Presentation is loading. Please wait.

Presentation is loading. Please wait.

Shopping experience! Avoiding online fraud Ian Ramsey C of E School

Similar presentations


Presentation on theme: "Shopping experience! Avoiding online fraud Ian Ramsey C of E School"— Presentation transcript:

1 Shopping experience! Avoiding online fraud Ian Ramsey C of E School
GCSE ICT Shopping experience! Avoiding online fraud

2 Starter: 3-2-1 Lift off! Do you think it is safer to use debit and credit cards in shops rather than using them online? Explain the reasons for your answer. (The text box will expand as you type). Yes, because if you don’t check the security of a website (if it has https or a padlock) then it could be very easy for somebody to take the information you’re putting into the website.

3 Lesson Objectives: By the end of this lesson you will be able to:
explain security risks and how to reduce them

4 Defrauding money: Stealing other people’s money by fraud has occurred throughout history, and criminals have learnt new tricks to defraud people using their card details. Before the use of ‘chip and PIN’ cards, criminals could use lost or stolen cards by copying the signature on the back when they were buying goods. Criminals can make a copy of your card – this is called ‘skimming’. Skimming can occur at retail outlets – particularly bars, restaurants and petrol stations – where a corrupt employee puts your card through a card reader without your knowledge. It electronically copies the data from the card’s magnetic stripe. Sometimes skimming takes place at cash machines, where a criminal has fitted a skimming device. A small camera can record the PIN number you typed in. Some criminals called ‘bin-raiders’, collect old receipts to find out your card details,.

5 Defrauding money - question:
Explain why it is important not to let your card out of your sight when you are paying for goods in a shop or garage. (The text box will expand as you type). Corrupt employees could put your card through a card reader, which electronically copies the data from the card’s magnetic stripe. This is called ‘skimming’. Have a look at this article for more information

6 ‘Card not present’ fraud:
When you buy goods online or on the telephone using a card, you cannot enter your PIN number – the card is not present at the place of purchase. You therefore have to give out lots of the card’s details, including the security code. With more people buying this way, ‘Card not present’ (CNP) fraud is now the most common type of fraud in the UK. The criminals do not need a card or even your PIN; all they need are your personal details and the security code on the back of your card. Did you know? In November 2014 online sales in the UK hit an all time monthly high of £10.1 billion.

7 How can criminals get hold of personal details?
The most common way is for hackers to install software called Trojans to spy on your computer. They can record all your key presses and send the information to criminals, who can find out your credit card details such as card number, expiry date, security code and password when you enter them. Some Trojans even take pictures of the screen on sites that require you to use the mouse instead of the keyboard. Trojans may be included in s – in the itself or as an attachment. Your computer can also be infected if you visit a malicious website, or through a glitch in the computer software that allows the Trojan to infect the computer directly from the internet.

8 Preventing Trojans and spyware:
Use the links provided below to read about how to prevent your computer being infected by Trojans and spyware. List 4 things that you should do. 1. Shouldn’t open attachments from unknown senders 2. Don’t download things from untrustworthy websites 3. Install firewall software on your computer 4. Keep your anti virus software updated Internet links eHow – how to prevent trojan viruses Be card smart online

9 Phishing: This is when fraudsters spam the internet with an claiming to be from a reputable financial institution (bank or building society) or e-commerce site. Phishing can also be done via text messages. The or text message tries to make you click on a link and update your personal profile or carry out a transaction. The link takes you to a fake website designed to look like the real thing. Any personal or financial information you enter will be sent directly to the scammer. Sometimes the criminals have most of your details except the security (CCV) code on the back of your card which cannot be read by a card reader. They can try to make their s look more official by giving the details that they already have, such as card number and name and address and just asking for the security code.

10 How to recognise a phishing email:

11 Exam questions: Rini installs anti-virus software on her new PC
State two other security measures Rini could set up on her PC (2 marks) 1. Anti-Spyware software 2. Firewall software Rini uses her new PC to set up an online bank account. Give one benefit to Rini of using online banking (1 mark) She doesn’t have to leave the house to do it The bank warns Rini about phishing. State what is meant by ‘phishing’. (1 mark) When an gets sent to a large amount of people from fraudsters, normally with an attachment that the customer will open that has a virus or Trojan on, or take you to a website that looks real so you put your information on but really it isn’t so they can copy your details.

12 Exam questions: Alex receives this email.
Identify three items in the that may cause Alex to be concerned. (3 marks) 1. Impersonal – ‘Account Holder’ 2. Urgency – ‘Open within 5 mins of receiving’ 3. It has an attachment Continued on next slide

13 Exam questions: Give two actions Alex should take after receiving this . (2 marks) 1. Make sure his anti-virus software and anti-spyware software is up to date. 2. Block the sender and delete the and report it.

14 Finally: 3-2-1 Lift off! Complete this paragraph about using credit card fraud. When criminals make a copy of your card it is called They can use a when you pay with your card at a shop or garage. When you use your card to pay online you do not use your and so criminals just need to know your card number, expiry date and the on the back of the card. skimming card reader PIN security code Drag and drop each word into the correct gap.


Download ppt "Shopping experience! Avoiding online fraud Ian Ramsey C of E School"

Similar presentations


Ads by Google