SlideShare a Scribd company logo
1 of 9
Scam, Fraud and
Phishing
Harsh Patel
Kush Patel
Shivang Goyal
Shubham Chaudhari
Yousuf Mohd Sayeed
Department Here
Problem Definition
Frauds, scams, and phishing are major threats
to individuals and organizations worldwide,
causing substantial financial losses and
reputational damage. These criminal activities
exploit vulnerabilities in the online world,
targeting unsuspecting victims who may not
have the necessary knowledge to protect
themselves. To address this problem,
awareness must be raised, and our group aims
to research strategies that can be used to
tackle this problem.
Concept Clarification
Scam, Fraud and Phishing
Scam:
• False promises, misinformation, and
psychological manipulation
• Fake websites, telemarketing calls
Fraud:
• Deception or misrepresentation
• Identity theft, credit card fraud
Phishing:
• Cyber criminals
• Fraudulent emails, text messages
Individuals
Businesses
Elderly People
Children/Teenager
Society as a whole
Scam, Fraud and Phishing
Impacted People
Motivation
Financial
gain
Revenge
Personal
Gain
Political
or social
Thrill-
seeking
Key Actors and activities that enable these criminal activities.
• Scammers/fraudsters (who initiate the fraudulent activity)
• Victims (who fall prey to the scam or fraud)
• Technology (provide the infrastructure that allows scammers to reach a wider
audience)
• Lack of awareness (it makes these things more vulnerable to falling victim to
scams and frauds.)
• Payment methods (it is an easy way for scammers to obtain money from their
victims)
Scam, Fraud and Phishing
Into the mind of scammer
• Prevent scams and be cautious
• Intervene by law enforcements to track down scammers,
identify their victims
• To help individuals rehabilitate and prevent recidivism.
Traits
• Rationalization
• Empathy deficit
• Narcissism
• Skilful manipulation
Root Causes
• Technology is constantly evolving
• Where are we going wrong?
PSYCHOLOGY OF VICTIMS
Why is it important?
• Scammer detection
• Prevention
• Law enforcement
• Recovery
Desperation Trust
Over
confidence
Cognitive bias
Fear of
missing
out
Greed
Our Role as Engineering
Leaders
• Character- Desire to innovate and solve
societal problems in ethical and responsible
ways.
• Vision- Providing Platform and Creating
Awareness around the world and starting
from the Leaders itself!
• Competency- Knowledge and skills to
identify scams. Staying informed about the
tactics and train our teams to do the same.
• Involvement and Collaboration- Creating a
culture of vigilance, and providing necessary
support by collaborating with other experts
and stakeholders

More Related Content

Similar to Frauds, Scams and Phishing.pptx Engineering Leadership

Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23
MikeBnntt
 
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamCYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
University of Hertfordshire
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
Sara-Jayne Terp
 
03 Member Spotlight (Virgin Media)
03   Member Spotlight (Virgin Media)03   Member Spotlight (Virgin Media)
03 Member Spotlight (Virgin Media)
#TheFraudTube
 

Similar to Frauds, Scams and Phishing.pptx Engineering Leadership (20)

Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Managing Fraud and Corruption in Projects
Managing Fraud and Corruption in ProjectsManaging Fraud and Corruption in Projects
Managing Fraud and Corruption in Projects
 
Bucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in DigitalBucking the Misleading Fraud Narrative in Digital
Bucking the Misleading Fraud Narrative in Digital
 
Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23Madoff Rotary Presentation Apr23
Madoff Rotary Presentation Apr23
 
Role of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detectionRole of Internal Audit in fraud prevention and detection
Role of Internal Audit in fraud prevention and detection
 
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red TeamCYBER ATTACK SCENARIOS - Part 1: Building The Red Team
CYBER ATTACK SCENARIOS - Part 1: Building The Red Team
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Investment Alert: Affinity Fraud Explained By Money 2.0 Conference
Investment Alert: Affinity Fraud Explained By Money 2.0 ConferenceInvestment Alert: Affinity Fraud Explained By Money 2.0 Conference
Investment Alert: Affinity Fraud Explained By Money 2.0 Conference
 
