Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?

Slides:



Advertisements
Similar presentations
SECURITY CHECK Protecting Your System and Yourself Source:
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 13-1 Today’s Topics n Consumer Fraud.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Beware! Consumer Fraud Module 9.1.
7.3.1.G1. © Family Economics & Financial Education – September 2010– The Essentials to Take Charge of Your Finances– Identity Theft Essentials – Slide.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Cyber Crimes.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Unethical use of Computers and Networks
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
August 19 & 22, Objectives  Identify adequate, reliable information resources for personal and family problem solving.  Explore ways to prevent.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Computer crimes.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
 Grab your handouts and settle in  Roll Call Question: Hard or soft shell tacos???  Bell Work:  How is interest of a savings account different from.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
S CAMS AND S CHEMES. I DENTIFY T HEFT Someone unlawfully obtains and uses a person’s personal data to commit fraud or deception for financial gain Opens.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Unit 7 Day 5 Consumer Protection & Fraud. Consumer Credit What is Credit? the ability of a customer to obtain goods/services before payment, based on.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
5.5 Consumer Protection Objective: Demonstrate how to be a responsible consumer in the 21st century.
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
Phishing is a form of social engineering that attempts to steal sensitive information.
Five Unethical Uses of Computers
Scams and Schemes.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Security in mobile technologies
Presentation transcript:

Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?

Identity Theft A crime in which someone wrongfully obtains and uses another person's personal data Types: ◦ Phishing ◦ Skimming ◦ Credit Card theft video

Phishing attempt to acquire identity of someone by asking for sensitive information ◦ i.e. username, password, credit card number. Watch Out For …being asked to update personal information (password, credit card, social security number). ** A legitimate business will always ask for the information on a secure website or in person.

Skimming illegal copying of information from the magnetic strip of a credit or ATM card. Watch out for… unusual devices on the ATM swipe machine

Credit and Debit Card Theft Fraud spree: unauthorized charges on existing accounts. Hackers can steal account information from personal computers or company computers.

2 types of Credit Card Fraud Account takeovers involve the criminal hijacking of an existing credit card account. Application Fraud opening of credit card accounts in another person's name.

Some ways thieves steal your information lost or stolen cards Your mailbox Stealing your pin during a purchase Your trash Hacking Over the phone Personnel records Employees of a business steal card info

Fraud Deliberate deception usually for economic gain. Examples of Fraud: ◦ Ponzi Schemes ◦ Pyramid Schemes ◦ On line scams

Ponzi Scheme named after Charles Ponzi (early 1900’s) convince people to invest in a fake company for great returns. Once the scam artist feels that enough money has been collected, he disappears – with the money

How do they work? 1. Convince a few people to invest. 2. Return some money to investors 3. Convince more investors based on success… many original investors will invest again 4. Repeat steps 1 through 3 a number of times. 5. Before step 2 in one of the cycles, disappear Bernie Madoff

Pyramid Scheme investment where each paying investor recruits two other investors. The first investor makes money from his recruits… they make money by recruiting more People at the top make money from people on the bottom

The main characteristic of a pyramid scheme is that participants only make money by recruiting more members. How Do Pyramid Schemes Work? Ponzi v. Pyramid

Online Fraud Work at Home Ads ◦ Too good to be true Fake charity organizations ◦ Natural disasters are popular “Be part of one of America’s Fastest Growing Industries. Be the Boss! Earn thousands of dollars a month from home”

Malware “malicious software." It includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. Can be used for fraud