BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

How to protect yourself, your computer, and others on the internet
Part I: Making Good Online Choices
Identity theft Phishing Reshipping thief * All a thief needs are a Social Security # and a resume to steal a job seeker's identity. * fake A Social Security.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Internet Online Safety How to have FUN and Stay in Control.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Kimberly Siebott Lynn Yip. Definition  A crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
How can you protect yourself from online identity theft?
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
To:Employee From: impersonated official company Message: Give us personal information here.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
By: Asfa Khan and Huda Mukhtar
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Internet Safety.
Protecting Your Assets By Preventing Identity Theft
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Scams and Schemes.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Being Aware of What You Share
Internet Safety – Social Media
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

BTT12OI

 Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were)  Purchased a fake or bad product online  Given out personal information to an imposter  What is the purpose of a scam?  To get money  To get info that can help the scammer steal money  What role might the Internet play in various scams?  s requesting info  Using social media sites to uncover info  s requesting money (includes a link to some type of payment site)

 _________________ is a crime in which an imposter obtains key pieces of personal information in order to impersonate someone else.  People who scam others online don’t always have to get money from them directly  Instead, they use a variety of strategies to trick people into giving out private information. They then use this information to access their bank and credit card accounts or other personal accounts  They can even “re-create” someone’s identity and produce false documents, such as Social Security cards, credit cards, or drivers’ licenses in someone else’s name in order to pretend to be them Identity theft

 Full name  Date of birth and where you were born  Current and previous addresses  Phone numbers  Driver’s license or passport number  Account numbers and the companies where you hold accounts  E.g. Amazon, PayPal, etc.  Passwords  Social Security number

 ANYONE  Although teens might not think they’re at risk, they are for 1 important reason;  Identity thieves often look for “clean” Social Security numbers that haven’t yet been used to get credit. Identity thieves might sell or use these numbers, which would allow someone else to get a credit card or loan and build up debt under your name

 Being a victim of identity theft can ruin your financial future and your ability to obtain loans and purchase things. For example, it could affect your ability to get a student loan for college or a loan to buy a car  It can take months, even years, to recover your identity if it’s stolen. Cleaning up such a mess takes a lot of time and energy, and it can also be expensive  In addition, if you use your parents’ accounts and credit cards online, or fill out forms with your parents’ information, you are sharing information that could potentially put your parents’ identities at risk

 ____________ is an fraud method in which the perpetrator sends out a legitimate- looking in an attempt to gather personal and financial information from recipients  Typically, the messages appear to come from well known and trustworthy Websites or people you know  The best way to avoid phishing scams is to be skeptical about any online request for personal information  It’s also good to be skeptical of online messages or posts from friends that seem out of character for them, which is a warning sign that their accounts have been hacked Phishing

 Need to verify account information  Phony s will try to trick you into giving up account information, passwords, or clicking on a phishing link, where you fill out information that identity thieves can collect and use. Usually what they’re asking for doesn’t make sense if you think about it, because they should already have that information!  Sense of urgency  When the message says you only have a limited time to respond, it is often the sign of a scam.  Spelling errors  Scam s often include spelling and grammatical errors. A real company would not send out messages containing such errors.  Alert that your account is in trouble  Identity thieves try to make you worry that something is wrong with your account, so you will feel you must immediately respond to the to fix it.

 Link in or attachment  Phishing s often have a link within the or an attachment that you are urged to click on. This link can lead you to a site or form where you (unknowingly) give your information to criminals. You should never respond to or click on links in such s. Instead, go directly to the main website, and from there check your account  Too good to be true  Scam s often offer things that are too good to be true, like the easy chance to win free money or prizes  Generic greeting  You might see a generic greeting that does not personally address you. Reputable companies send s where they address their customers by name

If you ever encounter something online that you believe might be a phishing scam, you should observe the following rules;  Avoid opening the message or in the first place  Don’t click on any links or download any attachments They might contain viruses or spyware  Don’t reply  Mark as “junk mail” or “spam” for your provider, or report it to your social network site  If you are concerned about an account you have with a company, contact its customer service by phone  Make sure you verify the company’s contact information elsewhere online first