Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Today’s Quiz 1. The most popular social networking site among young people is Twitter. 2. Nothing is private once it is posted on the Internet. 3. Teens.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Using internet and cell phones safely
Protecting Your Identity. What is IA? Committee on National Security Systems definition: –Measures that protect and defend information and information.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
How To Protect Your Privacy and Avoid Identity Theft Online.
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Protecting Your Identity While Attending College.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
How can you protect yourself from online identity theft?
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Identity Theft Project Erin L. Caraway Jacob Locke.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
You. are at risk for the fastest growing crimes crime.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
SOCIAL NETWORKING RISKS. What Are Social Networks? Myspace Youtube Facebook JULIA ADAMS:
INTRODUCTION & QUESTIONS.
Identity Theft One of America's fastest growing crimes.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Cybersafety 4 Kids: Smart Moves in an Online World.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Technological Awareness for Teens and Young Adults.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Identity Theft It’s a crime!
An Introduction to Phishing and Viruses
IT Security  .
Social Media: What You Should Know
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Internet Safety Vocabulary
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
“Credit score vocabulary”
Presentation transcript:

Social Networking and Protecting Your Identity

Popular Social Networks Myspace Facebook Youtube Twitter

Question: What type of information do people typically post on these sites?

Too Much Information? Name Address Phone Number Birthday Address School Likes/Dislikes Tagged Photos Status Updates Upcoming Events

Question: Who has access to this information?

Answer: Almost anyone with access to the internet: Peers Parents Potential Employers Predators College Admissions Coaches

Examples in the News McKinney North High School in Texas Cheerleaders posted inappropriate pictures on MySpace All of the cheerleaders were kicked off of the team

Examples in the News Eisenhower High School in New Berlin Anthony Stancl posed as a girl on Facebook 31 of his classmates sent him inappropriate pictures Many of the students who sent pictures were blackmailed by Stancl

Online Game: Fakebook n/tmi/ n/tmi/

Question What is the definition of Phishing?

Answer: Phishing is a form of social engineering in which an attacker attempts to fraudulently acquire sensitive information from a victim by impersonating a trustworthy third party.

Social Phishing Attackers can exploit Social Networking Sites “Circle of friends” provides plenty of victims

Example of Phishing Scam

What Should You Do? Do not put information on your profile that you wouldn’t want your mother to see Control your privacy settings Do not “friend” people you do not know

Identity Theft Occurs when someone uses your personal identifying information. –Name –Address –Date of Birth –Social Security number –License Number –Credit card number

Identity Theft Cont. Federal Trade Commission (FTC) estimates as many as 9 million Americans are victims each year. Hundreds of dollars can be spent repairing damages to your good name or credit record. uNKohttp:// uNKo

Different methods of Identity theft Non Technical –Dumpster Diving –Skimming –Changing Your Address –Old-Fashioned Stealing Technical –Phishing –Hacking –Malware –Password Cracking

Information Websites 123people.com Zaba search Maltego Domain Tools

Identity Theft Victims Should: –Place a fraud alert on your credit reports, and review your credit reports –Close the accounts that you know, or believe, have been tampered with or opened fraudulently –File a complaint with the Federal Trade Commission –File a report with your local police or the police in the community where the identity theft took place

JEOPARDY GAME!!! jeopardylabs.com/play/jeopardy2467