Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Internet Online Safety How to have FUN and Stay in Control.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Office of Regulatory Services Department of Justice and Community Safety By the Office of Regulatory Services, Department of Justice and Community Safety.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
Phishing on the Internet? Presented by Naveed Farooq Naveed Farooq Admin Nidokidos Network Make Money Online | Join Nidokidos Forum |
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Information guide.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Cybersafety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
Common Scams Lewis Collantine & Clare Cunningham Thurrock Trading Standards 8 th September 2015.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Internet Safety LPM
Now scroll to move on to the next slide. What is e-safety? E-safety is keeping safe when you are online. It means: Not giving out personal information.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Internet Safety.
Protecting Your Assets By Preventing Identity Theft
Gosbecks E-Safety Guide
Fraud Protection.
Fraud protection.
Learn how to protect yourself against common attacks
Internet Fraud By (NAMES).
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Don’t Get Scammed on Your Way to College and Avoiding Identity Theft
Presentation transcript:

Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods

Knowledge Check

What is Cyber Crime? Criminal activity (electronic device with a connection to the internet.) 44% of adults were victims in Device can become infected within 5 minutes. Cost the UK £27bn (2011).

Identity Theft Using another's personal details to obtain credit, loans. 9.9 million people affected per year. 19 victims every minute. If caught early it can be resolved.

How do they do it? Phishing – Criminals pose as ‘legitimate companies’. hundreds of people from the Suckers List. people reply criminals now have everything they need to steal your identity.

Tips to Prevent ID Theft 1.Shred anything with your details on. 2.Check your statements and report anything suspicious. 3.Ensure your home network is secure. 4.Ignore s saying “You’ve Won…” or from somebody you’re suspicious about.

Phishing A bad day ‘phishing’, beats a good day working: 2,000,000 s sent 100,000 delivered to recipient 5,000 click on the Phishing link 100 enter personal details £1,200 from each person who enters information Potential Reward: £120,000 David Levi made over £360,000 from 160 people

GENUINE ? LOOKS IT! GENERIC GREETINGS ATTACHMENT BIG DANGER ATTACHMENT BIG DANGER DID YOU MAKE A TAX RETURN?

Prevention Tips Be cautious of s that request your details. Companies will not ask via . From someone you don’t know/contains an attachment - delete it. Call the sender to confirm that it was them that sent it.

Mass Market Scam Mail (MMSM) Receiving a letter or saying someone has won a lottery or a prize. A person will input their details to claim the “prize”. Criminals then obtain personal details, inc. bank details to steal money.

Prevention Tips You cannot win money/a prize if you haven’t entered into any competition. You do not have to pay a fee to claim a legitimate prize. Do not give personal information Delete the straight away!

Common Scams – Online Shopping Deceitful shopping's scams reliant on the secrecy of the internet. Whilst majority of auction sellers are genuine, there’re some who sell fake goods. Sellers use these sites to “sell” popular items.

Which one is fake? Dashes not used "HTTPS" S = Secure "HTTPS" S = Secure Periods are used

Site One

Site Two Company Name Not Well Designed Prices to low

Fake Virus Software – Example One

Fake Virus Software – Example Two No Yes/No Buttons Unnecessary Detail Unnecessary Detail

Romance Scams Cost £24.5 million per year. 2,800 online dating crimes are reported. 55% of all reported crimes came from year olds and 63% from females. Victims are fooled by criminals using fake personal profiles. Gain the trust of their victims, then request money.

Prevention Tips Don’t put yourself and your identity in jeopardy. Do not reveal to much/protect your privacy. Never send money to people you haven’t met. Keep all communication on the dating website. Be courteous when "keep this is a secret" is motioned

Mobile Phone Scams Receiving a text from an unknown number saying you have won and that you need to claim money/prize. Costs to text back are an extortionate amount.

Prevention Tips Do NOT reply to text messages that offer you money. Do NOT reply to text messages encouraging you to enter a competition. You may have to call a premium rate number - Do NOT phone them back.

Prevention Methods Secure websites and an internet safety software. Responding to unusual s can put you on a ‘Suckers List’ – Do NOT reply. Banks never ask for personal bank details via . Do NOT reply. Be aware of your surroundings – never reuse a password. – his password is How about 5t3vE123 ? Capital letter and numbers included. Capital letter and numbers to spell ‘Steve’ This is stronger.

Viruses and Anti-Virus Via , websites & portable devices. Vital that you have some form of Anti- Virus protection. Strongly recommended that you use additional protection. Payware an freeware software out there, bought in most technology shops.

10 Golden Rules 1.There’s no guaranteed get-rich-quick schemes - sound to good to be true? 2.Never send money or give out your details when you do not know/trust the person or company you are giving them to. 3.Destroy personal information, shred documents, credit cards etc. 4.Log directly onto a website rather than clicking on the link provided. 5.Never reply to spam s, even when you're trying to stop them. 6.Always remember: scammers are cunning and clever. They know how to manipulate you to produce the response they want. 7.Legitimate banks and companies will not ask for your details via or phone. 8.Just because a company has a well design website doesn't means it ligitimate. 9.Be suspicious. If you are unsure about anything, seek advice from family or Police. 10.Never get embarrassed by reporting a scam – If you spot a scam or have been scammed contact ActionFraud on or visit their website at

Thank you! Feel free to ask any questions!