Victoria ISD Common Sense Media Grade 6: Scams and schemes

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Cyber Safety Assessment Review
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
What is Identity Theft, and how can you protect yourself from it?
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
How It Applies In A Virtual World
Security Issues: Phishing, Pharming, and Spam
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Jeff loses his identity! Lesson 5: Identity Theft.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Internet Safety.
Mrs. Esman Computer Special
Fraud Protection.
Scams & Schemes Common Sense Media.
Fraud protection.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Lesson 3 Safe Computing.
Lesson 2- Protecting Yourself Online
Scams and Schemes.
Digital Citizenship Unit 1 * Digital Life * Strategic Searches
Being Aware of What You Share
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Presentation transcript:

Victoria ISD Common Sense Media Grade 6: Scams and schemes

What is identity theft, and how can you protect yourself from it? Essential Question What is identity theft, and how can you protect yourself from it? Overview: Students learn strategies for guarding against identity theft and scams that try to access their private information online. They learn what identity theft is, what kinds of information identity thieves want, and what can be done with that information. Students then analyze phony emails and identify tricks that identity thieves use online. Finally, they create a phishing email that includes the features that they have learned about, and see if classmates can identify the scams.

Objectives The students will be able to… Understand what identity theft is and why it is important to guard against it. Learn to recognize strategies that scam artists use to access private information. Learn how to guard against phishing and identity theft. Materials and Preparation Paper and markers or colored pencils (or computers with Microsoft Office if you are using the high-tech option in Teach 3). Copy the Spotting Scams Student Handout, one for each student. Review the Spotting Scams Student Handout — Teacher Version. Estimated time: 45 minutes Family Resources Send home the Online Security Family Tip Sheet (Middle & High School). (OPTIONAL)

Vocabulary Scam: an attempt to trick someone, usually with the intention of stealing money or private information Identity theft: a type of crime in which your private information is stolen and used for criminal activity

Vocabulary, cont. Vulnerable: in a position that makes it easier for you to be harmed or attacked Phishing: when people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information

Introduction: Warm-up Do you know someone who has been scammed? What happened? Warm-up (5 minutes for all 3 questions) Students might tell stories of instances in which someone has been convinced to send someone else money or purchase a fake or bad product.

Introduction: Warm-up What is the purpose of a scam? What tricks do people use to carry out a scam? Students should understand that the ultimate purpose of a scam is to get someone to give the scammer money, or information that can help the scammer steal money, such as a credit card number, ATM code, or password. To accomplish this, scammers tell lies and often pretend to be someone they are not.

Introduction: Warm-up Can people get scammed on the Internet? How? Allow students to tell stories of friends or relatives who have been scammed online. Then encourage them to revisit what they know about scams, and how they might be used online. Sample responses: 􀂇Someone can be tricked into buying a bad or fake product online 􀂇Someone can be lured into sharing information that a scammer can use to steal from them EXPLAIN to students that they will be learning about a variety of online scams, including which kinds of information scammers look for, and how that information can be used. They will also learn how to protect themselves against online scams.

What Is Identity Theft? People who scam don’t always get money from them directly Use variety of strategies to trick people into giving out private information Use information to access bank and credit card accounts Even recreate someone’s identify Produce false documents (social security cards, drivers’ licenses, etc.) (10 minutes) POINT OUT to students that people who scam others online don’t always have to get money from them directly. Instead, they use a variety of strategies to trick people into giving out private information. They then use this information to access their bank and credit card accounts or other personal accounts. They can even “re-create” someone’s identity and produce false documents, such as Social Security cards, credit cards, or drivers’ licenses in someone else’s name.

What Is Identity Theft? Can you guess what kinds of personal information identity thieves might look for? REVIEW the list on the following slide with students. Emphasize that identity thieves look for any information that might help them pretend to be their victims. Write the list on the board or have students take notes.

What Is Identity Theft? Personal Information Full name Date of and place of birth Current/previous addresses/phone numbers Driver’s license or passport numbers Account numbers, companies’ names (ex: Amazon, iTunes, PayPal, Dillard’s) Passwords Social Security Number Discuss with students the reasons this information is important and useful for scam artists.

Anyone on line is vulnerable! …Vulnerable: in a position that makes it easier for you to be harmed or attacked Anyone on line is vulnerable! EXPLAIN that anyone is vulnerable to an online scam. Although teens might not think they’re at risk, there are a few important reasons why they are vulnerable to identity theft – and why it matters. Cover the following points: 􀂇Identity thieves look for “clean” Social Security numbers that haven’t yet been used to get credit. They target teens and kids, who often have Social Security numbers that have no credit history yet. Identity thieves might sell or use these numbers, which would allow someone else to get a credit card or loan and build up debt under your name. 􀂇Being a victim of identity theft can ruin your financial future and your ability to obtain loans and purchase things. For example, it could affect your ability to get a student loan for college or a loan to buy a car. 􀂇In addition, if you use your parents’ accounts and credit cards online, or fill out forms with your parents’ information, you are sharing information that could potentially put your parents’ identities at risk. 􀂇It can take months, even years, to recover your identity if it’s stolen. Cleaning up such a mess takes a lot of time and energy, and it can also be expensive.

