SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

How to protect yourself, your computer, and others on the internet
Part I: Making Good Online Choices
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
SECURITY CHECK Protecting Your System and Yourself Source:
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
How can you protect yourself from online identity theft?
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Now scroll to move on to the next slide. What is e-safety? E-safety is keeping safe when you are online. It means: Not giving out personal information.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
Imagine receiving a real live from Walt Disney, Jr. himself? Hard to believe but enough people actually did to make this Disney hoax a real problem.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Mrs. Esman Computer Special
Fraud Protection.
Scams & Schemes Common Sense Media.
Fraud protection.
Phishing, identity theft, and more
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Lesson 3 Safe Computing.
Cybersecurity Awareness
Scams and Schemes.
Phishing Don’t fall for fake
Digital Citizenship Unit 1 * Digital Life * Strategic Searches
Being Aware of What You Share
Presentation transcript:

SCAMS & SCHEMES PROTECTING YOUR IDENTITY

SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION WHAT IS THE PURPOSE OF A SCAM? GIVE SCAMMER $$ OR INFORMATION THAT CAN HELP THE SCAMMER STEAL $$. CC #, ATM CODE, PASSWORDS TRICKS TO CARRY OUT SCAMS TELL LIES PRETEND TO BE SOMEONE THEY ARE NOT LURING YOU TO SHARE PERSONAL INFORMATION TYPES BUY BAD OR FAKE PRODUCT LURED INTO SHARING INFORMATION

IDENTITY THEFT TYPE OF CRIME IN WHICH YOUR PRIVATE INFORMATION IS STOLEN AND USED FOR CRIMINAL ACTIVITY SCAMS DON’T ALWAYS GET MONEY STRATEGIES TO GET PRIVATE INFORMATION INFO USED TO ACCESS BAND AND CREDIT ACCOUNTS OR OTHER PERSONAL ACCOUNTS “RE-CREATE” SOMEONE’S IDENTITY & PRODUCE FALSE DOCUMENTS LIKE SOCIAL SECURITY CARDS, CC, OR DRIVER’S LICENSE

INFORMATION THIEVES WANT FULL NAME DOB, LOCATION CURRENT & PREVIOUS ADDRESS & PHONE #S DRIVER’S LICENSE/PASSPORT # ACCOUNT NUMBERS AND COMPANIES PASSWORDS SOCIAL SECURITY #

VULNERABILITY POSITION THAT MAKES IT EASIER FOR YOU TO BE HARMED OR ATTACKED THIEVES ARE AFTER VULNERABLE PEOPLE ANYONE IS VULNERABLE TO ONLINE SCAMS TEENS CLEAN SS #, NOT USED TO GET CREDIT YET

PHISHING PEOPLE SEND YOU PHONY S, POP-UP MESSAGES, SOCIAL MEDIA MESSAGES, TEXTS, CALLS. OR LINKS TO FAKE WEBSITES IN ORDER TO HOOK YOU INTO GIVING OUT YOUR PERSONAL AND FINANCIAL INFORMATION AVOID BY BEING SKEPTICAL WITH ONLINE REQUESTS FOR PERSONAL INFO WEIRD MESSAGES FROM FRIENDS = HACKED ACCOUNT

FEATURES OF PHISHING NEED TO VERIFY ACCOUNT INFORMATION SENSE OF URGENCY SPELLING ERRORS ALERT THAT YOUR ACCOUNT IS IN TROUBLE LINK IN OR ATTACHMENT TOO GOOD TO BE TRUE GENERIC GREETING

SPOTTING A SCAM DIVIDE INTO GROUPS COMPLETE HANDOUT GET WITH ANOTHER GROUP AND COMPARE ANSWERS PHISHING S CAN BE VERY CONVINCING LOOK FOR FEATURES WE JUST COVERED DISTRUST ANY ASKING FOR PERSONAL INFORMATION

PROTECTING YOURSELF AVOID OPENING SUSPICIOUS MESSAGES OR S DON’T CLICK ON ANY LINKS OR DOWNLOAD ATTACHMENTS DON’T REPLY MARK AS “JUNK MAIL” OR “SPAM” CONTACT ACCOUNT CUSTOMER SERVICE BY PHONE IF CONCERNED

CREATE A PHISHING CHOOSE AT LEAST 4 OF THE 8 FEATURES OF A PHISHING CREATE A MESSAGE AND SEND TO MR. KURTZ

WHERE TO GET HELP FEDERAL TRADE COMMISSION FORWARD SPAM MESSAGES TO:

WRAP-UP WHAT KINDS OF INFORMATION DO IDENTITY THIEVES LOOK FOR? WHY? FULL NAME, ADDRESS, DOB, ACCOUNT #, PASSWORDS USE INFO TO “RE-CREATE” SOMEONE’S IDENTITY HOW DO THIEVES TRY TO GET AT YOUR INFORMATION? PHISHING

WRAP-UP WHAT CAN YOU DO TO AVOID FALLING FOR ONLINE SCAMS? BE SUSPICIOUS OF ANY ONLINE COMMUNICATION THAT ASKS FOR PRIVATE INFORMATION AVOID COMMUNICATION THAT SEEMS OUT OF CHARACTER FOR A FRIEND DON’T REPLY TO SUSPICIOUS MESSAGES DON’T CLICK ON ANY LINKS OR ATTACHMENTS REPORT AS SPAM