Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

How to protect yourself, your computer, and others on the internet
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Internet Online Safety How to have FUN and Stay in Control.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Issues: Phishing, Pharming, and Spam
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Reliability & Desirability of Data
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Scams & Schemes Common Sense Media.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How to Read Outlook . Make sure the computer is on.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Now scroll to move on to the next slide. What is e-safety? E-safety is keeping safe when you are online. It means: Not giving out personal information.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Santa’s s By Alexander Britton. Sending an .
Cyber Safety Jamie Salazar.
Phishing and online fraud What parents need to know.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Internet Safety.
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Learn how to protect yourself against common attacks
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Lesson 3 Safe Computing.
What to be aware of and how to avoid problems.
Information Security 101 Richard Davis, Rob Laltrello.
How to Protect your Identity Online PIYUSH HARSH
Scams and Schemes.
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Digital Citizenship Unit 1 * Digital Life * Strategic Searches
Being Aware of What You Share
Social Engineering Humans are often the weakest point in security
What devices use the internet?
Presentation transcript:

Catching Phish

If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your personal information (fish) by sending out lots of messages (bait) Fishing

Phishing is the attempt to acquire personal information like usernames, passwords, and card details by pretending to be a trustworthy person (like a Bank or Shop) Phishing

Full name Date of birth and where you were born Current and previous addresses and phone numbers Driver’s license or passport number Account numbers and the companies where you hold accounts (e.g., Amazon, PayPal, etc.) Passwords Identity Theft People sending phishing s might want to get your:

Phony s will try to trick you into giving up account information and passwords Usually what they’re asking for doesn’t make sense if you think about it, because they should already have that information! Spotting the Fakes… A company may say they need to verify account information:

When the message says you only have a limited time to respond, it is often the sign of a scam. Urgency… They may give their message a sense of urgency:

Scam s often include spelling and grammar errors. A real company would not send out messages containing errors. How is the spelling?... Spelling errors:

Phishing s often have a link within the or an attachment that you are urged to click on. This link can lead you to a site or form where you (unknowingly) give your information to criminals. False link… Link in or attachment:

Scam s often offer things that are too good to be true, like the easy chance to win free money or prizes. Is it too good?... Too good to be true:

You might see a generic greeting that does not personally address you. Proper s from companies will be addressed to you, personally. No name… Generic greeting:

Identity thieves try to make you worry that something is wrong with your account, so you will feel you must immediately respond to the to fix it. Making you worry… Account is in trouble:

Look at the examples of s on the sheet. Can you see anything about them which might mean they are phishing messages? Write anything that is suspicious in the space to the right of the picture. Examples…

Avoid opening the message or in the first place Don’t click on any links or download any attachments. They might contain viruses or spyware. Don’t reply Mark as “junk mail” or “spam” for your provider, or report it to your social network site. If you are concerned about an account you have with a company, contact its customer service by phone. Make sure you verify the company’s contact information elsewhere online first. What to do…