How do you think identity thieves might try to get your information? How to Catch a Phish How do you think identity thieves might try to get your information? (Phishing: when people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information) 15 minutes Encourage students to share some responses, even if they have not previously encountered identity theft.

How good are you a spotting potential scams? How to Catch a Phish How good are you a spotting potential scams? EXPLAIN to students that the best way to avoid phishing scams is to be skeptical about any online request for personal information. It’s also good to be skeptical of online messages or posts from friends that seem out of character for them, which is a warning sign that their accounts have been hacked. There are clues that can help students spot phishing, and they will learn some of these in the next part of the lesson by studying one type of phishing scam: a phony email message. DIVIDE students into pairs. DISTRIBUTE the Spotting Scams Student Handout, one per student or divide students into groups and provide 1 per group. READ aloud the instructions found on the Spotting Scams Student Handout – Teacher Version, and share with students the extended explanation of each feature of a phishing email. INSTRUCT student pairs or groups to complete the handout together. When students are done, have two pairs or groups get together to exchange their handouts and compare their answers. INVITE volunteers to share their answers with the class. Use the Spotting Scams Student Handout – Teacher Version for guidance. REMIND students that phishing emails can be very convincing, and some may not contain many of the clues they just learned about. So it’s smart to distrust any email that asks them to provide private information.

Phishing Examples Consumer Fraud Reporting Example 1

Phishing Examples Facebook Huffington Post article, “Facebook Scams You Need to Know About”

Protect Yourself from Online Scams Protect yourself…follow the rules Avoid opening the message or email in the first place Don’t click on any links or download and attachments. They might contain viruses or spyware. Don’t reply Mark as “junk mail” or “spam” for your email provider, or report it to your social network site. If you are concerned about an account you have with a company, contact its customer service by phone. Make sure you verify the company’s contact information elsewhere online first. 10 minutes TELL students that they can also protect themselves from Internet scams by learning how identity thieves think. They will create a phishing email, or some other form of online or mobile scam, using what they learned about phishing scams. INSTRUCT students to choose at least four of the eight features of a phishing email listed in their Spotting Scams Student Handout. Have them create a phishing email that demonstrates the four features they choose to highlight. INVITE students to present their examples to the class. Classmates can try to identify which features tipped them off to the fact that this is a phishing email.

What kinds of information do identity thieves look for and why? Wrap-up What kinds of information do identity thieves look for and why? Students should respond with examples of private information, such as full name, address, date of birth, account numbers, and passwords. Identity thieves try to use this information in order to “re-create” someone’s identity for unlawful purposes, mainly to secure loans and buy things.

How do thieves try to get at your information? Wrap-up How do thieves try to get at your information? Thieves use phishing to try to get at people’s personal information. Have students discuss some of the features of phishing they learned about.

What can you do to avoid falling for online scams? Wrap-up What can you do to avoid falling for online scams? Students should remember to be suspicious of any online communication that asks for private information, or that seems out of character for a friend to have sent or posted. Students should know not to reply to such messages, not to click on any links or attachments, and to report the message as spam or junk to their email provider or social network site. If they are concerned about one of their accounts, they should call the company’s customer service department using a number they found elsewhere online – not within the message they received.

Forward spam emails to spam@uce.gov Wrap-up You or your family can go to www.ftc.gov/idtheft for help if identity has been stolen Forward spam emails to spam@uce.gov

Extension Activity Try your luck with the Spam Scam Slam game http://www.onguardonline.gov/media/game-0012-spam-scam-slam

Lesson Assessment 1. A type of crime in which your private information is stolen and used for criminal activity is called: a) Identification b) Identity theft c) Burglary

Lesson Assessment 1. A type of crime in which your private information is stolen and used for criminal activity is called: a) Identification b) Identity theft c) Burglary

Lesson Assessment Evan sees the following message in his inbox:

Lesson Assessment Which of the following is NOT a warning sign that this message is a scam: a) The offer sounds too good to be true b) It asks Evan for his private information c) Evan is addressed as “Sir”

Lesson Assessment Which of the following is NOT a warning sign that this message is a scam: a) The offer sounds too good to be true b) It asks Evan for his private information c) Evan is addressed as “Sir”

Lesson Assessment 3. Sara finds a message on her phone that she thinks might be a scam. She should: a) Forward the message to her friends to see if they think it’s a scam too b) Reply and ask the sender not to send more mail c) Delete the message

Lesson Assessment 3. Sara finds a message on her phone that she thinks might be a scam. She should: a) Forward the message to her friends to see if they think it’s a scam too b) Reply and ask the sender not to send more mail c) Delete the message