SlideShare a Scribd company logo
1 of 30
Presented by
Shabbir Ahmad
Govt. college for Women M.A Road
Srinagar
At
HRDC KU
2017
Today’sAgenda…
Knowledge Check
What is Cyber Crime?
IdentityTheft
Phishing
Common Scams inc. online and mobile phone scams
Prevention Methods
KnowledgeCheck
“I have internet access but I don’t shop online,
this means I won’t become a victim of Cyber
Crime.”
Is this statementTrue or False?
KnowledgeCheck
“IdentityTheft is a type of crime in which
personal information is stolen to carry out
criminal activities.”
Is this statementTrue or False?
KnowledgeCheck
“Cyber Crime is a type of crime carried out by
criminals using computers, or similar devices,
with a connection to the internet.”
Is this statementTrue or False?
KnowledgeCheck
“The Internet is so big that things like fraud or
identity theft shouldn't really concern you; the
probability you will be targeted is very small
unless you use the Internet a lot.”
Is this statementTrue or False?
What isCyberCrime?
Criminal activity (electronic device with
a connection to the internet.)
44% of adults were victims in 2014.
Device can become infected within 5
minutes.
Cost the UK £27bn (2011).
IdentityTheft
Using another's personal details to
obtain credit, loans.
9.9 million people affected per year.
19 victims every minute.
If caught early it can be resolved.
How do they do it?
Phishing – Criminals pose as
‘legitimate companies’.
Email hundreds of people from the
Suckers List.
people reply criminals now have
everything they need to steal your
identity.
Tips to Prevent IDTheft
1. Shred anything with your details on.
2. Check your statements and report
anything suspicious.
3. Ensure your home network is secure.
4. Ignore emails saying “You’veWon…” or
from somebody you’re suspicious
about.
Phishing
A bad day ‘phishing’, beats a good day working:
2,000,000 emails sent
100,000 delivered to recipient
5,000 click on the Phishing link
100 enter personal details
£1,200 from each person who enters information
Potential Reward: £120,000
David Levi made over £360,000 from 160 people
GENUINE EMAIL?
LOOKS IT!
GENERIC
GREETINGS
ATTACHMENT
BIG DANGER
DIDYOU MAKE
ATAX RETURN?
PreventionTips
Be cautious of emails that request your
details. Companies will not ask via email.
From someone you don’t know/contains an
attachment - delete it.
Call the sender to confirm that it was them
that sent it.
Mass MarketScam Mail (MMSM)
Receiving a letter or email saying someone
has won a lottery or a prize.
A person will input their details to claim the
“prize”.
Criminals then obtain personal details, inc.
bank details to steal money.
PreventionTips
You cannot win money/a prize if you
haven’t entered into any
competition.
You do not have to pay a fee to
claim a legitimate prize.
Do not give personal information
Delete the email straight away!
CommonScams –OnlineShopping
Deceitful shopping's scams reliant on
the secrecy of the internet.
Whilst majority of auction sellers are
genuine, there’re some who sell fake
goods.
Sellers use these sites to “sell” popular
items.
Which one is fake?
1. http://signin-ebay.com/
2. https://signin.ebay.com/
Dashes not
used
"HTTPS"
S = Secure
Periods
are used
Site
One
Site
Two
Company
Name
NotWell
Designed
Prices to
low
FakeVirusSoftware – ExampleOne
FakeVirusSoftware – ExampleTwo
NoYes/No
Buttons
Unnecessary
Detail
RomanceScams
Cost £24.5 million per year.
2,800 online dating crimes are reported.
55% of all reported crimes came from 40-59
year olds and 63% from females.
Victims are fooled by criminals using fake
personal profiles.
Gain the trust of their victims, then request
money.
PreventionTips
Don’t put yourself and your identity in
jeopardy.
Do not reveal to much/protect your privacy.
Never send money to people you haven’t
met.
Keep all communication on the dating
website.
Be courteous when "keep this is a secret" is
motioned
Mobile PhoneScams
Receiving a text from an
unknown number saying you
have won and that you need to
claim money/prize.
Costs to text back are
an extortionate amount.
PreventionTips
Do NOT reply to text messages that
offer you money.
Do NOT reply to text messages
encouraging you to enter a
competition.
You may have to call a premium rate
number - Do NOT phone them back.
Prevention Methods
Secure websites and an internet safety software.
Responding to unusual emails can put you on a
‘Suckers List’ – Do NOT reply.
Banks never ask for personal bank details via
email. Do NOT reply.
Be aware of your surroundings – never reuse a
password.
steve@email.com – his password is Steve123.
How about 5t3vE123? Capital letter
and numbers
included.
Capital letter and
numbers to spell
‘Steve’ This is
stronger.
Viruses andAnti-Virus
Via email, websites & portable devices.
Vital that you have some form of Anti-
Virus protection.
Strongly recommended that you use
additional protection.
Payware an freeware software out there,
bought in most technology shops.
10Golden Rules
1. There’s no guaranteed get-rich-quick schemes - sound to good to be true?
2. Never send money or give out your details when you do not know/trust the
person or company you are giving them to.
3. Destroy personal information, shred documents, credit cards etc.
4. Log directly onto a website rather than clicking on the link provided.
5. Never reply to spam emails, even when you're trying to stop them.
6. Always remember: scammers are cunning and clever.They know how to
manipulate you to produce the response they want.
7. Legitimate banks and companies will not ask for your details via email or phone.
8. Just because a company has a well design website doesn't means it ligitimate.
9. Be suspicious. If you are unsure about anything, seek advice from family or
Police.
10. Never get embarrassed by reporting a scam
Thank you!
Feel free to ask
any questions!

