SlideShare a Scribd company logo
1 of 19
The Dark Side of the
Web: Scam, Fraud and
Phishing
Presented By:
Harsh Patel
Kush Patel
Shivang Goyal
Shubham Chaudhari
Yousuf Mohd Sayeed
Dr. Minha R Ha.
Guided By:
Problem Definition
Frauds, scams, and phishing are major threats
to individuals and organizations worldwide,
causing substantial financial losses and
reputational damage. These criminal activities
exploit vulnerabilities in the online world,
targeting unsuspecting victims who may not
have the necessary knowledge to protect
themselves. To address this problem,
awareness must be raised, and our group aims
to research strategies that can be used to
tackle this problem.
Introduction
Scam, Fraud and Phishing
Scam:
• False promises, misinformation, and
psychological manipulation
• Fake websites, telemarketing calls
Fraud:
• Deception or misrepresentation
• Identity theft, credit card fraud
Phishing:
• Cyber criminals
• Fraudulent emails, text messages
Motivation
Financial
gain
Revenge
Personal
Gain
Political
or social
Thrill-
seeking
What drives scammers to do such activities?
Impact of Fraud, Scams, and Phishing
Factors that enable
these criminal activities:
Scammer/
Fraudsters
Group Leader
Researcher
Planner
Executor
Victims
Students
Foreigners
Job Seekers
Elderly
people
Third Party
Scam Leader
Organizations
Cyber-police
Mechanisms
Technology
Provide the
infrastructure
that allows
scammers to
reach a wider
audience
Payment
Methods
Global Reach
Lack of
Awareness
Makes more
vulnerable to
falling victim
Trust Issues
Lack of
Regulations
Not enough
security
Cyber police
not as
effective
Key Actors:
INSIDE THE MIND OF SCAMMER
Root Causes
• Technology is constantly evolving
• Where are we going wrong?
Why is it important
• Prevent scams and be cautious
• Intervene by law enforcements to
track down scammers, identify
their victims
• To help individuals rehabilitate
and prevent recidivism.
• Rationalization
• Empathy deficit
• Narcissism
• Skilful manipulation
Traits
INSIDE THE MIND OF SCAMMER
• Rationalization –
1. Believe system is unfair, blame the victims
AL Capone – An American Gangster
"I have spent the best years of my life-giving people the lighter
pleasures, helping them have a good time, and all I get is abuse, the
existence of a hunted man."
• Empathy deficit –
1. Treat Victims as objects for personal gain,
2. avoid feeling guilty or remorseful
• Narcissism -
1. An inflated sense of self-importance and a constant need for attention
and admiration.
2. Motivated by the desire to impress others or to feel important and
powerful
• Skillful manipulation
1. Tactics to gain trust, including flattery, emotional appeals, and false
promises.
THE FOOT IN THE DOOR TECHNIQUE
LET US LEARN FROM NETFLIX
PSYCHOLOGY OF VICTIMS
Desperation Trust
Over
confidence
Fear of
missing out
Greed
Protecting Yourself from Scam, Phishing, and Fraud
Use strong passwords and two-
factor authentication to protect
online accounts
Be cautious when opening
emails or clicking on links from
unknown sources
Keep personal information
private and always verify the
legitimacy of requests for
personal information
Use anti-virus software
and keep it updated to
protect against malware
and other threats
Regularly monitor
bank and credit card
statements for
suspicious activity
Act quickly if you
suspect you have
become a victim of
scam, phishing, or fraud
Seek assistance from
specialized
organizations and
resources
What if you are already scammed?
Don’t be depressed/ Stay calm
Report the incident to authorities
Contact your bank or credit card company
Seek legal assistance
• Building awareness :
1. Educating oneself about common scam tactics and being
skeptical of unsolicited offers or requests can help reduce
the likelihood of falling victim to a scam.
• Avoiding emotional decision-making:
1. Be aware of your emotions and avoid making decisions
