Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Dealing with Spam A CyberAngels Tutorial. Contents Introduction - What is spam? Conclusion Quick Quiz.
How to protect yourself, your computer, and others on the internet
Internet Online Safety How to have FUN and Stay in Control.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Security Issues: Phishing, Pharming, and Spam
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
How can you protect yourself from online identity theft?
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How to Read Outlook . Make sure the computer is on.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Now scroll to move on to the next slide. What is e-safety? E-safety is keeping safe when you are online. It means: Not giving out personal information.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Cyber Safety Jamie Salazar.
Phishing and online fraud What parents need to know.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Internet Safety.
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Scams & Schemes Scams and Schemes.
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Lesson 3 Safe Computing.
What to be aware of and how to avoid problems.
Information Security 101 Richard Davis, Rob Laltrello.
Scams and Schemes.
HOW DO I KEEP MY COMPUTER SAFE?
Phishing Don’t fall for fake
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Being Aware of What You Share
Presentation transcript:

Activity 4 Catching Phish

Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!

On the internet people trying to get your personal information (fish or phish) by sending out lots of messages (bait).

Phishing Phishing – the attempt to get personal information like usernames, passwords, and card details by pretending to be a person you can trust.

Identity Theft People sending phishing s are trying to get information from you. Full name Date of birth and where you were born

Current and previous addresses and phone numbers Driver’s license or passport number

Account numbers and the companies Where you hold accounts (e.g., Amazon, PayPal, etc.) Passwords

An example...

Spotting the Fakes Fake s try to trick you into giving your account information and passwords Think! Why are they asking for information they should already know? (Companies and Banks you use should already have your information)

Urgent response required: When the message says you have a limited time to respond, it is often the sign of a scam.

Spelling errors: Scam s often include spelling and grammar mistakes. A real company would not send out messages containing mistakes.

Link in or attachment: Phishing s often have a link in the or an attachment that they ask you to click on

This might link you to a site, or form where you give your information to criminals.

Too good to be true: Scam s often offer things too good to be true, like the chance to win free money or prizes.

You might see an that is not personally addressed to you.

Proper s from companies will be addressed to you, personally.

Identity thieves try to make you worry that something is wrong with your account.

To fix it you must respond to the quickly to fix it.

Activity Look at the examples of s on the sheet. Can you see anything which might mean they are fake phishing messages? Highlight anything suspicious on the picture.

Answers Did you spot the fakes?

Remember Avoid opening the message or in the first place Do not click on any links or download any attachments. They might contain viruses or spyware.

Do not reply! Mark as “junk mail” or “spam” and delete messages. You can also report problems on a social network site.

Some ways of asking for your details are cleverer than others!