More Related Content

Similar to cybercrime_presentation - Copy.ppt

Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
Justin Saunders
 

Similar to cybercrime_presentation - Copy.ppt (20)

Scams
ScamsScams
Scams
 
123.pptx
123.pptx123.pptx
123.pptx
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
Louise hunt.com-faceless fraudsters  5 helpful tips (1)Louise hunt.com-faceless fraudsters  5 helpful tips (1)
Louise hunt.com-faceless fraudsters 5 helpful tips (1)
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

More from bcanawakadalcollege

More from bcanawakadalcollege (20)

Intro to Javascript.pptx
Intro to Javascript.pptxIntro to Javascript.pptx
Intro to Javascript.pptx
 
computer and software are changing.pptx
computer and software are changing.pptxcomputer and software are changing.pptx
computer and software are changing.pptx
 
tIME LINE.pptx
tIME LINE.pptxtIME LINE.pptx
tIME LINE.pptx
 
Basic HTML Tags.PPT
Basic HTML Tags.PPTBasic HTML Tags.PPT
Basic HTML Tags.PPT
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Confusion and Diffusion.pptx
Confusion and Diffusion.pptxConfusion and Diffusion.pptx
Confusion and Diffusion.pptx
 
cypher tex.ppt
cypher tex.pptcypher tex.ppt
cypher tex.ppt
 
17javascript.ppt
17javascript.ppt17javascript.ppt
17javascript.ppt
 
Logic gates and boolean algebra.ppt
Logic gates and boolean algebra.pptLogic gates and boolean algebra.ppt
Logic gates and boolean algebra.ppt
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Hidden Surface Removal methods.pptx
Hidden Surface Removal methods.pptxHidden Surface Removal methods.pptx
Hidden Surface Removal methods.pptx
 
Hidden Surface Removal.pptx
Hidden Surface Removal.pptxHidden Surface Removal.pptx
Hidden Surface Removal.pptx
 
Lecture6.orig.ppt
Lecture6.orig.pptLecture6.orig.ppt
Lecture6.orig.ppt
 
Bezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docxBezier Curve in Computer Graphics.docx
Bezier Curve in Computer Graphics.docx
 
reliable_unreliable.pptx
reliable_unreliable.pptxreliable_unreliable.pptx
reliable_unreliable.pptx
 