when you are feeling overwhelmed or stressed.
2. Taking a step back, assessing the situation logically, and
consulting with trusted advisors can help prevent making
impulsive decisions.
• Developing healthy skepticism:
1. Be skeptical of anything that seems too good to be true
2. Questioning information and verifying sources can help
prevent falling for false or misleading information. This can
also help avoid confirmation bias, where one is more likely
to believe information that confirms pre-existing beliefs.
• Building resilience:
1. Developing resilience through social support, self-care, and
positive coping mechanisms can help reduce vulnerability to
scams.
PSYCHOLOGICAL STRATEGIES
• Use cognitive reframing:
1. Cognitive reframing involves changing the way you think about a
situation to reduce negative emotions or behaviors.
2. When you receive a suspicious email or message, try reframing
your thoughts by considering alternative explanations or
questioning the authenticity of the message. This can help
reduce the emotional impact and make it easier to make
rational decisions.
• Use self-control strategies:
1. Self-control strategies such as distraction, delay, or self-talk can
help reduce impulsive decision-making and increase the
likelihood that you will make rational decisions.
2. If you receive a message asking you to take action, try delaying
your response and taking some time to think it over.
• Use mindfulness techniques:.
1. Mindfulness techniques such as deep breathing, meditation, or
body scan can help reduce stress and improve your ability to
make rational decisions when faced with a potential scam.
2. If you feel overwhelmed or stressed by a message or offer, try
practicing mindfulness to help calm your mind and reduce the
emotional impact.
PSYCHOLOGICAL STRATEGIES
PREVENTION IS BETTER THAN CURE !
FAKE! • FAKE phishing links, QR’s
• Blockchain- Sense of urgency, FOMO
DON’T CATCH THE FALLING KNIFE!
• Understand the Purpose of Bitcoin. A 500 $
investment cannot transfer you 250,000
BTC
1BTC = 30,000 CAD
• Look for the 🔒 symbol on the websites.
• Cryptocurrency exchanges are not Banks.
FTX collapse, VAULD suspends Withdrawals
NOT YOUR KEYS, NOT YOUR CRYPTO
Fraud in the age of AI
• The use of AI in scams and fraud is a
growing concern.
• Scammers can use AI to create
realistic deepfake videos and voice
recordings.
• AI-powered chatbots can be used to
scam people by mimicking human
conversations.
• AI can be used to analyze data and
create targeted phishing campaigns.
Our Role as Engineering Leaders
• Character- Desire to innovate and solve
societal problems in an ethical and
responsible way.
• Vision- Providing Platform and Creating
Awareness around the world and starting
from the Leaders itself!
• Competency- Knowledge and skills to
identify scams. Staying informed about the
tactics and train our teams to do the same.
• Involvement- Creating a culture of
vigilance, and providing necessary support
to help people stay safe online
• Collaboration- Build strong partnership
with other leaders, experts, stakeholders to
address the issue on a broader scale.
References
Konnikova, M. (2016, July 27). The psychology of con artists, and how to avoid them [Video].
YouTube. https://www.youtube.com/watch?v=hSlBiMdlyyU&t=133s
Norris, G., Brookes, A. & Dowell, D. The Psychology of Internet Fraud Victimisation: a Systematic
Review. J Police Crim Psych 34, 231–245 (2019). https://doi.org/10.1007/s11896-019-09334-5
Watts, S. (2019, March 21). The Psychology Behind Scamming. Forbes. Retrieved from
https://www.forbes.com/sites/sarahwatts/2019/03/21/the-psychology-behind-
scamming/?sh=62e56f953447
Vircom. (n.d.). Phishing Examples, Techniques, and Motivations. Retrieved March 26, 2023, from
https://www.vircom.com/blog/phishing-examples-techniques-motivations/
Final - Scam, Fraud and Phishing-Resubmission.pptx

