Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting Senior Citizens from Phishing s

Similar presentations


Presentation on theme: "Protecting Senior Citizens from Phishing s"— Presentation transcript:

1 Protecting Senior Citizens from Phishing Emails
Marcus Mickle May 5, 2015

2 Introduction Email is a popular means of Internet communication.
In order to protect your sensitive information while using , it is important to learn how to avoid scams.

3 Introduction (continued)
This distance learning lesson is designed to introduce you to safety rules, and provide you with helpful tips to identify and avoid scams. Please remember to fill out the course evaluation at the end of the course.

4 Agenda Overview Vocabulary Instructional Goal Statement
Course Objective What are phishing s? Safety Rules

5 Agenda (continued) Identify and Avoid Phishing
Practice Avoiding Phishing using the Phishing Scams game Summary Where to Get More Information Course Assessment Course Evaluation

6 Overview scams are an illegal attempt to steal your sensitive information including (social security numbers, credit card numbers, bank account numbers, and passwords) using .

7 Vocabulary Glossary of terms:
Attachments - a computer file that is part of the . Links - highlighted words or images within the that can be clicked to navigate directly to a Website. Phishing - an illegal attempt to steal your sensitive information using an scam.

8 Vocabulary (continued)
Glossary of terms: Pop-up messages – a message window that suddenly appears on the computer screen. Virus attack – a computer virus that spreads to the software on the computer and causes the computer to malfunction.

9 Instructional Goal Statement
Senior citizens that are at least 65 years of age will be able to identify and avoid phishing s using safety rules.

10 Course Objectives At the end of the course you should be able to:
Describe phishing s. Identify five safety rules. Identify and avoid phishing s.

11 What will you learn today?
What are phishing s?

12 What are phishing emails?
Phishing s are when cybercriminals use fraudulent s, links, attachments, and pop-up messages to look as if it is a legitimate business, to trick you into giving them your sensitive information.

13 What are phishing emails?
An example of a phishing Dear Customer, (Notice that your name was not used.) This is a reminder to inform you that your account is pass due. To avoid interruption and to add funds to your account, logon to (Notice the link.) You have up to 4 hrs or your account will be closed. (Notice the threat to close your account).

14 What will you learn today?
Five safety rules.

15 Rule #1 – If you do not recognize
safety rule #1 Rule #1 – If you do not recognize the sender of the . DELETE the .

16 Email safety rule #1 Please remember rule #1
I If you do not recognize the sender of the . DELETE the .

17 Rule #2 – Protect your personal
safety rule #2 Rule #2 – Protect your personal information. DO NOT send personal information via .

18 Email safety rule #2 Please remember rule #2 I Protect your personal
information. DO NOT send personal information via .

19 Rule #3 – Links in emails may take
safety rule #3 Rule #3 – Links in s may take you to the Website of cybercriminals. DO NOT click on any links within an .

20 Email safety rule #3 Please remember rule #3
I Links in s may take you to the Website of cybercriminals. DO NOT click on links within an .

21 Rule #4 – Attachments in emails
safety rule #4 Rule #4 – Attachments in s may lead to a virus attack on your computer. DO NOT click on attachments within an .

22 Email safety rule #4 Please remember rule #4
I Attachments in s may be harmful to your computer. DO NOT click on attachments within an .

23 Rule #5 – Pop-up messages in
safety rule #5 Rule #5 – Pop-up messages in s may lead to a virus attack on your computer. DO NOT click on pop-up messages within an .

24 Email safety rule #5 Please remember rule #5
I Pop-up messages in s may be harmful to your computer. DO NOT click on pop-up messages within an .

25 What will you learn today?
Identify phishing s.

26 Identify phishing emails
An may appear to be from a legitimate business. The may asks you to provide your personal information. Scam alert - Legitimate businesses never asks for personal information via an or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

27 Identify phishing emails
Please remember Legitimate businesses do not asks for personal information via an or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

28 Identify phishing emails
An may appear to be from a legitimate business. The may asks you click on a link to update your account. Scam Alert - Legitimate businesses will never asks you to update your account via an link. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

29 Identify phishing emails
Please remember Legitimate businesses will not asks you to update your account via an link. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

30 Identify phishing emails
An may appear to be from a legitimate business. The may asks you to click on a link to add funds to your account. Scam alert - Legitimate businesses never asks you to add funds to your account via an or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

31 Identify phishing emails
Please remember Legitimate businesses do not asks you to add funds to your account via an or pop-up message. FGAC Business Profiles Validation (GTVFBPR) - used to define business profiles. FGAC Business Profile Assignments (GOAFBPR) - Assign users to the Business profile that will need to access data mask. Data Display Mask Columns Form (GORDMCL) – use this form to define the items that require protection of sensitive data on person search pages. Data Display Mask Rules Form (GORDMSK) – use this form to define the display masks applicable to the associated fields on SCT Banner forms.

32 What will you learn today?
Practice avoiding phishing s.

33 Practice avoiding phishing scams
Instructions: You will be taken to the FTC Website when you click the link below. Note: You must manually close the FTC Website window by clicking the X in the upper right corner after playing the game. Click here to practice avoiding phishing scams by playing the Phishing Scams game at the FTC Website. Source: United States Federal Trade Commission,

34 Summary Cybercriminals may attempt to use phishing s as an illegal attempt to steal your sensitive information using fraudulent s, links, attachments, and pop-up messages.

35 Summary Please remember that legitimate businesses never asks for sensitive information via .

36 Where to Get More Information
Instructions: You will be taken to the FTC Website when you click the link below. Note: You must manually close the FTC Website window by clicking the X in the upper right corner after viewing the information on it. Click here to view the consumer information about phishing at the FTC Website. Source: United States Federal Trade Commission,

37 Course assessment Please click here to complete the course assessment
Instructions: You will be taken to the course assessment when you click the link below. Please click the submit button after you complete the assessment. Note: You must manually close the course assessment window by clicking the X in the upper right corner after completing the assessment. Please click here to complete the course assessment

38 Course evaluation Please click here to fill out the course evaluation.
Instructions: You will be taken to the course evaluation when you click the link below. Please click the submit button after you complete the evaluation. Note: You must manually close the course evaluation window by clicking the X in the upper right corner after completing the evaluation. Please click here to fill out the course evaluation.

39 Thank you Please contact me at if you have any questions. I hope that you enjoyed the course!


Download ppt "Protecting Senior Citizens from Phishing s"

Similar presentations


Ads by Google