2D-transformation-1.pdf
2D-transformation-1.pdf2D-transformation-1.pdf
2D-transformation-1.pdf
 
computer graphics unit 1-I.pptx
computer graphics unit 1-I.pptxcomputer graphics unit 1-I.pptx
computer graphics unit 1-I.pptx
 
CG_1.pdf
CG_1.pdfCG_1.pdf
CG_1.pdf
 
File System.pptx
File System.pptxFile System.pptx
File System.pptx
 
2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf2- THE CHANGING NATURE OF SOFTWARE.pdf
2- THE CHANGING NATURE OF SOFTWARE.pdf
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

cybercrime_presentation - Copy.ppt

  • 1. Presented by Shabbir Ahmad Govt. college for Women M.A Road Srinagar At HRDC KU 2017
  • 2. Today’sAgenda… Knowledge Check What is Cyber Crime? IdentityTheft Phishing Common Scams inc. online and mobile phone scams Prevention Methods
  • 3. KnowledgeCheck “I have internet access but I don’t shop online, this means I won’t become a victim of Cyber Crime.” Is this statementTrue or False?
  • 4. KnowledgeCheck “IdentityTheft is a type of crime in which personal information is stolen to carry out criminal activities.” Is this statementTrue or False?
  • 5. KnowledgeCheck “Cyber Crime is a type of crime carried out by criminals using computers, or similar devices, with a connection to the internet.” Is this statementTrue or False?
  • 6. KnowledgeCheck “The Internet is so big that things like fraud or identity theft shouldn't really concern you; the probability you will be targeted is very small unless you use the Internet a lot.” Is this statementTrue or False?
  • 7. What isCyberCrime? Criminal activity (electronic device with a connection to the internet.) 44% of adults were victims in 2014. Device can become infected within 5 minutes. Cost the UK £27bn (2011).
  • 8. IdentityTheft Using another's personal details to obtain credit, loans. 9.9 million people affected per year. 19 victims every minute. If caught early it can be resolved.
  • 9. How do they do it? Phishing – Criminals pose as ‘legitimate companies’. Email hundreds of people from the Suckers List. people reply criminals now have everything they need to steal your identity.
  • 10. Tips to Prevent IDTheft 1. Shred anything with your details on. 2. Check your statements and report anything suspicious. 3. Ensure your home network is secure. 4. Ignore emails saying “You’veWon…” or from somebody you’re suspicious about.
  • 11. Phishing A bad day ‘phishing’, beats a good day working: 2,000,000 emails sent 100,000 delivered to recipient 5,000 click on the Phishing link 100 enter personal details £1,200 from each person who enters information Potential Reward: £120,000 David Levi made over £360,000 from 160 people
  • 13. PreventionTips Be cautious of emails that request your details. Companies will not ask via email. From someone you don’t know/contains an attachment - delete it. Call the sender to confirm that it was them that sent it.
  • 14. Mass MarketScam Mail (MMSM) Receiving a letter or email saying someone has won a lottery or a prize. A person will input their details to claim the “prize”. Criminals then obtain personal details, inc. bank details to steal money.
