Cybersecurity and Personal Finance

Slides:



Advertisements
Similar presentations
Part I: Making Good Online Choices
Advertisements

Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
You. are at risk for the fastest growing crimes crime.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Identity Theft One of America's fastest growing crimes.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Organization and Outlining AP Language and Composition December 14, 2015.
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Grade 8 Mathematics FLBP Lesson 6 Credit Cards Financial Literacy Budget Project.
MATH BELL RINGERS SKILLS FOR EVERYDAY By: Mindy Lingo M.Ed. Sooner Scholar University of Oklahoma.
A Student’s Guide to Proper and Safe Web Behavior
Protecting Your Assets By Preventing Identity Theft
Protecting Your Credit Identity
3-5 Lesson c: secret agent savings The big savings mistakes
Introduction to Depository Institutions
Introduction to Depository Institutions
Done by… Hanoof Al-Khaldi Information Assurance
Dove science academy Cyber Club
Take Charge of Your Finances
Protecting What’s Yours: Your Identity
math BELL RINGERS: Skills for Everyday
Protecting Your Identity:
Introduction to Depository Institutions
Top 10 Reasons Why you need to get GradReady®.
Tax Identity Theft Presenter Date
Sissy r. osteen, ph.d., cfp® Oklahoma State University
Take Charge of Your Finances
Take Charge of Your Finances
Warm-up a) Explain why it is important to keep your bank card PIN 
 secure. b) List three ways that you can protect your personal banking  information.
Preparing for College and Careers
DOVE SCIENCE ACADEMY CYBER CLUB
Saving and Borrowing.
What is credit and why is it important?
Protecting Your Credit
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Chapter 10 Building Good Credit
Introduction to Business
Protecting Your Identity
Identity Theft Scenarios What do you recommend?
Online Safety! Created by Educational Technology Network
Identity Theft Presented by 72 Facility
Personal Safety Online
Introduction to Depository Institutions
Introduction to Depository Institutions
Lesson #1 - How to write a check
Building Wealth over the Long-Term
How would you obtain goods and services if you did not have any money?
Exploring the Pros and Cons of Different Methods of Payment
Identity Theft By Omer Ersen.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Identity Theft and Credit Safety
Presentation transcript:

