Scams & Schemes Common Sense Media.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Part I: Making Good Online Choices
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
SECURITY CHECK Protecting Your System and Yourself Source:
1 Identity Theft and Phishing: What You Need to Know.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
Security Issues: Phishing, Pharming, and Spam
Over 3,000 computers are affected monthly by Malware and Phishing.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
How can you protect yourself from online identity theft?
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
By: Asfa Khan and Huda Mukhtar
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
Phishing and online fraud What parents need to know.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Identity Theft One of America's fastest growing crimes.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Internet Safety.
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Lesson 3 Safe Computing.
Scams and Schemes.
Digital Citizenship Unit 1 * Digital Life * Strategic Searches
Being Aware of What You Share
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Scams & Schemes Common Sense Media

Vocabulary Scam Identity Theft – an attempt to trick someone, usually with the intention of stealing money or private information - a type of crime in which your private information is stolen and used for criminal activity

Vocabulary Phishing Vulnerable – when people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal information. – in a position that makes it easier for you to be harmed or attacked

Think About? What is the purpose of a scam? What tricks do people use to carry out a scam? Can people get scammed on the Internet? How? Do you know someone who has been scammed? What happened

What is Identity Theft? People who scam don’t always go for money, they use a variety of strategies to get private information. Private info used to get access to bank & credit card accounts or other personal accounts Even “re-create” someone’s identity & produce false documents

Kinds of personal info thieves look for Full name Date of birth & location Driver’s license or passport number Social security number Passwords Account #’s & the companies where you have accounts Current & previous addresses & phone numbers

Teen’s Vulnerable Look for “clean” SS numbers – haven’t been used to get credit yet Thieves may sell or use them Being a victim can ruin your financial future If using parents’ info & cards online putting them at risk Can take months, even years to recover your identity & may be expensive

How to catch a phish? Be skeptical about online requests for personal info Be skeptical about online messages from friends that seem out of character (account hacked)

Clues to Spotting A Scam Email Need to verify account information Sense of urgency Spelling errors Too good to be true Generic greeting Accounts in trouble link in email or attachment

Protecting Yourself Online Avoid opening the message or email Don’t click on any links or download attachments. Might contain viruses or spyware Don’t reply Mark as “junk mail” or “spam” If concerned about an account contact customer service by phone.

Consumer Fraud Reporting http://www.consumerfraudreporting.org/phishing_examples.php www.huffingtonpost.com/2011/05/22/facebook-scams-hacks-attacks_n_864906.html#s281483&title=Fake_Page_Spam

Wrap Up What kinds of information do identity thieves look for – and why? How do thieves try to get at your information? What can you do to avoid falling for scams?

Helpful websites Forward spam emails to spam@uce.gov Stolen Identities www.ftc.gov/idtheft