  • 15. PreventionTips You cannot win money/a prize if you haven’t entered into any competition. You do not have to pay a fee to claim a legitimate prize. Do not give personal information Delete the email straight away!
  • 16. CommonScams –OnlineShopping Deceitful shopping's scams reliant on the secrecy of the internet. Whilst majority of auction sellers are genuine, there’re some who sell fake goods. Sellers use these sites to “sell” popular items.
  • 17. Which one is fake? 1. http://signin-ebay.com/ 2. https://signin.ebay.com/ Dashes not used "HTTPS" S = Secure Periods are used
  • 22.
  • 23. RomanceScams Cost £24.5 million per year. 2,800 online dating crimes are reported. 55% of all reported crimes came from 40-59 year olds and 63% from females. Victims are fooled by criminals using fake personal profiles. Gain the trust of their victims, then request money.
  • 24. PreventionTips Don’t put yourself and your identity in jeopardy. Do not reveal to much/protect your privacy. Never send money to people you haven’t met. Keep all communication on the dating website. Be courteous when "keep this is a secret" is motioned
  • 25. Mobile PhoneScams Receiving a text from an unknown number saying you have won and that you need to claim money/prize. Costs to text back are an extortionate amount.
  • 26. PreventionTips Do NOT reply to text messages that offer you money. Do NOT reply to text messages encouraging you to enter a competition. You may have to call a premium rate number - Do NOT phone them back.
  • 27. Prevention Methods Secure websites and an internet safety software. Responding to unusual emails can put you on a ‘Suckers List’ – Do NOT reply. Banks never ask for personal bank details via email. Do NOT reply. Be aware of your surroundings – never reuse a password. steve@email.com – his password is Steve123. How about 5t3vE123? Capital letter and numbers included. Capital letter and numbers to spell ‘Steve’ This is stronger.
  • 28. Viruses andAnti-Virus Via email, websites & portable devices. Vital that you have some form of Anti- Virus protection. Strongly recommended that you use additional protection. Payware an freeware software out there, bought in most technology shops.
  • 29. 10Golden Rules 1. There’s no guaranteed get-rich-quick schemes - sound to good to be true? 2. Never send money or give out your details when you do not know/trust the person or company you are giving them to. 3. Destroy personal information, shred documents, credit cards etc. 4. Log directly onto a website rather than clicking on the link provided. 5. Never reply to spam emails, even when you're trying to stop them. 6. Always remember: scammers are cunning and clever.They know how to manipulate you to produce the response they want. 7. Legitimate banks and companies will not ask for your details via email or phone. 8. Just because a company has a well design website doesn't means it ligitimate. 9. Be suspicious. If you are unsure about anything, seek advice from family or Police. 10. Never get embarrassed by reporting a scam
  • 30. Thank you! Feel free to ask any questions!

