Internet Fraud By Brianna Byard. What is it? The Internet is a place where you can buy products, meet people, and socialize. But it is very easy for people.

Slides:



Advertisements
Similar presentations
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Advertisements

1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Identity Theft Both Offline And Online It’s Not New Just Easier…
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Kimberly Siebott Lynn Yip. Definition  A crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person.
Internet Fraud By: Noelle Woodman.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By: Shanna. Explanation of Fraud Internet fraud is a crime in which a person develops a way to invade your privacy by retrieving your personal.
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Online Shopping Take Charge of Your Finances
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
Buying and Selling Items on eBay and Craig’s List Computer and Technology Group May 15, 2008.
Protecting Your Identity While Attending College.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Trust in Cyberspace Unit 10-1 Managing the Digital Enterprise By Professor Michael Rappa.
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
Internet Crimes Jennifer Hardy Meosha Johnson Joe London.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Copyright 2008 Joel Just1 How to Earn Extra Income through BigCrumbsBigCrumbs eBay Buyers and Sellers can benefit! Copyright 2008 Joel Just All rights.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Advance Fee Fraud Reporting Portal Report Presentation (January 2013 – June 2014) Compiled by Griffith University Student Lucy Farrell using AFF Portal.
ONLINE AUCTION SITES – SHOULD YOU TRUST THEM? BY: CIARA KROEKER ITGS.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
ONLINE SHOPPING. Refers to buying and selling of goods and services using websites accessed through the internet physical goods such as clothes and books.
Protecting Your Assets By Preventing Identity Theft 1.
What is Mystery Shopping? Getting paid to shop! Some retailers hire marketing companies –Make a purchase –Evaluate the quality of service –Report on the.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Carly and Scott are targets Lesson 6: Scams Targeting Students.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Paypal PayPal is an e-commerce business allowing payments and money transfers to be made through the Internet. With a PayPal account, you can send and.
Protecting Your Assets By Preventing Identity Theft
Computer Security Fundamentals
Fraud Protection.
Scams & Schemes Common Sense Media.
Fraud protection.
Moneygram Clone, western-union Clone,moneygram script.
Internet Fraud By (NAMES).
What this activity will show you
Presentation transcript:

Internet Fraud By Brianna Byard

What is it? The Internet is a place where you can buy products, meet people, and socialize. But it is very easy for people to pretend to be someone else/ be anonymous. So it is very easy to be scammed. There are many emerging Internet Frauds, but it can be hard to spot them when it’s over the computer. It is when someone uses scams, using elements of the Internet to deprive someone of property or any interest.

Types of Internet Fraud  Auction Fraud  Identity Theft  Advanced Free Fraud  Credit Card Fraud  Non-delivery of purchased items

Current Scams Auction Scam: It is when products are misrepresented on auction sites ( i.e. Ebay, Amazon) and/or the products are not delivered to the buyer from the website. Signs of Auction Fraud:  The seller posts the auction as if he resides in the United States, then responds to victims with a congratulatory stating he is outside the United States for business reasons, family emergency, etc. Similarly, beware of sellers who post the auction under one name, and ask for the funds to be transferred to another individual.  The subject requests funds to be wired directly to him/her via Western Union, MoneyGram, or bank-to-bank wire transfer. By using these services, the money is virtually unrecoverable with no recourse for the victim. Credit Card Scam: When somebody uses an invalid credit card to make purchases. The card numbers can be obtained from unsecured websites or even a identity theft cases.

Tips for Avoiding Internet Fraud Some tips are:  Not give out your credit card number to non-secure sites  Be cautious to sellers that are outside of the United States  Don’t reply to messages asking for personal information

Statistics  Auction Spams are the most common at 44.9% complaints  30% of people complained about fraud through  Check frauds had complaints of about 4.9%

Frequent Questions Asked About Internet Fraud I purchased an item from an online dealer and haven’t received the product? Report it to the Internet Fraud Complaint Center ( How can I avoid Internet fraud? Never give out personal information (i.e Social security number) or any other information that is important.

Citations     