Online Onguard Jeopardy Invest Quest Case of the Cyber- Criminal P2P Three Play Phishing Scams Spam Scam Slam Q $100 Q $200 Q $300 Q $400 Q $500 Q $100.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

How to protect yourself, your computer, and others on the internet
Internet Online Safety How to have FUN and Stay in Control.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Over 3,000 computers are affected monthly by Malware and Phishing.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Information Security Sharon Welna Information Security Officer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety Internet Safety LPM
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Internet Safety.
Information Security 101 Richard Davis, Rob Laltrello.
Cybersecurity Awareness
Protecting Your Identity:
9 ways to avoid viruses and spyware
Presentation transcript:

Online Onguard Jeopardy Invest Quest Case of the Cyber- Criminal P2P Three Play Phishing Scams Spam Scam Slam Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy

$100 Question from Invest Quest TRUE OR FALSE: Unless you work for the government, you can’t access background information on an investment promoter or company official. TRUEFALSE

$200 Question from Invest Quest TRUE/FALSE: Thanks to the nearly instantaneous speed of online transactions, you should focus your investing on special time-limited opportunities. When an offer is “once in a lifetime,” you can’t afford to wait! FALSE TRUE

$300 Question from Invest Quest TRUE OR FALSE: If you’re considering an investment, all you need to do is check out the company’s claims with references it provides. FALSE TRUE

$400 Question from Invest Quest Which of the following actions should you always take after you’ve finished using your online account? Minimize the window of your web browser program. Shut down your computer, wait at least 30 seconds, then reboot. Click on the “log out” or “log off” button on the website. Set your browser to “remember” your username & password the next time you visit the site. A B C D

$500 Question from Invest Quest Which of the following is the recommended way to verify claims about a company before you make an online investment? If the claim was made in an online newsletter, bulletin board or blog, copy down the URL and keep it in a handy place. Use unbiased sources like the U.S. Securities & Exchange commission. Contact the company directly. Ask friends & neighbors what they’ve heard. A B D C

$100 Question from Cyber-Criminal You have no idea what kind of anti-virus & anti-spyware protection your computer has, or whether you have a firewall. You should: Do nothing. Whatever the computer came with is probably just fine. Be sure to do all your online banking and shopping from that computer. Check the software on your computer to see if it’s active & up- to-date, then get new or updated software from a site or store you know & trust. Get free software from the pop-up ad you keep seeing. C A B D

$200 Question from Cyber-Criminal Before you enter your personal information online, you should find out: How the company collecting your information will protect it. Why the company needs it. With whom it might be shared. All of the above. B A C D

$300 Question from Cyber-Criminal Your bank sends you an asking for your personal info-your account number, password, and Social Security number. You should: Click the link in the to check the company’s website before providing the information. If the site looks legit, it’s OK to share your info. your information to the company right away. Delete the . If you think there’s a chance the message may be legitimate, call the company’s customer service line using the phone number on your billing statement. Reply to the and ask for details before you give away your valuable personal information. A B C D

$400 Question from Cyber-Criminal The optimal length and type of computer password is: A 6-character word you’ll remember. Your pet’s name, spelled backwards. Eight or more characters that mix letters, numbers, and symbols. The word “password.” A B C D

$500 Question from Cyber-Criminal What type of free software may include spyware? Electronic games Screen savers and toolbars Anti-spyware software All of the above C B A D

$100 Question from P2P Three Play TRUE/FALSE: File-sharing is safest when you set your controls so that your Internet connection is always on. TRUE FALSE

$200 Question from P2P Three Play TRUE/FALSE: Some file-sharing programs install spyware that can monitor your browsing habits and send that data to third parties TRUE FALSE

$300 Question from P2P Three Play TRUE/FALSE: To do file-sharing, your computer needs special software that connects your computer to an informal network of other computers running the same software. FALSETRUE

$400 Question from P2P Three Play TRUE/FALSE: Files you download could be mislabeled, hiding a virus or other unwanted content. TRUEFALSE

$500 Question from P2P Three Play TRUE/FALSE: If you don’t properly install & configure file-sharing software, you could give others access not only to the files you want to share, but also to personal information you don’t want to share. TRUEFALSE

$100 Question from Phishing Scams You receive an from your bank informing you that it suspects an unauthorized transaction on your account. To protect your account, the advises you to click on a link to verify your identity. Should you do so? A B No way-the whole thing sounds ‘phishy.’ Yes-immediately click on the link to verify your identity. Yes-but first you should make sure the message looks like it’s legitimate. C

$200 Question from Phishing Scams You’re surfing the Web when you see a pop-up message from your Internet Service Provider saying that it needs you to click on a link to verify or update your account information. Should you comply ? A B Click on the link-it sounds like a reasonable request. Then find out what info they need. No-legitimate companies would never ask for information this way. Yes, immediately-if you don’t, you run the risk of losing all of your messages. C

$300 Question from Phishing Scams Despite all your precautions, you suspect you’ve been ‘phished‘-and provided personal information to someone pretending to be your bank. What should you do? A B Don’t worry. Because you gave your information in good faith, there’s no way anything wrong will happen. Contact your local marine sports licensing board to see whether that bank has a valid ‘phishing license. File a complaint with the FTC & check out their info on identity theft. C

$400 Question from Phishing Scams Let’s say you work for an organization with an excellent information technology department. Your network administrator sends you an warning of a security breach and asking you to confirm your password by entering it into a secure website. What should you do? A B Don’t enter your password on the website. Instead, report this incident by calling you IT office, or ing them at an address you know to be genuine. Don’t enter your password on the website. Instead, your password to the sender. Immediately enter your password at the website. You can always trust s from your own organization. C

$500 Question from Phishing Scams Onguard Online suggests several ways to avoid getting hooked by a phishing scam, including reviewing credit card and bank account statements as soon as you receive them. How can this help you avoid being scammed? A B It’s a quick way to be sure you’re solvent. If you have money in the bank, or credit, you’re still a player. You can know quickly whether someone has started using your account. Then, you can alert the authorities and stop the problem. It will give you something to do while waiting to see if the scammers have drained your account. C

$300 Question from Spam Scam Slam Let’s say you receive spam. Which are the next 3 steps you should take (PICK 3)? Reboot Be skeptical Don’t respond, but DO delete Add more memory to your computer Clean your computer monitor Change your phone number ASAP Forward the to a friend Forward the spam to

BACK TO QUESTION GOT ALL 3? UPDATE SCOREBOARD

$400 Question from Spam Scam Slam Which 3 of these sound like fraudulent spam (PICK 3)? Wipe out debts! Consolidate Bills! Let federal laws work for you! Lose up to 2 pounds a day with revolutionary new miracle diet pills! Play in foreign lotteries- great odds, big payoff! Your account has been compromised. Please click to verify your information $$$Millions tied up in foreign Bank…May we transfer it To your account? Turned down by banks? Bad credit? We’ll pre-qualify you for a Small fee!

$500 Question from Spam Scam Slam What are 4 ways to avoid being scammed by spam (PICK 4)? Never let children play on computer Always backup data On reliable storage media Protect your personal And credit card information Maintain a high-speed Internet connection Always watch for s Containing the word ‘spam’ Never pay for a free gift, Always get promises in writing and review before buying Know the identity, address, and phone number of companies You’re dealing with

Final Jeopardy In the MySpace Case, what was the name of the fictitious boy who pretended to be Meghan Meier’s friend?

Final Jeopardy Answer Josh Evans

SCOREBOARD

UPDATE SCOREBOARD