 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Netiquette Rules.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Quiz Review.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Security Issues: Phishing, Pharming, and Spam
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Santa’s s By Alexander Britton. Sending an .
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Any criminal action perpetrated primarily through the use of a computer.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Scams & Schemes Common Sense Media.
how to prevent them from being successful
Learn how to protect yourself against common attacks
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
How to Protect your Identity Online PIYUSH HARSH
Ethics Tutorial Assignment#2
Computer Security.
Security Hardening through Awareness August 2018
Protecting Your Credit Identity
What is Phishing? Pronounced “Fishing”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants are male.  92.4% complainants are from the US  Males lost more money than females.  74% and webpages 28.9%

 How often do you use a computer?  How often do you use ?  How often do you receive scams in your /i-mail?  How often do you receive text messages to your phone about scams?

 Phishing  Whaling  Vishing  Pharming  Phaxing  Spam  Scams  Smishing

 An attempt to defraud a person An attempt to defraud a person

Using social engineering Uses cell phone text messages

 Junk mail Junk mail  Identical messages sent to multiple recipients.

*The sending of claiming to be a legitimate business to receive your personal information.The sending of claiming to be a legitimate business to receive your personal information. *The will direct you to a website so you can type in your personal information. *Ex. Credit cards, passwords, bank accounts.

 Using social engineering over the phone. Using social engineering over the phone.  Try’s to receive personal and financial information.

 Redirect internet traffic to other websites.  Occurs when someone changes the hosts file.

 First, look through the website › Ex. Cluttered, badly written.  Second, make sure the website is not promoting a deal that is unrealistic. › Ex. Making $100 or $1000 in a day.  Third, look for an address, phone number or contact information.  Fourth, look for something that proves it is a secure website. › Ex. The little lock at the top of your web browser bar.

 While doing this project I have came up with a few questions… › Why would people continue to fall for the scams when there are many things wrong with the website that they go on? › How can someone truly believe that you can make $100 or $1000 a day?

 I have witnesses people falling for internet scams and wanted to learn more about them.  The article that I chose explains to people that a lot of scams come out on the internet around the time that taxes are do, which I think people should know this to pay attention to this more.  The online information links that I provided were mostly cases that involved real people. I think that these are a good example of explaining to people about what they should be looking for when thinking about making online purchase.

 Journal. › =a29a2b48-f5e2-4c75-a7e7- 2bb e%40sessionmgr4&bdata=JnNpdGU9ZWhvc3 QtbGl2ZQ%3d%3d#db=a9h&AN=J0E =a29a2b48-f5e2-4c75-a7e7- 2bb e%40sessionmgr4&bdata=JnNpdGU9ZWhvc3 QtbGl2ZQ%3d%3d#db=a9h&AN=J0E  Online Information Sites. › fraud-google fraud-google › 1_tax_scams.html 1_tax_scams.html › 7.shtm 7.shtm › atistics.htm atistics.htm