spelling errors: Scam s often include spelling and grammatical errors. A real company would not send out messages containing such errors. Spelling errors: Scam s often include spelling and grammatical errors. A real company would not send out messages containing such errors.

Features of Phishing Account is in trouble: Identity thieves try to make you worry that something is wrong with your account, so you will feel you must immediately respond to the to fix it. Account is in trouble: Identity thieves try to make you worry that something is wrong with your account, so you will feel you must immediately respond to the to fix it.

Features of Phishing Link in or attachment: Phishing s often have a link within the or an attachment that you are urged to click on. This link can lead you to a site or form where you (unknowingly) give your information to criminals. You should never respond to or click on links in such s. Instead, go directly to the main website, and from there check your account. Link in or attachment: Phishing s often have a link within the or an attachment that you are urged to click on. This link can lead you to a site or form where you (unknowingly) give your information to criminals. You should never respond to or click on links in such s. Instead, go directly to the main website, and from there check your account.

Features of Phishing Too good to be true: Scam s often offer things that are too good to be true, like the easy chance to win free money or prizes. Too good to be true: Scam s often offer things that are too good to be true, like the easy chance to win free money or prizes.

Features of Phishing Generic greeting: You might see a generic greeting that does not personally address you. Reputable companies send s where they address their customers by name. Generic greeting: You might see a generic greeting that does not personally address you. Reputable companies send s where they address their customers by name.

Spotting Scams Student Handout Mr. Bates will pass out the handouts Mr. Bates will pass out the handouts Remember-phishing s can be very convincing, and some may not contain many of the clues you just learned about. So it’s smart to distrust any that asks you to provide private information. Remember-phishing s can be very convincing, and some may not contain many of the clues you just learned about. So it’s smart to distrust any that asks you to provide private information.

If you ever encounter something online that you believe might be a phishing scam, you should observe the following rules: If you ever encounter something online that you believe might be a phishing scam, you should observe the following rules:

Rule #1 Avoid opening the message or in the first place

Rule #2 Don’t click on any links or download any attachments. They might contain viruses or spyware. Don’t click on any links or download any attachments. They might contain viruses or spyware.

Rule #3 Don’t reply Don’t reply

Rule #4 Mark as “junk mail” or “spam” for your provider, or report it to your social network site. Mark as “junk mail” or “spam” for your provider, or report it to your social network site.

Rule #5 If you are concerned about an account you have with a company, contact its customer service by phone. If you are concerned about an account you have with a company, contact its customer service by phone. Make sure you verify the company’s contact information elsewhere online first. Make sure you verify the company’s contact information elsewhere online first.