ISM ppt October 2014_final
ISM ppt October 2014_finalISM ppt October 2014_final
ISM ppt October 2014_final
 
03 Member Spotlight (Virgin Media)
03   Member Spotlight (Virgin Media)03   Member Spotlight (Virgin Media)
03 Member Spotlight (Virgin Media)
 
Digital Advocacy: Using Social Media to Mobilize your Audience
Digital Advocacy: Using Social Media to Mobilize your AudienceDigital Advocacy: Using Social Media to Mobilize your Audience
Digital Advocacy: Using Social Media to Mobilize your Audience
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
Internet 2.0 Conference Reviews Ways To Spot Scam Offenses In The Digital Com...
 
How To Structure An Analytical Essay. MyEssay
How To Structure An Analytical Essay. MyEssayHow To Structure An Analytical Essay. MyEssay
How To Structure An Analytical Essay. MyEssay
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Elder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationElder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial Exploitation
 
2013-05-07 Nonprofit Fraud: Part II
2013-05-07 Nonprofit Fraud: Part II2013-05-07 Nonprofit Fraud: Part II
2013-05-07 Nonprofit Fraud: Part II
 
Houston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment OperationsHouston Johnson - Preventing Undercover Employment Operations
Houston Johnson - Preventing Undercover Employment Operations
 
Fraud prevention
Fraud preventionFraud prevention
Fraud prevention
 

Recently uploaded

Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
benjamincojr
 

Recently uploaded (20)

Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
NEWLETTER FRANCE HELICES/ SDS SURFACE DRIVES - MAY 2024
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 

Frauds, Scams and Phishing.pptx Engineering Leadership

  • 1.
  • 2. Scam, Fraud and Phishing Harsh Patel Kush Patel Shivang Goyal Shubham Chaudhari Yousuf Mohd Sayeed Department Here
  • 3. Problem Definition Frauds, scams, and phishing are major threats to individuals and organizations worldwide, causing substantial financial losses and reputational damage. These criminal activities exploit vulnerabilities in the online world, targeting unsuspecting victims who may not have the necessary knowledge to protect themselves. To address this problem, awareness must be raised, and our group aims to research strategies that can be used to tackle this problem.
  • 4. Concept Clarification Scam, Fraud and Phishing Scam: • False promises, misinformation, and psychological manipulation • Fake websites, telemarketing calls Fraud: • Deception or misrepresentation • Identity theft, credit card fraud Phishing: • Cyber criminals • Fraudulent emails, text messages
  • 5. Individuals Businesses Elderly People Children/Teenager Society as a whole Scam, Fraud and Phishing Impacted People Motivation Financial gain Revenge Personal Gain Political or social Thrill- seeking
  • 6. Key Actors and activities that enable these criminal activities. • Scammers/fraudsters (who initiate the fraudulent activity) • Victims (who fall prey to the scam or fraud) • Technology (provide the infrastructure that allows scammers to reach a wider audience) • Lack of awareness (it makes these things more vulnerable to falling victim to scams and frauds.) • Payment methods (it is an easy way for scammers to obtain money from their victims) Scam, Fraud and Phishing
  • 7. Into the mind of scammer • Prevent scams and be cautious • Intervene by law enforcements to track down scammers, identify their victims • To help individuals rehabilitate and prevent recidivism. Traits • Rationalization • Empathy deficit • Narcissism • Skilful manipulation Root Causes • Technology is constantly evolving • Where are we going wrong?
  • 8. PSYCHOLOGY OF VICTIMS Why is it important? • Scammer detection • Prevention • Law enforcement • Recovery Desperation Trust Over confidence Cognitive bias Fear of missing out Greed
  • 9. Our Role as Engineering Leaders • Character- Desire to innovate and solve societal problems in ethical and responsible ways. • Vision- Providing Platform and Creating Awareness around the world and starting from the Leaders itself! • Competency- Knowledge and skills to identify scams. Staying informed about the tactics and train our teams to do the same. • Involvement and Collaboration- Creating a culture of vigilance, and providing necessary support by collaborating with other experts and stakeholders