Class 3: Identify Tricks and Scams Online
|
|
|
- Mervin Matthews
- 10 years ago
- Views:
Transcription
1 Class 3: Identify Tricks and Scams Online
2 Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices of how to conduct themselves online. A student handout booklet accompanies this class. TIME REQUIRED: Approx. 50 minutes PREREQUISITES: Students need to have basic computer skills and be familiar with navigating the Internet. RECOMMENDED GRADE: 6-8 ESSENTIAL QUESTIONS: How do I protect myself against online tricks? LEARNING GOALS: Students will understand that not everything they see on the web is true, and how to recognize online scams. Students will review how to protect themselves from scams. Students will know how to take action if they find themselves being scammed. PREPARATION: Materials needed: Chart paper or chalk/white board Student handouts booklet for each student. Materials recommended: Computer with Internet connection and screen projector device for presenter. (Note: if you do not have a screen projector, you can opt to not use the accompanying presentation.) Computers with Internet connection for students. (Recommended one per student or one per small group of students, but not required.) If you do not have Internet access/computer, be sure to print out the activities in advance. Optional video: Steering Clear of Cyber Tricks : 2
3 VOCABULARY: Antispyware software protects your computer against security threats and unwanted software Chain letter a letter, or fax that tells you to send the letter, or fax to your friends (scams are usually sent out this way) Firewall a program that shields your computer from most scams and tricks Personal information any piece of information that reveals something about your identity (name, age, address, school, social security number, phone number etc.) Pop-up contest often come up as you are browsing the web. They tend to be some sort of game and mention that you have won something. The trick is that they tend to collect information from you Phishing a scam where an entity tries to steal private information by pretending to be someone that you trust like a friend, your bank or even your service. Scam something that is trying to trick you, often into giving away your personal information STANDARDS ADDRESSED: ALA Standard 8:3: Student will use information technology responsibly. C3: II:A: Student will recognize online risks, to make informed decisions, and take appropriate actions to protect themselves while using technology, technology systems, digital media and information technology. C3: II:B: Student will make informed decisions about appropriate protection methods and safe practices within a variety of situations. C3: II:C: Student will demonstrate and advocate for safe behaviors among peers, family and community. C3:III:A: Student will recognize online risks, make informed decisions, and take appropriate actions to protect themselves while using technology, technology systems, digital media and information technology. C3:III:B: Student will make informed decisions about appropriate protection methods and secure practices within a variety of situations. C3:III:C: Student will demonstrate commitment to stay current on security issues, software and effective security practices. C3:III: D: Student will advocate for secure practices and behaviors among peers, family, and community. NETS: 5:a: Student will advocate and practice safe, legal and responsible use of information and technology. CCSS: RI.3.5: Use text features and search tools (e.g, key words, sidebars, hyperlinks) to locate information relevant to a given topic efficiently CCSS: RI.5.7: Draw on information from multiple print or digital sources, demonstrating the ability to locate an answer to a question quickly or to solve a problem efficiently CCSS: W.6.1.b: Support claim(s) with clear reasons and relevant evidence, using credible sources and demonstrating an understanding of the topic or text CCSS: 7.1.b, 8.1.b: Support claim(s) with logical reasoning and relevant evidence, using accurate, credible sources and demonstrating an understanding of the topic or text. 3
4 Pre-Assessment (3 min) Start the lesson with some questions to determine the students knowledge. Teachers may want to divide the students into groups of 4-5 students and have them discuss these questions among themselves. Teachers may also choose for the students to take a survey beforehand. Another option for teachers is to have all students raise their hands and the teacher chooses one person per question. Ask: Who uses in the class? Who knows what an online scam is? Give examples. Have you ever been scammed via ? Why did you think it was a scam? What should you do when you think you are being scammed? Who has an account on a social network, including but not limited to, Google+, Facebook, Instagram, Tumblr? Is it safe to use your real personal information for an online character? Why? How can you get an scam from someone if you