Editor's Notes

  1. Landing page: Good Evening Ladies and Gentlemen my name is <NAME> and I’m from <GROUP NAME>. Working in Partnership with the Metropolitan Police, we’re here to deliver a bespoke Cyber Crime Prevention Presentation. In November 2013 it was clear that the police service had fallen behind with Cyber Crime, the Metropolitan Police created ‘Falcon’ – Fraud and Linked Crime Online, a unit consisting of 500 Detectives dedicated to driving Cyber Crime down – as an addition the Cyber Crime Community Initiative was introduced in October 2014, by Chief Superintendent Nick Downing, the Borough Commander for Hillingdon, to prevent cyber crime with education, focusing predominantly on the elderly and vulnerable people – we believe that if we take a proactive approach by educating certain individuals we can prevent people becoming victims and ensure they stay safe. This presentation will last around 20-30 minutes. If you have any questions write them down and ask at them at the end.
  2. Agenda - Today we’ll be covering the following topics; Knowledge Check – this is so we can see what you already know What exactly Cyber Crime is Identity Theft Phishing Common Scams including online and phone scams and finally the Prevention Method and how you protect yourself.
  3. Knowledge Check – First of all we’re going to have a Knowledge Check to see what you already know. “I have internet access but I don’t shop online, this means I won’t become a victim of Cyber Crime.” This statement is false, anyone can become a victim of Cyber Crime whether they do online shopping or not. You can become a victim through online banking, dating and even social media.
  4. “Identity Theft is a type of crime in which personal information is stolen to carry out criminal activities.” This statement is true, criminals will steal your Identity in order to carry out criminal activities in your name.
  5. “Cyber Crime is a type of crime carried out by criminals using computers, or similar devices, with a connection to the internet.” This statement is true, Cyber Crime can be carried out on all technical devices that are connected to a network, a network can be the internet or an internal internet known as intranet.
  6. “The Internet is so big that things like fraud or identity theft shouldn't really concern you; the probability you will be targeted is very small unless you use the Internet a lot.” This statement is false, anybody can become a victim at any given time. Just because someone has used the internet for 10 minutes or 10 years doesn’t change the probability of becoming a vic.
  7. What is Cyber Crime? A simple definition would be: Criminal activities carried out by means of an electrical device with a connection to the Internet. Some interesting facts about cyber crime would be that – Every year, thousands of Brits become victims of Cyber Crime and only small percentage of these victims report this to the police – 44% of adults where victims of Cyber Crime in 2014 which amounts to around 431 Million world-wide. Without a good security package, your unprotected device, computer, laptop, phone, tablet (iPad) etc. can become infected by viruses within five minutes of connecting to the Internet. In 2011 Cyber Crimes cost to the UK was £27Bn.
  8. The first form of scam that we’re going to discuss is Identity theft. A definition for identity theft would be - the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc. Research taken in February 2014 found that: The number of identity theft incidents has reached 9.9 million a year. Every minute about 19 people fall victim to identity theft. But, Most cases of identity theft can be resolved if they are caught early.
  9. How do they do it? One method scammer’s use is phishing. Phishers, pretending to be legitimate companies, use email to request personal information and direct recipients to respond through malicious web sites They will email hundreds of people on a list known as the Suckers List. If people reply to the email inputting their personal details criminals now have everything they need to steal your identity – they may even have access to your bank accounts.
  10. Here are our tips to avoiding ID Theft. Don’t throw out anything with your name, address or financial details on without shredding it first. Check your statements carefully and report anything suspicious to the bank or financial service provider concerned. If you have a wireless network at home or work, make sure that you secure it. A hacker can gain access to anything you do over an unsecured network in a matter of seconds. Normally on your wireless router you can find ways to encrypt your information and protect you from being at risk. Ignore any email saying “You’ve Won…” or from somebody you’ve never heard of before.
  11. Phishing Phishing is when you receive an email into your inbox saying that something has gone wrong with an account of yours and so your details need to be re-entered to update their systems. They will then get you to fill out an online form and steal thousands of pounds from you! So imagine this The average phisher may send 2,000,000 emails a day, 100,000 reach a computer user, 5,000 respond to the email, 100 enter their personal details, 1200 pounds from each person- potential profit of 120,000 pounds IN ONE DAY   In 2005 a man called David Levi sent a phishing email round to many people saying that their eBay accounts had gone wrong and they needed to update their personal information and payment details. Around 160 people entered their personal details resulting in a total loss for the people and profit for him of over £360,000 which is around 2,250 pounds each person.
