Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mrs. Esman Computer Special

Similar presentations


Presentation on theme: "Mrs. Esman Computer Special"— Presentation transcript:

1 Mrs. Esman Computer Special
Internet Safety Scams

2 Lesson Objectives Students will be able to understand what identity theft is and why it is important to guard against it, along with recognizing strategies that scam artists use to access private information, and how to guard against phishing and identity theft.

3 What does it mean to be scammed?
Scam: an attempt to trick someone, usually with the intention of stealing money or private information.

4 Why do Scammers Scam? The ultimate purpose of a scam is to get someone to give the scammer money, or information that can help the scammer steal money, such as a credit card number, ATM code, or password. To accomplish this, scammers tell lies and often pretend to be someone they are not.

5 What is Identity Theft? Identity Theft: a type of crime in which your private information is stolen and used for criminal activity.

6 Information that can be used by scammers.
Your Full Name Date of birth and where you were born Current and previous addresses & phone #’s Driver’s licenses or passport #’s Companies and account #’s you hold Passwords Social Security #

7 What does it mean to be vulnerable?
Vulnerable: in a position that makes it easier for you to be harmed or attacked

8 Why does it make you vulnerable if someone gets your personal information?
They apply for credit in your name. If you have a “clean” social security number they means you have no credit history and that makes you easy prey for Identify Theft. #’s can be sold to people that can use them Thieves can use them build up debt in your name and it can take years and years to clear it off your credit bureau reports and be very expensive Don’t put your parents a risk by using their information

9 What is phishing? Phishing: when people send you phony s, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information.

10 Let’s see if you can spot a scam!


Download ppt "Mrs. Esman Computer Special"

Similar presentations


Ads by Google