never gave your address to that person? If you get a greeting card from a secret admirer, should you respond? Can scams happen on websites that you visit? If you get a chain letter saying that something bad will happen to you or to someone you know if you don t forward it, should you go ahead and forward it to all your friends? Hook or Attention Activity (2 min) Say: Imagine you are walking down a crowded street and a complete stranger approaches you and says you have just won a free trip all you need to give him is your name, age, address, phone number, and passwords to your social network accounts (Google+, Facebook etc). Would you believe him? Bridge: In real life, we wouldn t trust a stranger with our personal information, and being online should be no different. If something sounds too good to be true, it probably is especially if your personal information is required. Guidelines to follow (10 min) Either watch this video by Google, Staying Clear of Cyber Tricks ( Say: You are going to watch a short video (developed by the team at Google), Steering Clear of Cyber Tricks. This video will explain what cyber tricks are, how to avoid falling for online scams, what phishing means online (it s not what you think ) and what to do if you realize you have been tricked. 4
5 OR share these key concepts from the video with your class: How do I recognize cyber tricks, scams, and phishing? 1. Is it giving you something for free? Free offers usually are not free, especially if the offer needs your personal information. 2. Is it asking for your personal information? a. Some websites trick you into giving them personal information so they can send you more tricks. For example, personality tests can be actually gathering facts about you to make it easy, for example, to guess your password or other secret information. b. Most legitimate businesses will never ask for personal information like account numbers, passwords and social security numbers via Is it a chain letter? a. Chain letters may put you at risk. b. Don t forward them to your friends. How do I avoid these tricks? 1. Think before you click. Don t click on any link or file in a suspicious Stay away from pop-up contests. You can t win and there is usually a secret trick such as collecting information about you, seeing if your address is active, or infecting your computer with bad software. 3. Do a web search for a company s name before you give them any information about yourself. 4. Read the fine print. a. At the very bottom of most documents there is what is called the fine print. This text is often barely legible, but many times contains various tricks. b. The top of the page may say that you have won a free phone, but in the fine print, it may say that you actually have to pay that company $200 every month. Oh, no I got tricked. What do I do? 1. Tell a trusted adult immediately. The longer you wait, the worse it may get. 2. If you are worried about your bank account or credit card information, contact the bank or credit card company immediately. 3. If you received a phishing , go to to report it Hand out What are Cyber Tricks? (Student Handouts p 2) and go over the tips with the students. If time permits, also discuss Additional Tips (Student Handouts, p 3. NOTE: These tips can also be found at: 5
6 Activity (10 min) Tell the students that they are about to see some examples of real phishing/scams and online tricks. Teachers can either visit and have the students take a Phishing IQ test, or can hand out the phishing scams to the students (Student Handouts p 4-6). Say: In this handout you will see examples of some popular tricks and phishing scams. Go over the examples with the students. For each example discuss the dangers, how to avoid falling for that scam and what action to take. Highlight these points: Better to be extra cautious than be a phish. Always think twice before forwarding something, clicking on something or filling out your personal information. Post-Assessment Activity (30 min) Let the students know that they are going to play a cyber security game of Who Wants to be a Millionaire? to test their knowledge about how to steer clear of cyber tricks. (Note: these questions include the same pre-assessment questions asked as well as additional questions from the lesson. For teachers who do not have a projector to show the PPT, PDF copies of the questions should be printed in advance and taped to the board) Divide the class into groups of 4-5 students. Each group can come up with a group name, if so desired. The teacher can either tally the dollars his or herself, or choose a student to do so. The teacher will read the question and then give each group ten seconds to discuss. One student from each group will raise their hand when they have the answer. If they group gets the question right, they earn the points associated with that question. Optional ideas: Alternatively, this game can be played in the traditional way where one student is the contestant and the class is the audience. To encourage full classroom participation during the game, you may want to choose to have three lifelines (50-50, Ask a Friend, Ask the Classroom) eliminates two of the false answers, Ask a Friend allows the participant to ask a friend the question, and Ask the Classroom would allow the entire classroom the opportunity to weigh in. 6