Cybersecurity and Personal Finance

Cybersecurity and Personal Finance: Identity Theft Lesson Objectives Recognize the importance of protecting yourself from identity theft. Determine the relationship between identity theft and fraud. Explain the history and the role of Social Security Numbers in identity theft. Apply the concept of identity theft to the use of credit cards and other personal information such as Social Security Numbers and passwords. Discuss how to protect yourself from identity theft. Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Cybersecurity and Personal Finance: Identity Theft Introduction Identity theft is one of the fastest growing crimes Technology provides easy access to everyone’s personal information “Hackers” attempt to gain access to databases Government Banks and other financial institutions Other private businesses Identity theft creates problems for business, for government, and for individuals Understanding how to protect yourself from identity theft is important Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Cybersecurity and Personal Finance: Identity Theft Opening Questions What is identity theft? How can you protect yourself from becoming a victim? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Answers to Opening Questions What is identity theft? The deliberate use of someone else’s identity (name and personal information), usually for financial gain How can you protect yourself from becoming a victim? Take steps to protect your personal information such as passwords and Social Security Numbers Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Cybersecurity and Personal Finance: Identity Theft Overview Anyone can become a victim Identity theft can cause multiple problems for the victim May prevent you from getting credit cards or other loans May prevent you from getting a school loan for your college education May prevent you from buying a house May prevent you from getting a job Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Cybersecurity and Personal Finance: Identity Theft Essay Scenario Fastview Middle School is preparing for its annual essay competition. Winners will be announced at a special ceremony this morning. Everyone is gathered in the auditorium and excited to hear who will win. Now, the big moment has come. Mrs. Rodriquez announces the top three essay winners and Johnny wins first place. Everyone is surprised as he slowly walks up to receive his award and a gift certificate for $100. As Johnny starts reading his essay to all of the students, Malia realizes that he is reading her essay. How could this  happen? She was happy when they said she got second place, but now she’s angry and confused. She wants to know how Johnny got a copy of the first one she wrote and tossed in the trash before starting over on a new paper. Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Essay Scenario Questions What should Malia do? How can she prove it was her essay? Do things like this ever happen? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Cybersecurity and Personal Finance: Identity Theft Essay Scenario Recap Malia is a victim of fraud Johnny took her essay without her permission and used it for his own gain Definition of fraud Deliberate attempt to gain from deceiving or misleading others The burden of proof is on Malia Malia will have to show proof that Johnny stole her essay and entered it in the competition Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Identity Theft and Fraud Identity theft and fraud are very similar Personal information is stolen, such as Name Social Security Number Address Phone number Bank account number Credit card number Password The stolen information is then used to buy things, leaving you to pay the bills or to prove you did not buy them Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Identity Theft and Fraud (continued) What if Johnny stole Malia’s credit card number and purchased new clothes for the awards ceremony? Malia would have to prove he did it or pay the bill. Being a victim of identity theft or fraud is much more serious than just having someone steal your essay. Identity theft can create very difficult situations for the victim to resolve. Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Why is identity theft growing? Electronic access to databases Tossing paper with personal information into the trash Online access for individuals Social media Chat rooms Emails Online surveys Other Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Potential Sources of Identity Theft Posting personal information on social media Giving out personal information in a chatroom Responding to emails asking for personal information Answering online surveys that require personal information Others??? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Cybersecurity and Personal Finance: Identity Theft Even cell phones! People store important information on cell phones and tablets If not protected, someone can easily access that information Protect cell phone and other electronic devices Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Cybersecurity and Personal Finance: Identity Theft Remember……. Protecting personal information is important, even if you do not have a bank account or a credit card. Someone can still steal your identity and use it. Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Cybersecurity and Personal Finance: Identity Theft Activity #1 Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Identity Theft and Credit Have you ever loaned money to a friend who did not repay you? How did it make you feel? What if you found out that friend had borrowed from several others in class and did not repay them either? Would you want to loan this friend more money? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Identity Theft and Credit (continued) Failing to repay your friends gives them a bad impression of you. Companies also want to know if you repay your bills when you ask to borrow money from them. Credit History Credit cards are an easy way to get credit. With credit cards, you can buy today and pay for things later. What would you think if someone used your credit card to make purchases? What would you think if someone got a credit card in your name and you did not even know about it? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Identity Theft and Credit (continued) How would you feel if someone used your credit card to make purchases? How would you feel if someone got a credit card in your name and you did not even know about it – and made purchases? Both are examples of identity theft. In both examples, you must prove it was not you who made those purchases. If you cannot prove it, then you are responsible for paying the bills! Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Identity Theft and Bank Account Numbers Issued by a bank when you open an account Checking Account Savings Account Unique to you and to your account Provides you and only you access to your money Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Identity Theft and Social Security Numbers Issued by the Federal Government Basically serve as a national identification number Unique to you Provides you and only you access to your personal information Used to track your credit history (your use of credit) Other uses https://www.youtube.com/watch?v=PWJMMIwjWYE Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Review of Social Security Numbers What is a Social Security Number? How are they used? Why are they important? Why should you protect you Social Security Number from others? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Cybersecurity and Personal Finance: Identity Theft Activity #2 http://www.netsmartz.org/NetSmartzKids/PasswordRap Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org

Cybersecurity and Personal Finance: Identity Theft Conclusion Anyone can become a victim of identity theft – even you! Even if you do not have a credit card Even if you do not have a bank account Even if you do not have a computer or tablet Even if you do not have a cell phone Protecting personal information reduces the potential for becoming a victim. Talk with your parents/guardians about ways to protect your personal information and theirs. Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org