Phishing, identity theft, and more

Slides:



Advertisements
Similar presentations
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Advertisements

Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
1 Identity Theft and Phishing: What You Need to Know.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Quiz Review.
Security Issues: Phishing, Pharming, and Spam
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Scams & Schemes Common Sense Media.
The Internet contains an infinite number of high- quality, interesting, intriguing, and well-designed sites, and surfing on the Web is usually a source.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
How to Read Outlook . Make sure the computer is on.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Cyber Safety Jamie Salazar.
Phishing and online fraud What parents need to know.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Protecting our institutional and your personal data
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Scams and Schemes.
If I’d only known then what I know now about phishing…
Computer Security.
9 ways to avoid viruses and spyware
Phishing Don’t fall for fake
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Being Aware of What You Share
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
Presentation transcript:

Phishing, identity theft, and more Scams and Schemes: Phishing, identity theft, and more

Identity theft What kind of info do thieves look for?

Identity theft? Birth date and location Full name Addresses, phone numbers Driver’s license, passport # Account numbers Passwords Social Security number

WHAT CAN A COMMON THEIF FIND EASILY? Birth date and location Full name Addresses, phone numbers Driver’s license, passport # Account numbers Passwords Social Security number

GIVING AWAY YOUR INFORMATION Passwords Security questions answers Usernames

Phony emails, fake links, and more Phishing Phony emails, fake links, and more

Defined The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

Spotting scams: REVIEW Need to verify account information Sense of urgency Spelling errors Threats to your account Link in email or attachment Too good to be true Generic greeting

PROTECT YOURSELF! If it looks suspicious, don’t open it, because it probably is. Don’t click on links or download attachments (unless reliable). They could bring viruses to your computer. Don’t reply to the message. Mark the message as “spam” or “junk mail” and report it. Call the company DIRECTLY if you have questions about an email that seems “off” (using a legitimate phone number) When in doubt, just delete!

Resource Review Visit www.cliu.org/llresources

Thank you! Jordan Gruber Media Facilitator gruberj@cliu.org Carbon Lehigh Intermediate Unit #21 Jordan Gruber Media Facilitator gruberj@cliu.org