More Related Content

Similar to Final - Scam, Fraud and Phishing-Resubmission.pptx

Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Beth Sallay
 
Informed Investor: Social Media
Informed Investor: Social Media Informed Investor: Social Media
Informed Investor: Social Media INInvestWatch
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxjennblair0830
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Avoid Fraud -- and Secure the Life You Want
Avoid Fraud -- and Secure the Life You Want Avoid Fraud -- and Secure the Life You Want
Avoid Fraud -- and Secure the Life You Want Brian Weatherdon
 
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxAvoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxafiyashaikh25
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Describe Your Background Essay Example
Describe Your Background Essay ExampleDescribe Your Background Essay Example
Describe Your Background Essay ExampleAndrea Lawson
 
A criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative frameworkA criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative frameworkSameer Dasaka
 
When bureaucrats met twitter
When bureaucrats met twitterWhen bureaucrats met twitter
When bureaucrats met twitterKevin Kim
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfRahil Foundation
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security MotivationSuman Thapaliya
 
Seductive security - Art of seduction
Seductive security - Art of seductionSeductive security - Art of seduction
Seductive security - Art of seductionb coatesworth
 

Similar to Final - Scam, Fraud and Phishing-Resubmission.pptx (20)

Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
Informed Investor: Social Media
Informed Investor: Social Media Informed Investor: Social Media
Informed Investor: Social Media
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Avoid Fraud -- and Secure the Life You Want
Avoid Fraud -- and Secure the Life You Want Avoid Fraud -- and Secure the Life You Want
Avoid Fraud -- and Secure the Life You Want
 
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptxAvoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
Avoiding the Top Social Media Frauds in 2024 Protective Measures.pptx
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Describe Your Background Essay Example
Describe Your Background Essay ExampleDescribe Your Background Essay Example
Describe Your Background Essay Example
 
A criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative frameworkA criminological psychology based digital forensic investigative framework
A criminological psychology based digital forensic investigative framework
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
When bureaucrats met twitter
When bureaucrats met twitterWhen bureaucrats met twitter
When bureaucrats met twitter
 
Social Dilemma.pptx
Social Dilemma.pptxSocial Dilemma.pptx
Social Dilemma.pptx
 
Test your Unconscious Bias
Test your Unconscious BiasTest your Unconscious Bias
Test your Unconscious Bias
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Ethics In A Digital Age
Ethics In A Digital AgeEthics In A Digital Age
Ethics In A Digital Age
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Seductive security - Art of seduction
Seductive security - Art of seductionSeductive security - Art of seduction
Seductive security - Art of seduction
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Final - Scam, Fraud and Phishing-Resubmission.pptx