7 Who Wants to be a Millionaire? A Cyber Security Game For $100: Is it safe to use your real personal information for an online character? A. Yes, it doesn t matter. B. Yes, but only your real name, address, and age, C. Yes, but only once in a while. D. It s better not to reveal personal information, even when creating an online character. For $200: Phishing means A. Using a phishing pole in the water and catching phish B. Someone should have been more careful with the spell check C. Websites and s created just to trick you so cybercriminals can steal your information D. All of the above For $300: Can you get an scam from someone even if you never gave your to that person? A. No, you can only receive an scam from someone you know. B. Yes, phishing scams use software to take other sources. C. No, you can only receive an scam if you give out your to too many friends. D. No, only friends and family know your . For $500: Which of the following is not a tip to avoid falling for scams? A. Thinking before you click. B. Doing a web search for a company s name before you give them any information about yourself. C. Read the fine print. D. All of the above. For $1000: Chain s are... A. A way to ensure you have good luck B. A way to stay in touch with your friends C. A way for you to help cybercriminals to spread scams and tricks D. None of the above For $2000: Personality tests are A. A fun way to learn more about yourself B. A way for cybercriminals to collect facts about you to collect your private information C. A way of making you more attractive to the opposite sex D. None of the above For $4000: Pop-Up ads are A. Funny jokes B. Just annoying advertisements but generally safe 7
8 C. A way to win contests and get fun electronics D. None of the above For $8000: By entering your address in the free coupon pop-up ad after placing an order with Orbitz, Priceline.com, Buy.com, Flowers, Continental Airlines, Fandango you get... A. A $10 off coupon on your next order sent to your B. A $10 off coupons on your next order sent with your order C. A repeating charge from a web loyalty company on your credit charge D. None of the above For $16000: Which of the following is also a scam? A. Become a laptop tester. B. Free sports equipment for filling out a survey C. Bank of America security asking you to change your password D. All of the above For $32,000: Legitimate companies rarely send you s that require you to enter your account name/username/password immediately or face really bad consequences. How do you check to be sure the is really from a company you know? A. Open your web browser and log on to the site the way you normally would. B. Click on the link in the . C. Nothing D. None of the above For $64,000: If you receive a phishing you should A. Report it to antiphishing.com or spam.uce.gov B. Nothing, it is not going to hurt anyone if nothing is done C. Reply back to the with rude words D. None of the above For $125,000: Preventive measures that can be used include A. Using anti-virus, anti-spyware software and a firewall B. Thinking twice before opening attachments and clicking links even from people and companies I know C. Telling everyone who uses a computer about ways to protect themselves and their computer D. All of the above For $250,000: Identity theft only occurs to... A. Adults B. Youth who share personal information C. People with firewalls installed on their computers D. All of the above 8
9 For $500,000: According to which industry sector saw a rise in phishing attacks? A. Social Networking B. Gaming C. Financial D. None of the above For $1 Million: Sending personal information like a social security or credit card number by is ok if... A. It is to a well-known company B. It is to my school C. It is to my family D. None of the above Great job Thank you for playing 9
10 Class 3: Identify Tricks and Scams Online Student Handout
