Presentation is loading. Please wait.

Presentation is loading. Please wait.

NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.

Similar presentations


Presentation on theme: "NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber."— Presentation transcript:

1 NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber Literacy Chapter 3 Protecting What’s Yours: Your Identity

2 Overview We will learn about identity thieves, information they steal, how they steal identity, and how to avoid identity theft.

3 Terms to Know Identity theft Identity thieves Private information Personal information Passwords

4 What is Identity Theft? Identity theft- when private information, such as your name or social security number is stolen and used without permission Identity thieves- people who gather information online and find ways to trick people into revealing even more information

5 How Identity Theft is Accomplished 1.Phone calls- thieves pretend to be trusted people such as company workers or even friends or acquaintances and ask for information 2.Phishing- sending out emails asking for private information 3.Public computers- gaining access to private information when someone does not log out of a public computer

6 Stolen Information Identity thieves are able to… Gain access to bank accounts Take out a loan Open credit cards Open utility accounts Seek medical assistance Send unsolicited messages

7 What’s Private and What’s Personal Private information- information that could identify who you are, such as… Full name, social security number, birth date, address, phone number, account passwords, credit card numbers, bank account numbers Personal information- doesn’t necessarily identify who you are, it describes you, such as… Favorite sports, favorite music, opinions on movies, advice on a topic, favorite book

8 When it’s Safe to Share Private Information Getting driver’s license Getting a new job Preparing tax information Getting a bank account or loan

9 Stay Safe by Staying Alert Create strong passwords Never share your passwords or private information Be careful about sharing information on social media Monitor online accounts Tell a trusted adult about questionable activities Always log out!

10 Creating a Strong Password Password- a secret word or phrase that must be used to gain admission to something. Don’t use self-identifying facts Make passwords at least eight characters Use a combination of numbers, symbols, and letters Change passwords every few months Create passwords you’ll remember Don’t enter passwords on your phone or public places

11 What if Your Identity is Compromised? Report it Close it Watch it ( a new account)

12 Assessment Activities Type your response to the following in Word. Save as cyber literacy chapter 3 Activity 1( pg 57)


Download ppt "NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber."

Similar presentations


Ads by Google