Antisocial use of ICT and Computer Fraud

Slides:



Advertisements
Similar presentations
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Advertisements

COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft By: Nakeisha Barnett Thursday 2-3:15 3/4/06.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 13-1 Today’s Topics n Consumer Fraud.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Fastest Growing Crime in America. IDENTITY THEFT IS COSTING YOU BIG MONEY. 10 million people are effected by identity theft each year. More than 46 million.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Protecting Your Identity While Attending College.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
IDENTITY THEFT. Identity Theft Defined When someone uses another person’s name, address, social security number, bank or credit card account number, or.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Identity Theft.
By: Taylor Budwash.. o Identity Theft is the unorganized gain and use of a true person’s identity and personal information for unlawful purpose.
CptS 401 Adam Carter. Change in schedule  Updated online copy  Tomorrow: read
Director Education E-Fraud Spring What is E-fraud? Credit & Debit Card Fraud Internet Fraud Phishing Pharming Advance Fee Fraud.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
August 19 & 22, Objectives  Identify adequate, reliable information resources for personal and family problem solving.  Explore ways to prevent.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Safety and Security issues of using ICT Alys brooks.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Section 6 Theory Issues with information found on the Internet.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Chapter 6 What is identity theft?.  What are the three Credit Bureaus which you can obtain your FICO SCORE?  Is a high FICO score a measure of winning.
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Identity Thefts: Opinion of the Lithuanian Population Dr. Zita Čeponytė 1.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Grace Campbell. o The change in organisation has increased in technical departments. The areas of increased unemployment has arisen. Some jobs have been.
Identity Theft It’s a crime!
Identity Theft Chelsea Weser.
Mrs. Esman Computer Special
Done by… Hanoof Al-Khaldi Information Assurance
How do we buy and sell on the Internet safely?
Protecting Your Identity:
Five Unethical Uses of Computers
Scams and Schemes.
Cybersecurity and Personal Finance
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Protecting Yourself from Fraud including Identity Theft
LO1 - Know about aspects of cyber security
Unit 1 Fundamentals of IT
Protecting Yourself from Fraud including Identity Theft
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Identity Theft and Credit Safety
Presentation transcript:

Antisocial use of ICT and Computer Fraud Objectives: Examples and prevention Effects on victims

What is antisocial use of ICT Using ICT or ICT’s features such as Internet for bullying, stealing, and for harming others’ computers.

Examples and prevention – last page in your workbook

Examples and prevention

Identity theft Stealing your identity details such as name, date of birth, current address in order to use them in criminal activities for obtaining money, goods, and services.

Ways for identity theft Search trash bins or people’s post for documents such as card statements Look over people’s shoulders while they are filling in forms Use skimming device to steal information from your bank card Employees stealing information from company’s database.

What is Computer fraud Page 1 Q i The use of ICT/computer systems to intentionally deceive (others) for personal gain

Effects on victims Page 1 Q ii Personal identities can be stolen and disclose to others Money can be taken from bank accounts Details can be altered/deleted. Goods can be intercepted

How they steal (Hacking, Phishing, Pharming, etc.) Task Page 2 Q5 Answer: How they steal (Hacking, Phishing, Pharming, etc.) + Effects on victims