  12. Here is an example of a Phishing Email. This email address is a genuine email address of HMRC but it does NOT mean it was from them… this is a clever disguise This is the biggest danger of this email… the attached webpage will ask for your personal details and will submit them to someone other than the real HMRC The person who received this e-mail didn't even make a tax return. If you’re not sure about the e-mail – ring them. IT IS FAKE! Although it is a genuine email address for HM revenue and customs does not mean it is from them, a very sneaky disguise The biggest danger on this email is the link attached- here it is called the verify form, it will ask for your details and they will be sent to someone who will have criminal agendas for your information. Also the links may include viruses that could give fraudsters access to other files on your system. Look out for generic greetings as well; most companies will address their emails directly to a name like Mr Joe Boggs however this email has a generic greeting which is Dear Applicant. Other commons greetings are Dear Valued Customer, Dear Member of…. Etc. The person who actually received the email never made a tax return which made them think it was fake, however this may have been a successful scam on the people who had! If you are ever unsure of an email, ring the company it is supposedly from!
  13. Prevention Tips Be cautious of emails that ask for your personal details as no legitimate company or banks will ask for you to reveal them. If the email is from someone you don’t know and contains an attachment (often shown by a paperclip alongside the email) do not open it, just delete it! Even opening the emails can result in catastrophic problems. If you are unsure if the email is genuine. PHONE the company, they will always be happy to help you and will make sure you are not scammed, however do not phone any numbers on the email as these are likely to be directly linked to the scammer and they will falsely reassure you, so find the number independently for example via google.
  14. Mass Market Scam Mail: Have you ever received an email or letter that says YOU’VE WON! – Well this is always going to be a scam! They will often say something along the lines of “you have won £xxx amount of money and to claim this you must reply to this letter with your bank account number, expiry date and CVC number (this is the 3 digit code on the back of the card)”. Or they will say please follow this link, which will be a website address where they will ask you to fill in your personal details. From these scams they aim to steal your personal information and your bank details.
  15. Prevention Tips Think about it logically, you cannot win money or a prize in a lottery or be chosen at random if you have not entered into any competition. You do not have to pay a fee to claim a legitimate prize. Do not give out any bank details or personal information Delete the email straight away! If you reply you’ll find yourself on the Suckers list and become bombarded with Junk E-mails. MAKE SURE AS SOON AS YOU RECIEVE ANY EMAIL OR LETTER LIKE THIS, DELETE IT!
  16. Did you know? Online fraud against UK retailers totalled an estimated £105.5 million in 2013, which is a rise of 4 per cent on the previous year. Shopping and auction fraud involves deceitful shopping scams that rely on the secrecy of the internet. Auction sites, such as eBay and Gumtree, are a popular way to buy products. Whilst the majority of auction sellers are genuine, there are some corrupt criminals who use auction sites to offer fake goods or those that simply do not exist. Fraudsters use these websites to “sell” popular items such as smartphones, gadgets and “designer” clothing at low prices to catch your attention. As a result, there is a risk that your identity details could be compromised. Fraudsters could steal your identity and use it to access your personal finances. ADDITIONAL: Never send money direct to sellers, always stay on trusted sites such as PayPal, eBay etc. When you send money direct it's out of the control of the auction site you seen the product on. This means if you don't receive the product nothing can be done by the auction site.
  17. Which one is fake? The internet has created many new ways for fraudsters to try and part people from their cash. One common technique is to create a “fake” website to trick people into making a purchase. The first web address is fake as the address includes additional characters prior to the forward slash such as dashes etc… it is not an eBay page. The best thing to do if you want to be safe is open up a new window on the internet and search for the eBay site again, and to double check to see if it’s a genuine site a green lock will appear on the left hand side of the web address to show that it’s a secure site – as shown in the image above. You can trust all sites with a green lock.
  18. Which site is fake? Site one or Site Two?
  19. Site two is fake as the companies name is not simply Tiffany & Co however Tiffany Jewelers (Tiffany Discount UK). Also, this site looks a little cheap looking compared to the other site. Furthermore, be suspicious if words are misspelt or pictures and logos look shabby. For the expensive products being advertised in this site, the layout is too simple hence reinforcing this site is fake. The prices are also far to low to be genuine Tiffany products. We also carried out a check on this company by searching for their address. Their address is a mailbox shop in Soho and due to confidentiality mailbox companies will not freely hand over the real address.
  20. These are examples of a fake virus checkers. They are fake because if there was a genuine threat then your anti- virus software you have installed will create a pop-up message with the company logo informing you that they are already fixing the problem.
