 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.

Slides:



Advertisements
Similar presentations
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
Advertisements

Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
ICT at Work Banking and Finance.
Protecting Your Identity: What to Know, What to Do.
Identity Theft.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Identity Theft Kayla Brooks 7 th Grade Marshall Middle School Mr. Dryer.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
Simon’s Situation… When Simon lost his wallet, he thought it was a pain. He had over $50 in it, and his driver’s license and bank card. The next day he.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Reason for Cyber Crime Pursuit of fame Purely out of mischief For finance means To get revenge on someone they hate Purely to pursuit criminal.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
August 19 & 22, Objectives  Identify adequate, reliable information resources for personal and family problem solving.  Explore ways to prevent.
PORTFOLIO 1 CITIZEN MUHAMMAD TAUFIQ BIN TAHA FA
By: Asfa Khan and Huda Mukhtar
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Identity Theft How it happens and how to avoid it.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Cyber Safety Jamie Salazar.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Computer crimes.
Staying Secure Online How do we buy and sell safely on the Internet?
INTRODUCTION & QUESTIONS.
Identity Theft One of America's fastest growing crimes.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused by identity.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Mrs. Esman Computer Special
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
How do we buy and sell on the Internet safely?
Protecting Your Identity:
Sissy r. osteen, ph.d., cfp® Oklahoma State University
When you get caught for Identity Theft
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Protecting Your Credit Identity
Presentation transcript:

 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire passwords and other info by posing as a trustworthy individual.  Cybercrime: Committing a crime using computers or the internet.  Credit report: A detailed report of a person’s credit history.

 While shopping online, I used a debit card on an unsecure website and my pin was stolen. From then on, the hacker had access to my money, social security number, and other personal information.  My wife ended up leaving me alone with only the dog for company, since she couldn’t deal with our financial crisis.  (Unfortunately, I had to eat the dog)

 Soon, I was extremely stressed out and developed severe anxiety and was unable to continue my job  I had no money left in my bank, and couldn’t find a job because no company would hire me because of the damage to my reputation caused by the hacker.  I spent the rest of my time on the streets, begging, and eventually got arrested on purpose so I could have 3 hots and a cot.

 If you don’t want to end up like me, listen close.  Never give out any personal information to anyone you aren’t absolutely sure is a legitimate businessman.  Shred documents with personal information attached to them.  If you are shopping online, make sure the site is safe.  Issue a stop payment with credit cards and banks if your information is stolen.