Phishing Don’t fall for fake

Slides:



Advertisements
Similar presentations
Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
Advertisements

Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is identity theft, and how can you protect yourself from it?
A few simple steps, hints and tips to figure out if it is indeed fake. - By Emily Breuss.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Jeopardy Danger SafteySecret Info Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Phishing and online fraud What parents need to know.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Your friend asks you to join Facebook. What should you do? Talk to your parents and ask for their permission Get a friend to do it for you Sign up by.
Managing Money Workshop The National Autistic Society AGM
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Important Information Provided by Information Technology Center
Media education: from passive consumers to active creators
Cyber Info Gathering Techniques
Internet Safety How to stay safe online.
Mrs. Esman Computer Special
Safer Internet Day.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
E-safety Sir John Cass Foundation VA Primary School.
8 online danger tips By: kailee bariring.
Done by… Hanoof Al-Khaldi Information Assurance
Lesson Objectives Aims You should be able to:
Digital Citizenship Middle School
How to use the internet safely and How to protect my personal data?
What should you do? Slide 11 has (2) answers the rest have 1.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Identifying the Risks.
Protect Your Computer Against Harmful Attacks!
Passwords & Behavioral Ads
STOP. THINK. CONNECT. Online Safety Quiz.
Cybercrime and YOU.
Scams and Schemes.
The methods of phishing By EverTokki Lee
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Online safety.
By Govind, Penny, Ella, Chloe and George.
What you can do to support people to be safe online
Be an Upstander! It’s Cool to Be Kind
KEEP SAFE I will NOT give out personal information: Name -- create a screen name Address Phone number Password School address Pictures.
Online Safety! Created by Educational Technology Network
STAYING SAFE ON THE INTERNET
Personal Safety Online
Internet Safety – Social Media
Bell Ringer How can you protect your self online?
STAYING SAFE WITH TECHNOLOLGY View the following presentation and try to click on the correct answers of the slides with questions.
What devices use the internet?
Who wants to be an ‘internet safety’ millionaire?
Game Breaks Active Online Safety
INTERNET SAFETY.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Phishing Don’t fall for fake Lesson 2: Don’t Fall for Fake (pgs. 16-27) Ask students if they’ve ever hear the word “phishing” or know what it means.

What is phishing? When someone tries to steal your information by pretending to be someone you know, or a website that you trust, in an email, text, or other type of online communication. If you click on the link or attachment in the phishing email, you are downloading a virus to your device. The virus will scan your device for your personal information. It may even send messages to your friends pretending to be you! Activity 1: Don’t bite that phishing hook! (pgs. 18-21) Talk about fake emails from a bank asking for account info or credit card numbers, or a fake email from a website you trust, like Amazon. Ask students to share examples if they know any.

How can you spot a fake? Check for spelling. Are the logos correct? Is it a secure site? Does the URL match? Are there any pop-ups?

What can you do if you get hacked? Tell a trusted adult right away! Change your passwords. Let your friends know! If possible, report the message as spam.

Examples of real emails I’ve received from our school district, letting us know about things to look out for.

Examples of real emails I’ve received from our school district, letting us know about things to look out for.

Phishing Examples Try not to be fooled! Worksheet Activity 1 (pg. 20-21) Print and laminate enough for groups of two or three to share. Give students a few minutes to discuss the 5 examples, then discuss each one and share if it’s real and fake or why. (Answer key on pg. 19)

It’s time to visit Interland! Reality River Students will play Reality River in Interland. https://beinternetawesome.withgoogle.com/interland https://beinternetawesome.withgoogle.com/interland

How to respond to potential phishers. Who Are You, Really? How to respond to potential phishers. Worksheet Activity 2 (pg. 24) Use directions on pgs. 22-23, students will act out each scenario and class will discuss how to respond (pgs. 25-26)

Ignore Question Block Respond There are four ways to respond when you get a message from someone you don’t know: Ignore Block Question Respond Have this displayed on the board as students act out scenarios to help facilitate discussion.