  • 1.
  • 2. The Dark Side of the Web: Scam, Fraud and Phishing Presented By: Harsh Patel Kush Patel Shivang Goyal Shubham Chaudhari Yousuf Mohd Sayeed Dr. Minha R Ha. Guided By:
  • 3. Problem Definition Frauds, scams, and phishing are major threats to individuals and organizations worldwide, causing substantial financial losses and reputational damage. These criminal activities exploit vulnerabilities in the online world, targeting unsuspecting victims who may not have the necessary knowledge to protect themselves. To address this problem, awareness must be raised, and our group aims to research strategies that can be used to tackle this problem.
  • 4. Introduction Scam, Fraud and Phishing Scam: • False promises, misinformation, and psychological manipulation • Fake websites, telemarketing calls Fraud: • Deception or misrepresentation • Identity theft, credit card fraud Phishing: • Cyber criminals • Fraudulent emails, text messages
  • 6. Impact of Fraud, Scams, and Phishing
  • 7. Factors that enable these criminal activities: Scammer/ Fraudsters Group Leader Researcher Planner Executor Victims Students Foreigners Job Seekers Elderly people Third Party Scam Leader Organizations Cyber-police Mechanisms Technology Provide the infrastructure that allows scammers to reach a wider audience Payment Methods Global Reach Lack of Awareness Makes more vulnerable to falling victim Trust Issues Lack of Regulations Not enough security Cyber police not as effective Key Actors:
  • 8. INSIDE THE MIND OF SCAMMER Root Causes • Technology is constantly evolving • Where are we going wrong? Why is it important • Prevent scams and be cautious • Intervene by law enforcements to track down scammers, identify their victims • To help individuals rehabilitate and prevent recidivism. • Rationalization • Empathy deficit • Narcissism • Skilful manipulation Traits
  • 9. INSIDE THE MIND OF SCAMMER • Rationalization – 1. Believe system is unfair, blame the victims AL Capone – An American Gangster "I have spent the best years of my life-giving people the lighter pleasures, helping them have a good time, and all I get is abuse, the existence of a hunted man." • Empathy deficit – 1. Treat Victims as objects for personal gain, 2. avoid feeling guilty or remorseful • Narcissism - 1. An inflated sense of self-importance and a constant need for attention and admiration. 2. Motivated by the desire to impress others or to feel important and powerful • Skillful manipulation 1. Tactics to gain trust, including flattery, emotional appeals, and false promises. THE FOOT IN THE DOOR TECHNIQUE LET US LEARN FROM NETFLIX
  • 10. PSYCHOLOGY OF VICTIMS Desperation Trust Over confidence Fear of missing out Greed
  • 11. Protecting Yourself from Scam, Phishing, and Fraud Use strong passwords and two- factor authentication to protect online accounts Be cautious when opening emails or clicking on links from unknown sources Keep personal information private and always verify the legitimacy of requests for personal information Use anti-virus software and keep it updated to protect against malware and other threats Regularly monitor bank and credit card statements for suspicious activity Act quickly if you suspect you have become a victim of scam, phishing, or fraud Seek assistance from specialized organizations and resources
  • 12. What if you are already scammed? Don’t be depressed/ Stay calm Report the incident to authorities Contact your bank or credit card company Seek legal assistance
  • 13. • Building awareness : 1. Educating oneself about common scam tactics and being skeptical of unsolicited offers or requests can help reduce the likelihood of falling victim to a scam. • Avoiding emotional decision-making: 1. Be aware of your emotions and avoid making decisions when you are feeling overwhelmed or stressed. 2. Taking a step back, assessing the situation logically, and consulting with trusted advisors can help prevent making impulsive decisions. • Developing healthy skepticism: 1. Be skeptical of anything that seems too good to be true 2. Questioning information and verifying sources can help prevent falling for false or misleading information. This can also help avoid confirmation bias, where one is more likely to believe information that confirms pre-existing beliefs. • Building resilience: 1. Developing resilience through social support, self-care, and positive coping mechanisms can help reduce vulnerability to scams. PSYCHOLOGICAL STRATEGIES
  • 14. • Use cognitive reframing: 1. Cognitive reframing involves changing the way you think about a situation to reduce negative emotions or behaviors. 2. When you receive a suspicious email or message, try reframing your thoughts by considering alternative explanations or questioning the authenticity of the message. This can help reduce the emotional impact and make it easier to make rational decisions. • Use self-control strategies: 1. Self-control strategies such as distraction, delay, or self-talk can help reduce impulsive decision-making and increase the likelihood that you will make rational decisions. 2. If you receive a message asking you to take action, try delaying your response and taking some time to think it over. • Use mindfulness techniques:. 1. Mindfulness techniques such as deep breathing, meditation, or body scan can help reduce stress and improve your ability to make rational decisions when faced with a potential scam. 2. If you feel overwhelmed or stressed by a message or offer, try practicing mindfulness to help calm your mind and reduce the emotional impact. PSYCHOLOGICAL STRATEGIES
  • 15. PREVENTION IS BETTER THAN CURE ! FAKE! • FAKE phishing links, QR’s • Blockchain- Sense of urgency, FOMO DON’T CATCH THE FALLING KNIFE! • Understand the Purpose of Bitcoin. A 500 $ investment cannot transfer you 250,000 BTC 1BTC = 30,000 CAD • Look for the 🔒 symbol on the websites. • Cryptocurrency exchanges are not Banks. FTX collapse, VAULD suspends Withdrawals NOT YOUR KEYS, NOT YOUR CRYPTO
  • 16. Fraud in the age of AI • The use of AI in scams and fraud is a growing concern. • Scammers can use AI to create realistic deepfake videos and voice recordings. • AI-powered chatbots can be used to scam people by mimicking human conversations. • AI can be used to analyze data and create targeted phishing campaigns.
  • 17. Our Role as Engineering Leaders • Character- Desire to innovate and solve societal problems in an ethical and responsible way. • Vision- Providing Platform and Creating Awareness around the world and starting from the Leaders itself! • Competency- Knowledge and skills to identify scams. Staying informed about the tactics and train our teams to do the same. • Involvement- Creating a culture of vigilance, and providing necessary support to help people stay safe online • Collaboration- Build strong partnership with other leaders, experts, stakeholders to address the issue on a broader scale.
  • 18. References Konnikova, M. (2016, July 27). The psychology of con artists, and how to avoid them [Video]. YouTube. https://www.youtube.com/watch?v=hSlBiMdlyyU&t=133s Norris, G., Brookes, A. & Dowell, D. The Psychology of Internet Fraud Victimisation: a Systematic Review. J Police Crim Psych 34, 231–245 (2019). https://doi.org/10.1007/s11896-019-09334-5 Watts, S. (2019, March 21). The Psychology Behind Scamming. Forbes. Retrieved from https://www.forbes.com/sites/sarahwatts/2019/03/21/the-psychology-behind- scamming/?sh=62e56f953447 Vircom. (n.d.). Phishing Examples, Techniques, and Motivations. Retrieved March 26, 2023, from https://www.vircom.com/blog/phishing-examples-techniques-motivations/