Download presentation
Presentation is loading. Please wait.
Published byCathleen Dennis Modified over 9 years ago
1
SCAMS & SCHEMES PROTECTING YOUR IDENTITY
2
SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION WHAT IS THE PURPOSE OF A SCAM? GIVE SCAMMER $$ OR INFORMATION THAT CAN HELP THE SCAMMER STEAL $$. CC #, ATM CODE, PASSWORDS TRICKS TO CARRY OUT SCAMS TELL LIES PRETEND TO BE SOMEONE THEY ARE NOT LURING YOU TO SHARE PERSONAL INFORMATION TYPES BUY BAD OR FAKE PRODUCT LURED INTO SHARING INFORMATION
3
IDENTITY THEFT TYPE OF CRIME IN WHICH YOUR PRIVATE INFORMATION IS STOLEN AND USED FOR CRIMINAL ACTIVITY SCAMS DON’T ALWAYS GET MONEY STRATEGIES TO GET PRIVATE INFORMATION INFO USED TO ACCESS BAND AND CREDIT ACCOUNTS OR OTHER PERSONAL ACCOUNTS “RE-CREATE” SOMEONE’S IDENTITY & PRODUCE FALSE DOCUMENTS LIKE SOCIAL SECURITY CARDS, CC, OR DRIVER’S LICENSE
4
INFORMATION THIEVES WANT FULL NAME DOB, LOCATION CURRENT & PREVIOUS ADDRESS & PHONE #S DRIVER’S LICENSE/PASSPORT # ACCOUNT NUMBERS AND COMPANIES PASSWORDS SOCIAL SECURITY #
5
VULNERABILITY POSITION THAT MAKES IT EASIER FOR YOU TO BE HARMED OR ATTACKED THIEVES ARE AFTER VULNERABLE PEOPLE ANYONE IS VULNERABLE TO ONLINE SCAMS TEENS CLEAN SS #, NOT USED TO GET CREDIT YET
6
PHISHING PEOPLE SEND YOU PHONY EMAILS, POP-UP MESSAGES, SOCIAL MEDIA MESSAGES, TEXTS, CALLS. OR LINKS TO FAKE WEBSITES IN ORDER TO HOOK YOU INTO GIVING OUT YOUR PERSONAL AND FINANCIAL INFORMATION AVOID BY BEING SKEPTICAL WITH ONLINE REQUESTS FOR PERSONAL INFO WEIRD MESSAGES FROM FRIENDS = HACKED ACCOUNT
7
FEATURES OF PHISHING EMAIL NEED TO VERIFY ACCOUNT INFORMATION SENSE OF URGENCY SPELLING ERRORS ALERT THAT YOUR ACCOUNT IS IN TROUBLE LINK IN EMAIL OR ATTACHMENT TOO GOOD TO BE TRUE GENERIC GREETING
8
SPOTTING A SCAM DIVIDE INTO GROUPS COMPLETE HANDOUT GET WITH ANOTHER GROUP AND COMPARE ANSWERS PHISHING EMAILS CAN BE VERY CONVINCING LOOK FOR FEATURES WE JUST COVERED DISTRUST ANY EMAIL ASKING FOR PERSONAL INFORMATION
9
PROTECTING YOURSELF AVOID OPENING SUSPICIOUS MESSAGES OR EMAILS DON’T CLICK ON ANY LINKS OR DOWNLOAD ATTACHMENTS DON’T REPLY MARK AS “JUNK MAIL” OR “SPAM” CONTACT ACCOUNT CUSTOMER SERVICE BY PHONE IF CONCERNED
10
CREATE A PHISHING EMAIL CHOOSE AT LEAST 4 OF THE 8 FEATURES OF A PHISHING EMAIL CREATE A MESSAGE AND SEND TO MR. KURTZ SKURTZ@MIAMISBURG.K12.OH.US
11
WHERE TO GET HELP FEDERAL TRADE COMMISSION WWW.FTC.GOV/IDTHEFT FORWARD SPAM MESSAGES TO: SPAM@UCE.GOV
12
WRAP-UP WHAT KINDS OF INFORMATION DO IDENTITY THIEVES LOOK FOR? WHY? FULL NAME, ADDRESS, DOB, ACCOUNT #, PASSWORDS USE INFO TO “RE-CREATE” SOMEONE’S IDENTITY HOW DO THIEVES TRY TO GET AT YOUR INFORMATION? PHISHING
13
WRAP-UP WHAT CAN YOU DO TO AVOID FALLING FOR ONLINE SCAMS? BE SUSPICIOUS OF ANY ONLINE COMMUNICATION THAT ASKS FOR PRIVATE INFORMATION AVOID COMMUNICATION THAT SEEMS OUT OF CHARACTER FOR A FRIEND DON’T REPLY TO SUSPICIOUS MESSAGES DON’T CLICK ON ANY LINKS OR ATTACHMENTS REPORT AS SPAM
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.