11 Identify Tricks and Scams Online What are Cyber Tricks? How do I recognize cyber tricks, scams, and phishing? 1. Is it giving you something for free? Free offers usually are not free, especially if the offer needs your personal information. 2. Is it asking for your personal information? a. Some websites trick you into giving them personal information so they can send you more tricks. For example, personality tests can be actually gathering facts about you to make it easy, for example, to guess your password or other secret information. b. Most legitimate businesses will never ask for personal information like account numbers, passwords and social security numbers via Is it a chain letter? a. Chain letters may put you at risk. b. Don t forward them to your friends. How do I avoid these tricks? 1. Think before you click. Don t click on any link or file in a suspicious Stay away from pop-up contests. You can t win and there is usually a secret trick such as collecting information about you, seeing if your address is active, or infecting your computer with bad software. 3. Do a web search for a company s name before you give them any information about yourself. 4. Read the fine print. a. At the very bottom of most documents there is what is called the fine print. This text is often barely legible, but many times contains various tricks. b. The top of the page may say that you have won a free phone, but in the fine print, it may say that you actually have to pay that company $200 every month. Oh, no I got tricked. What do I do? 1. Tell a trusted adult immediately. The longer you wait, the worse it may get. 2. If you are worried about your bank account or credit card information, contact the bank or credit card company immediately. 3. If you received a phishing , go to to report it 2
12 Additional Tips No, you probably haven t won the lottery. You can t make that much working from home. And that deal really might be too good to be true. The web can be a great place, but not everyone online has good intentions. Here are three simple ways to avoid scammers and stay safe on the web: 1. Beware of strangers bearing gifts A message is probably up to no good if it congratulates you for being a website s millionth visitor, offers a tablet computer or other prize in exchange for completing a survey or promotes quick and easy ways to make money or get a job ( get rich quick working from your home in just two hours a day ). If someone tells you you re a winner and asks you to fill out a form with your personal information don t be tempted to start filling it out. Even if you don t hit the submit button, you might still be sending your information to scammers if you start putting your data into their forms. If you see a message from someone you know that sounds off or strange, it could be that their account may have been compromised by a cyber criminal - so be careful how you respond. Common tactics include asking you to urgently send them money, claiming to be stranded in another country or saying that their phone has been stolen so that they cannot be called. The message may also tell you to click on a link to see a picture, article or video, which actually leads you to a site that might steal your information so think before you click 2. Do your research When shopping online, research the seller and be wary of suspiciously low prices just like you would if you were buying something at a local store. Scrutinize online deals that seem too good to be true. No one wants to get tricked into buying fake goods. People who promise normally non- discounted expensive products or services for free or at 90% off likely have malicious intent. If you use Gmail, you may see a warning across the top of your screen if you re looking at an our system says might be a scam if you see this warning, think twice before responding to that . Watch out for scams using the Google brand. Google does not run a lottery. We do not charge training fees for new employees if you receive an saying Google has hired you, but you would have to pay a training fee before you can start, it is a scam. Find out more about various scams using the Google brand. 3. When in doubt, play it safe Do you just have a bad feeling about an ad or an offer? Trust your gut Only click on ads or buy products from sites that are safe, reviewed, and trusted. Many online shopping platforms have trusted merchants/sellers programs. These sellers typically have a visible stamp of approval on their profiles. Make sure that the stamp or certificate is legitimate by reviewing the shopping platforms guidelines. If the platform doesn t offer a similar program, take a look at the number of reviews and the quality of reviews on the seller. 3
13 Examples of Cyber Tricks 1) Bank Dear Customer, Sorry for disturbing you, but we have to check your ATM card details. The management of our bank has made a decision to switch to new transfer security methods because of frequent fraudulent operations. The new updated technologies will ensure the security of your payments through our bank. As both software and hardware will be updated, some personal data will be lost inevitably. In order to restore all information, necessary action should be taken immediately. We thank you for your cooperation in this manner. Click below to confirm and verify your Online Banking Account. If you choose to ignore our request, you leave us no choice but to temporary suspend your account. Best Regards, Your Bank Security and Anti-Fraudulent Department. What stands out to you? 2) Gmail Update: Subject: Password change required Dear sir, You need to update your Gmail account information. If this is not completed by December 1, 2014 we will be forced to suspend your account indefinitely, as it may have been used for fraudulent purposes. Thank you for your cooperation. Click here to Change Your Password Thank you for your prompt attention to this matter. 4
