1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
Protecting Your Identity: What to Know, What to Do.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Identity Theft Both Offline And Online It’s Not New Just Easier…
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
How To Protect Your Privacy and Avoid Identity Theft Online.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Internet Safety Internet Safety LPM
Jeff loses his identity! Lesson 8: Identity Theft.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
You. are at risk for the fastest growing crimes crime.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
A Quick and Easy Crash Course Internet Safety for Everyone.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Jeff loses his identity! Lesson 5: Identity Theft.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
Protecting Your Assets By Preventing Identity Theft
Protecting Your Identity:
Cybersecurity Awareness
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Presentation transcript:

1

Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of “identity crime”; – Understand the public nature of the internet; – Understand the different ways a person’s identity can be stolen; – Know what strategies will help protect your identity; and – Know who to contact if you think you have become a victim. 2

Important information A copy of this presentation and the accompanying training booklet are available for download at: 3

Meet Beryl and Alan

Getting started… Why do you think it is important to protect your identity? What contributes to a person’s identity? 5

What is identity crime? 6

Losing control of your identity There are several ways in which your identity can be compromised: Posting too much information on the internet Fraudulent s Malware However, these can be overcome with a few simple steps. 7

Posting information on the internet One of the biggest threats to our identity is our need to post excessive amounts and levels of information on the internet. The internet isn’t as private as we might think, and our posts can be viewed by people other than our contacts. Posting high levels of information on the internet and inadequate security settings can increase the risk of identity crime. 8

Fraudulent s These types of s will appear in your inbox and can look genuine. They might come from your bank or another organisation that you do business with and ask you for personal information. They might ask you to reply to their or they might provide a link to provide your personal details. 9

Malware Short for “malicious software”, malware is designed to disrupt the normal running of your computer. Malware comes in many forms, and can be used to obtain your personal details. You might not know your computer is infected. 10

Revision questions 11

Revision questions 12

Revision questions 13

Revision questions 14

How well did you do?

How to protect your identity There are several strategies which can help you protect your identity. By following these simple steps, you will greatly reduce the likelihood that your identity is compromised. 16

Steps to protect your identity 1)Limit what details you put on the internet Carefully consider the amount and type of information that you make available to others. 2)Never reply to an with personal details Fraudulent s will not always be obvious. Personal details should be guarded in the same way as money. Talk to someone if you are unsure of an . Don’t feel pressured to respond. 17

Steps to protect your identity 3)Knowing and using security settings Make sure that you have security setting activated on all your accounts and profiles. Don’t rely on the default setting as this may not be as secure as you think it is. 4)Use a strong password Try to use different passwords, that contain at least 8 characters and a combination of letters, numbers and symbols. 18

Steps to protect your identity 5)Use antivirus protection and have an active firewall Install and regularly update antivirus protection and a firewall. 6)Avoid using public computers Wherever possible, use your own secured network, which you have control over. If using a public network, avoid doing things like internet banking. 19

Steps to protect your identity 7)Carefully select the websites you use The internet is a great resource, but try to stick to reputable websites particularly when giving over personal information (such as credit card details). 8)Monitor your accounts and statements Regularly check your accounts to ensure that the only transactions which appear are those which you have authorised. 20

Steps to protect your identity 9)Destroy your personal information appropriately Keep valuable documents with personal details on them in a safe place. Shred all of your documents before placing them in the rubbish. 21

If you think you are a fraud victim There are steps you can take if you think that you may have become a victim of identity crime. Don’t panic or ignore it! 1) Your personal details have been compromised Contact relevant agencies to cancel accounts of change passwords. 22

If you think you are a fraud victim 2)You have noticed suspicious/unauthorised activity on your account Contact the relevant organisation immediately to cancel your cards and change your passwords. 3)You receive a bill or statement which isn’t yours Contact the relevant agency immediately to find out what has happened. 23

Reporting Fraud You can report fraudulent s to the Australian Communications and Media Authority via at: You can report cybercrime to the Australian Cybercrime Online Reporting Network (ACORN): 24

ID theft support service If you have experienced identity theft there is a free support service available – – AUS toll free number iDcare can assist with information on who you should contact and assist you to put together a recovery plan. 25

Conclusion The internet is a great way of sharing and storing personal information, however care must be taken when doing this. By following the steps outlined in this presentation, you should be able to enjoy the internet in a safe and confident manner, knowing that your identity is secure. 26

Revision scenario 27

Revision scenario 28

Revision scenario 29

Revision scenario 30

Questions?

Further information… For more information about other modules in this series: For more information about reporting cybercrime: For more information about online security issues: or For more information about computers and technology: 32