scams & schemes protecting your identity. scams what is a scam? attempt to trick someone,...

Post on 05-Jan-2016

221 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

SCAMS & SCHEMES

PROTECTING YOUR IDENTITY

SCAMS• WHAT IS A SCAM?

• ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION

• WHAT IS THE PURPOSE OF A SCAM?

• GIVE SCAMMER $$ OR INFORMATION THAT CAN HELP THE SCAMMER STEAL $$.

• CC #, ATM CODE, PASSWORDS

• TRICKS TO CARRY OUT SCAMS

• TELL LIES

• PRETEND TO BE SOMEONE THEY ARE NOT

• LURING YOU TO SHARE PERSONAL INFORMATION

• TYPES

• BUY BAD OR FAKE PRODUCT

• LURED INTO SHARING INFORMATION

IDENTITY THEFT

• TYPE OF CRIME IN WHICH YOUR PRIVATE INFORMATION IS STOLEN AND USED FOR CRIMINAL ACTIVITY

•SCAMS DON’T ALWAYS GET MONEY

•STRATEGIES TO GET PRIVATE INFORMATION

• INFO USED TO ACCESS BAND AND CREDIT ACCOUNTS OR OTHER PERSONAL ACCOUNTS

• “RE-CREATE” SOMEONE’S IDENTITY & PRODUCE FALSE DOCUMENTS LIKE SOCIAL SECURITY CARDS, CC, OR DRIVER’S LICENSE

INFORMATION THIEVES WANT

• FULL NAME

•DOB, LOCATION

•CURRENT & PREVIOUS ADDRESS & PHONE #S

•DRIVER’S LICENSE/PASSPORT #

•ACCOUNT NUMBERS AND COMPANIES

• PASSWORDS

•SOCIAL SECURITY #

VULNERABILITY• POSITION THAT MAKES IT EASIER FOR YOU TO BE HARMED OR

ATTACKED

• THIEVES ARE AFTER VULNERABLE PEOPLE

•ANYONE IS VULNERABLE TO ONLINE SCAMS

• TEENS

• CLEAN SS #, NOT USED TO GET CREDIT YET

PHISHING

• PEOPLE SEND YOU PHONY EMAILS, POP-UP MESSAGES, SOCIAL MEDIA MESSAGES, TEXTS, CALLS. OR LINKS TO FAKE WEBSITES IN ORDER TO HOOK YOU INTO GIVING OUT YOUR PERSONAL AND FINANCIAL INFORMATION

•AVOID BY BEING SKEPTICAL WITH ONLINE REQUESTS FOR PERSONAL INFO

•WEIRD MESSAGES FROM FRIENDS = HACKED ACCOUNT

FEATURES OF PHISHING EMAIL

•NEED TO VERIFY ACCOUNT INFORMATION

•SENSE OF URGENCY

•SPELLING ERRORS

•ALERT THAT YOUR ACCOUNT IS IN TROUBLE

• LINK IN EMAIL OR ATTACHMENT

• TOO GOOD TO BE TRUE

•GENERIC GREETING

SPOTTING A SCAM

•DIVIDE INTO GROUPS

•COMPLETE HANDOUT

•GET WITH ANOTHER GROUP AND COMPARE ANSWERS

• PHISHING EMAILS CAN BE VERY CONVINCING

• LOOK FOR FEATURES WE JUST COVERED

•DISTRUST ANY EMAIL ASKING FOR PERSONAL INFORMATION

PROTECTING YOURSELF

•AVOID OPENING SUSPICIOUS MESSAGES OR EMAILS

•DON’T CLICK ON ANY LINKS OR DOWNLOAD ATTACHMENTS

•DON’T REPLY

•MARK AS “JUNK MAIL” OR “SPAM”

•CONTACT ACCOUNT CUSTOMER SERVICE BY PHONE IF CONCERNED

CREATE A PHISHING EMAIL

•CHOOSE AT LEAST 4 OF THE 8 FEATURES OF A PHISHING EMAIL

•CREATE A MESSAGE AND SEND TO MR. KURTZ

•SKURTZ@MIAMISBURG.K12.OH.US

WHERE TO GET HELP

• FEDERAL TRADE COMMISSION

• WWW.FTC.GOV/IDTHEFT

• FORWARD SPAM MESSAGES TO:

• SPAM@UCE.GOV

WRAP-UP

•WHAT KINDS OF INFORMATION DO IDENTITY THIEVES LOOK FOR? WHY?

• FULL NAME, ADDRESS, DOB, ACCOUNT #, PASSWORDS

•USE INFO TO “RE-CREATE” SOMEONE’S IDENTITY

•HOW DO THIEVES TRY TO GET AT YOUR INFORMATION?

• PHISHING

WRAP-UP•WHAT CAN YOU DO TO AVOID FALLING FOR ONLINE

SCAMS?

•BE SUSPICIOUS OF ANY ONLINE COMMUNICATION THAT ASKS FOR PRIVATE INFORMATION

•AVOID COMMUNICATION THAT SEEMS OUT OF CHARACTER FOR A FRIEND

•DON’T REPLY TO SUSPICIOUS MESSAGES

•DON’T CLICK ON ANY LINKS OR ATTACHMENTS

•REPORT AS SPAM

top related