14 What stands out to you? 3) Unsolicited pop-ups: You surf the web and suddenly get a pop-up that asks you to donate for a charity. They ask for your credit card information. What stands out to you? 4) Greeting cards scams: It s not even close to your birthday, not a holiday or other occasion, yet suddenly you get a greeting card. It says the following: Hi my friend, You have a greeting card waiting for you. Please click here to download. From your secret admirer. What stands out to you? 5
15 5) Lottery scams: You get an notifying you that you have just won $650,000 Date: Mon, 15 Mar :33: From: johnnewman_ip Subject: INTERNATIONAL PROMOTIONS / PRIZE AWARD DEPARTMENT, To: [email protected] DIAMOND LOTTERY. LEEK ROAD, STOKE ON TRENT ENGLAND ST1 3NR. FROM: THE DESK OF THE PROMOTIONS MANAGER, INTERNATIONAL PROMOTIONS / PRIZE AWARD DEPARTMENT, REF: EGS/ /03. BATCH: 12/0002/IPD Attention: Dear Winner, RE/AWARD NOTIFICATION, FINAL NOTICE We are pleased to inform you of the announcement of winners of the DIAMOND LOTTERY INTERNATIONAL PROGRAMS UK, held on 29th of October Your address, attached to ticket number , with serial number drew the lucky numbers , and consequently won the lottery in the 3rd category. You have therefore been approved for a lump sum payment of $650, (Six Hundred and Fifty Thousand United States Dollars) in cash credited to file HWS/ /02. This is from a total cash prize of $10,000, (Ten Million United States Dollars) shared among the seventeen international winners in this category. All participants were selected through a computer ballot system drawn form 250,000 names 300,000 s from Australia, New Zealand, America, Europe and North America as part of our International Promotions Program, which is conducted annually. Furthermore, your lucky winning number falls within our Western Europe booklet as indicated in your play coupon. In view of this, your $650, (Six Hundred and Fifty Thousand United States Dollars) will be paid to you either by our banker or financial agent in London or Spain. Due to a mix up of some numbers and names, we ask that you keep this secret from the public notice until your claim has been processed and your money remitted to your account, as this is part of the security protocol to avoid double claiming or unwarranted taking advantage of this program by participants. We hope that with part of you prize, you will participate in our end of year high stakes ($1.3 billion) International Lottery. To begin your claim, please contact your claim agent: Jeff Brown, [email protected] or my address for due processing and payment of your prize money. NOTE: In order to avoid unnecessary delays and complications, please remember to quote your reference and batch numbers in every correspondence. Congratulations again and thank you for being part of our promotion program. Sincerely yours. John Newman. GENERAL MANEGER, INTERNATIONAL PROMOTION PRIZE AWARD DEPT. 6
16 What stands out to you? 6) Be creative -- write your own cyber trick here: 7
Class 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Online Security Tips
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
Recognizing Spam. IT Computer Technical Support Newsletter
IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the
Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
Staying Safe.....on social media and online
Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Social Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant [email protected] Social Media and Cyber Safety Our instructor today
C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on
Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Case study: What the? Online scams and identity theft
Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two
Advice about online security
Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP
Guide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
MoneySmart Rookie Community educator guide. Financial literacy for young people
MoneySmart Rookie Community educator guide Financial literacy for young people Copyright information Website: ISBN: 978 0 9805533 9 0. Creative Commons This Community educator guide is available under
Customer Awareness for Security and Fraud Prevention
Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
Fraud. Your guide to protecting yourself from fraud
Fraud Your guide to protecting yourself from fraud Kent Police is committed to protecting people from career criminals and fraudsters. This booklet has been designed to give you advice on how to protect
Helping you to protect yourself against fraud and financial crime
Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
When Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
UNTOLD MAP SECRETS. Are you a MyAdvertisingPays member? Great!
