1 / 6

Scams and Schemes 11-12

Scams and Schemes 11-12. Understand what identity theft is and why it is important to guard against it. Learn to recognize strategies that scam artists use to access private information. Learn how to guard against phishing and identity theft. Answer one of the following:

sancha
Télécharger la présentation

Scams and Schemes 11-12

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Scams and Schemes 11-12 • Understand what identity theft is and why it is important to guard against it. • Learn to recognize strategies that scam artists use to access private information. • Learn how to guard against phishing and identity theft. • Answer one of the following: 1. Do you know someone who has been scammed? What happened? 2. What is the purpose of a scam? What tricks do people use to carry out a scam? 3. Can people get scammed on the Internet? How? I Can… BR….

  2. Scams and Schemes Key Vocabulary • Scam-an attempt to trick someone, usually with the intention of stealing money or private information • Identity theft- a type of crime in which your private information is stolen and used for criminal activity Write down kinds of personal information identity thieves look for on the front of this flash card with the definition on the back • Vulnerable-in a position that makes it easier for you to be harmed or attacked • Phishing-when people send you phony emails, pop-up messages, social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information

  3. How to Catch a Phish • Spotting Scams Student Handout • Complete in pairs (15 working minutes) • Share with another group to compare answers when time is called (4 working minutes)

  4. Protect Yourself from Online Scams • Students will create a phishing email with at least four of the seven features of a phishing email listed in your Spotting Scams Student Handout. • Do not plagiarize the samples from the handout. • Type the email in word and save as OnlineScam in your tech folder • Print and turn in to the top of the black box • Due

  5. Scams and Schemes 11-14 • Understand what identity theft is and why it is important to guard against it. • Learn to recognize strategies that scam artists use to access private information. • Learn how to guard against phishing and identity theft. • List 2 of the 7 features of a phishing email. • List two kinds of personal information that identity thieves look for. I Can… BR….

  6. Upcoming Events • Scams and Schemes Quiz Friday 11-15 • Vocabulary Quiz Friday 11-15 • Online Scam paper due 11-15

More Related