Presentation is loading. Please wait.

Presentation is loading. Please wait.

Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?

Similar presentations


Presentation on theme: "Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?"— Presentation transcript:

1 Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?

2 Identity Theft A crime in which someone wrongfully obtains and uses another person's personal data Types: ◦ Phishing ◦ Skimming ◦ Credit Card theft video

3 Phishing attempt to acquire identity of someone by asking for sensitive information ◦ i.e. username, password, credit card number. Watch Out For …being asked to update personal information (password, credit card, social security number). ** A legitimate business will always ask for the information on a secure website or in person.

4 Skimming illegal copying of information from the magnetic strip of a credit or ATM card. Watch out for… unusual devices on the ATM swipe machine

5 Credit and Debit Card Theft Fraud spree: unauthorized charges on existing accounts. Hackers can steal account information from personal computers or company computers.

6 2 types of Credit Card Fraud Account takeovers involve the criminal hijacking of an existing credit card account. Application Fraud opening of credit card accounts in another person's name.

7 Some ways thieves steal your information lost or stolen cards Your mailbox Stealing your pin during a purchase Your trash Hacking Email Over the phone Personnel records Employees of a business steal card info

8 Fraud Deliberate deception usually for economic gain. Examples of Fraud: ◦ Ponzi Schemes ◦ Pyramid Schemes ◦ On line scams

9 Ponzi Scheme named after Charles Ponzi (early 1900’s) convince people to invest in a fake company for great returns. Once the scam artist feels that enough money has been collected, he disappears – with the money

10 How do they work? 1. Convince a few people to invest. 2. Return some money to investors 3. Convince more investors based on success… many original investors will invest again 4. Repeat steps 1 through 3 a number of times. 5. Before step 2 in one of the cycles, disappear Bernie Madoff

11 Pyramid Scheme investment where each paying investor recruits two other investors. The first investor makes money from his recruits… they make money by recruiting more People at the top make money from people on the bottom

12 The main characteristic of a pyramid scheme is that participants only make money by recruiting more members. How Do Pyramid Schemes Work? Ponzi v. Pyramid

13 Online Fraud Work at Home Ads ◦ Too good to be true Fake charity organizations ◦ Natural disasters are popular “Be part of one of America’s Fastest Growing Industries. Be the Boss! Earn thousands of dollars a month from home”

14 Malware “malicious software." It includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. Can be used for fraud


Download ppt "Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?"

Similar presentations


Ads by Google