UNTOLD MAP SECRETS The Guide for online marketing newbies Are you a MyAdvertisingPays member? Great! Do you know that you can earn money by using the advertising system of MyAdvertisingPays but you have
Protection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
Shop Online with Confidence
Shop Online with Confidence Table of Contents Introduction 3 Benefits and Drawbacks of Online Shopping Benefits Drawbacks 5 6 Tips for Safe Online Shopping Before You Buy When Making a Purchase After Your
Avoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
Fraud Protection module
Fraud Protection module Trainer s Introduction While the vast majority of financial transactions are legitimate and honest, the few fraudulent ones can be costly and damaging. By recognizing the warning
Protecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
Email Security. 01-15-09 Fort Mac
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:
A A GENERAL ENGLISH Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + 1 Internet crime Match the following words to their correct definitions: 1. hacker a. a computer program which can make copies of itself
Computer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
Activities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
7 Secrets To Websites That Sell. By Alex Nelson
7 Secrets To Websites That Sell By Alex Nelson Website Secret #1 Create a Direct Response Website Did you know there are two different types of websites? It s true. There are branding websites and there
Travel agents guide to SMS messaging. How to use SMS messaging for marketing, booking, and customer support
Travel agents guide to SMS messaging How to use SMS messaging for marketing, booking, and customer support Why should you use SMS messaging? When was the last time you didn t have your mobile? Chances
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Entrepreneur Systems: Business Systems Development Tool
Creating Your Follow Up System Create an 8 series autoresponder sequence for a prospect Create a 6 series autoresponder sequence for one of your products or services Create a content template for a newsletter
platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Digital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
EDEXCEL FUNCTIONAL SKILLS ICT. Study Module 8. Using ICT to communicate
EDEXCEL FUNCTIONAL SKILLS ICT Study Module 8 Using ICT to communicate Published by Pearson Education, Edinburgh Gate, Harlow CM20 2JE Pearson Education 2010 All rights reserved. This material may be used
IT Security DO s and DON Ts
For more advice contact: IT Service Centre T: (01332) 59 1234 E: [email protected] Online: http://itservicecentre.derby.ac.uk Version: February 2014 www.derby.ac.uk/its IT Security DO s and DON
Fraud Guide Fraud Protection
Fraud Guide Fraud Protection A simple guide on how to protect yourself against fraud. A simple guide on how to protect yourself against fraud It seems like every day there are new reports of different
Defense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1
P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,
RC284. Protect Yourself Against Identity Theft
RC284 Protect Yourself Against Identity Theft Identity theft the unauthorized use of your information by third parties involves the collection and use of personal information such as your name, date of
It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.
Activities for Protecting Your Identity and Computer for Elementary and Middle School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these
Putting Telephone Scams... On Hold
Putting Telephone Scams... On Hold Federal Trade Commission Toll-free 1-877-FTC-HELP Federal Trade Commission Toll-free 1-877-FTC-HELP www.ftc.gov For the Consumer www.ftc.gov For the Consumer Telemarketing
What are the common online dangers?
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
Credit Card Fraud Training
Credit Card Fraud Training Lesson Plan A Consumer Action Publication Consumer Action created this project in partnership with Chase 2009 Consumer Action Credit Card Fraud Training Lesson Plan (For the
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
Advance Fee Loans. Computer Malware Scams. Credit Repair Scams
Advance Fee Loans Scam artists can trick you into paying money to qualify for a loan or credit card. Despite their guarantees, you do not receive a loan, credit card, or any money. Never pay money to qualify
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
How to Recognize Phishing Emails Targeting the University of Mary
How to Recognize Phishing Emails Targeting the University of Mary For the past several years, University of Mary has been targeted by phishing emails. It is important that you recognize these scams so
2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
ANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
ONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.
Norton 360 Our ultimate protection, now even more so. Introducing the new Norton 360. Our ultimate Internet and antivirus protection for all you do online Provides proactive protection, so you can do what
Online Security Information. Tips for staying safe online
Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
How an Innovative Email Marketing Strategy Can Pave the Way to New Customers
How an Innovative Email Marketing Strategy Can Pave the Way to New Customers AN EMAIL MARKETING STRATEGY WHITE PAPER EMAIL MARKETING PROGRAMS According to the Direct Marketing Association, email marketing
Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee
Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Government Grants The government gives grants to special people like you! Stimulus money is still available through
Class 2: Manage Your Digital Footprint
Class 2: Manage Your Digital Footprint Manage Your Digital Footprint Instructor s Overview OVERVIEW: Students will be empowered with the information to make safe and appropriate decisions online by learning
Computer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
Market Intelligence Cell. Fighting Financial Crime
Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
How To Increase Your Odds Of Winning Scratch-Off Lottery Tickets!
How To Increase Your Odds Of Winning Scratch-Off Lottery Tickets! Disclaimer: All of the information inside this report reflects my own personal opinion and my own personal experiences. I am in NO way
