ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft Occurs “when the perpetrator wrongfully acquires and uses a consumer’s personal information, credit or account information.” –Used to.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.
What is identity theft, and how can you protect yourself from it?
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 13-1 Today’s Topics n Consumer Fraud.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Bell Ringer10/22/2013 Who are crime Victims? Briefly identify who they are and who they assault.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
Protecting Your Identity While Attending College.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Scams & Schemes Common Sense Media.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
IDENTITY THEFT: WHO’S AT FAULT? ERIC LAMBERT. THESIS I BELIEVE THAT IDENTITY THEFT IS A HUGE PROBLEM THAT IS AFFECTING SOCIETY AND THAT WE NEED TO FIND.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
CptS 401 Adam Carter. Change in schedule  Updated online copy  Tomorrow: read
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
ICT and Crime A POWERPOINT PRESENTATION By Add your name(s) here ICT and Crime Read and delete: You may change the order of slides if you wish. Use pictures.
Vocabulary 2.02 – Understanding Threats to Financial Security LIFE Gwishiri.
Now scroll to move on to the next slide. What is e-safety? E-safety is keeping safe when you are online. It means: Not giving out personal information.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
ICT & Crime Introduction. Homework read THREE stories from ict.com/news/news_stories/news_crime.htm & produce a 3-fold leaflet describing/discussing.
Computer crimes.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
S CAMS AND S CHEMES. I DENTIFY T HEFT Someone unlawfully obtains and uses a person’s personal data to commit fraud or deception for financial gain Opens.
Identity Theft!!! Bill Ketjen Matt Grodhaus Two forms of crime IDENTITY THEFT  Using personal information for deception IDENTITY FRAUD  Using personal.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Chapter 6 What is identity theft?.  What are the three Credit Bureaus which you can obtain your FICO SCORE?  Is a high FICO score a measure of winning.
By: Micah Stevens Identity Theft in the World Today.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Identity Theft It’s a crime!
Identity Theft Chelsea Weser.
Antisocial use of ICT and Computer Fraud
Cyber Security Awareness Workshop
“Credit score vocabulary”
Identity Theft By Omer Ersen.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

ICT & Crime Identity theft & fraud

Homework Worksheet – due back on Monday

What is fraud? Put simply, fraud means trying to trick someone in order to gain an advantage. Some of the most common forms of computer fraud include phishing & pharming. Today we will look at other types: Promising 'get rich quick' schemes Stealing your identity in order to pose as you to steal your money or some other criminal activity.

Starter (15 minutes) How much do you know about phishing & pharming? Try this quiz: st.html

Activity 1: 10 minutes Examples of online fraud: Scams.mpg NigerianScams.flv What methods are used by the fraudsters?

A different type of scam: New type of Nigerian Scam.flv What type of people do these fraudsters target? How do you think people can protect themselves against these kind of scams?

What is identity theft? Identity Theft is on the increase –With enough personal details criminals can impersonate you to obtain credit cards, loans and goods in your name i.e. you’ll be left to pick up the bill! –Citibank ID theft advert

Activity 2 (10 minutes) 1.Identity theft – do you know who you are?.flv 2.WillSmith Was the victim of IdentityTheft.flv How does Identity theft happen? What type of people are conned by these scams? 3.Identity Theft1.mpg & Identity Theft2.mpg How can people protect themselves?

Protecting yourself Identity Theft – can you protect you.flv

Plenary How many of you use facebook? How many use apps such as “who is your #1 fan?”, “Who is following you?” etc ick_online/ stm