  21. There will be no option for you to click yes or no to treating the virus. In circumstances like this by clicking “yes” as seen in the second example you may be actually installing a virus which will slow your computer or corrupt files etc…Also, both examples demonstrate a lot of unnecessary detail about the threats, detail which genuine anti-virus checkers do not need to include. If you have visited a site and multiple pop ups appear the best thing to do is close down the tab immediately to prevent you from getting a virus. It’s best to go for security software recommended by leading stores.
  22. This is an example of genuine anti-virus software, as the layout is professional and there is a step by step guide about how the threats will be treated. Also, this is a well-known virus checker and is recommended by stores such as PCworld, Maplin, and Comet etc…
  23. Prevention Tips: Don’t put yourself and your identity in jeopardy by trusting people too quickly – be cautious when getting to know people. Do reveal to much information about yourself online – protect your privacy Never send money to people you haven’t met – fraudsters will often ask for money for emotional reasons so you send it in good nature. If you’re dating online, keep all communication on that website. Do not go onto to using email addresses, social networking or text until you are fully comfortable. When someone says "keep this is a secret", question it. Why do you need to keep it secret? What needs to be hidden from others? Chances are when keep it a secret is said the person you're talking to has criminal intent.
  24. Mobile Phone Scams: Much like the mass market scam mail, they may send you a text message saying you've won And they will then ask you to reply to the message with your details so that they can ‘give you your prize@’ How many of you think that they will actually be offering you a legitimate prize? Well unfortunately you are wrong/right, a company or random person will never want to give away money to you without reason or entry into a competition. When you have replied to the text with your personal information they will then take an extortionate amount of money from you and also be able to take money from your monthly phone bill if on a monthly paid contract.
  25. Prevention Tips: Do not reply if they encourage you to enter a competition they will also be fake! These messages will cost lots of money to send. Also do not reply to text messages saying that you have a potential claim for a recent accident! Once again this will be fake and an extortionate amount of money can be taken from you. Never phone the numbers as they will often be premium rate numbers such as 0906 which cost a lot more to contact. So whatever you do ‘ NEVER REPLY, NOT EVEN WITH A STOP MESSAGE’
  26. Prevention Methods: Use secure websites and an internet safety programmes. You can often find these in technology stores or for free online. Responding to unusual emails can put you on a ‘Suckers List’ where people know your email is active and can send spam emails – Do NOT reply. Your bank will never ask for your PIN or any other personal bank details via email, so don’t reply to them. Be aware of who is around when logging onto accounts online, people may be able to see your password. - Never reuse a password and change them regularly. Here’s an Example: Steve’s has an email: steve@email.com – his password is Steve123. Can this be improved? How about 5t3vE123? In the first password 1 capital letter is used along with 3 numbers, this is a weak password as it’s easy to guess. The Second password has 1 capital letter, 2 lower case letters and 5 numbers, however 2 of the numbers replace some letters. 5 replaces the ‘S’ and 3 replaces the ‘E’. This is a strong password.
  27. Viruses and Anti-Virus: Viruses can find there way onto devices via email, websites and portable devices like USB’s. It’s vital that you have some form of Anti-Virus protection on your device, including your mobile phone. All devices come with built in protection however it’s strongly recommended that you use additional. There’s both payware an freeware software out there that can be downloaded or bought in most technology shops.
  28. There are no guaranteed get rich schemes. These schemes are designed to pull people in and scam them out of a lot of money. You should always be suspicious of offers that say “you can win a load of money by clicking on the link or get rich quick by going to this website” If it sound too good to be true its will be.   Never send money or give your details out to any one you haven’t met or do not know or trust. As seen before scammers will develop your trust with the use of online relationships and sob stories.   The same also applies to companies; do not send money or give your details to companies you do not know or trust – Always carry out checks on companies such as addresses and contact information, even searching the address on things like google maps will give you an idea if they are genuine – Banks & legitimate businesses will never ask for you details and information over the phone or by email so do not hand it over.   Destroy any documents, credit/debit cards and anything else with your personal details on. If criminals get hold of your personal information they can carry out criminal activities online with your money and information.   Never be embarrassed to report a scam these scammers are very clever and devious so there is no shame in being deceived. However if you spot a scam or have been scammed yourself you can contact action fraud or alternatively if you know the suspect or their location contact the police immediately.
  29. The audience will now ask questions in relation to Cyber Crime and the Presentation.