Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Online banking Using the internet for your banking.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
INTERNET SAFETY FOR KIDS
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Internet Safety Internet Safety LPM
By: Asfa Khan and Huda Mukhtar
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Policies and Security for Internet Access
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
A Quick and Easy Crash Course Internet Safety for Everyone.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Managing Money Workshop The National Autistic Society AGM
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
Protecting Your Assets By Preventing Identity Theft
Media education: from passive consumers to active creators
Take Charge of your Finances
Unit 4 IT Security.
I S P S loss Prevention.
Take Charge of your Finances
Information Security 101 Richard Davis, Rob Laltrello.
Cybersecurity Awareness
Digital $$ Quiz Test your knowledge.
Take Charge of your Finances
What devices use the internet?
Presentation transcript:

Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers to look out for relating to internet banking; Understand what is meant by the term “phishing”; Understand how criminals can get your details to access your bank accounts; Know how to avoid becoming a victim; and Know who to contact if you think you have become a victim. 2

Important information A copy of this presentation and the accompanying training booklet are available for download at: 3

Meet Beryl and Alan

Getting started… Would you ever consider using the internet to do some of your banking? Why or why not? 5

What is internet banking? It allows customers to conduct some of their banking through their financial institution’s website. While you cannot physically withdraw money, there are a range of other transactions which can be done (transfers, payment of bills). It is available 24/7, 365 days per year.

An awareness of internet banking While internet banking provides an opportunity to do a range of transactions from the comfort of your own computer, there are a few things to be aware of: Phishing s Malware However, each of these can be overcome with a few simple steps.

Phishing s Phishing s will ask you to provide your personal information. It might be from a bank or other financial institution. It might look genuine and seem plausible. It might ask you to reply to the or provide a link for you to enter your personal details.

Malware Short for “malicious software”, malware is designed to disrupt the normal running of your computer. Malware comes in many forms, each with a different purpose. Malware can be downloaded from an attachment or through visiting a compromised website. You might not know your computer is infected. 9

Revision questions 10

Revision questions 11

How well did you do?

How to protect yourself when banking There are several strategies which can help you protect yourself when using the internet to do your banking. By following these simple steps, you will greatly reduce the chances of something adverse happening to you.

Protecting yourself when banking 1)Use antivirus protection and have an active firewall Install and regularly update antivirus protection and a firewall. Regularly scan your computer. 2)Avoid using public computers Wherever possible, use your own computer as you know what security mechanisms you have in place and the current state of your computer security. 14

Protecting yourself when banking 3)Never reply to an with personal details Fraudulent s will not always be obvious. Personal details should be guarded in the same way as money. Talk to someone if you are unsure of an . 4)Never provide your personal details through an link The link is likely to take you to a fraudulent website which will capture your personal details for another person to use. 15

Protecting yourself when banking 5)Use strong passwords Try to use different passwords that contain at least 8 characters and a combination of letters, numbers and symbols. 6)Monitor your accounts and statements Regularly check your accounts to ensure that the only transactions which appear are those which you have authorised. 16

Protecting yourself when banking 7)Take advantage of extra protection for your accounts Many banks and other financial institutions offer extra security features for internet banking, such as confirmation text messages or tokens which generate one time only passwords. 17

If you think you are a fraud victim There are steps you can take if you think that the security of your internet banking may have been compromised. Don’t panic or ignore it! 1) Your personal details have been compromised Contact relevant agencies to cancel accounts or change passwords. 18

If you think you are a fraud victim 2)You have noticed suspicious/unauthorised activity on your account Contact the relevant bank or financial institution immediately to cancel your cards and change your passwords. Talk to them about resolving the situation. 19

Reporting Fraud You can report fraudulent s to the Australian Communications and Media Authority via at: You can report cybercrime to the Australian Cybercrime Online Reporting Network (ACORN): 20

Conclusion The internet is a great way doing your banking, however care must be taken when doing this. By following the steps outlined in this presentation, you should be able to use internet banking in a safe and confident manner, knowing that your funds are secure. 21

Revision scenario 22

Revision scenario 23

Revision scenario 24

Questions?

Further information… For more information about other modules in this series: For more information about reporting cybercrime: For more information about online security issues: or For more information about computers and technology: 26