SlideShare a Scribd company logo
Agenda…
Knowledge Check
What is Cyber Crime?
IdentityTheft
Phishing
Common Scams
Prevention Methods
Knowledge Check
“I have internet access but I don’t shop online,
this means I won’t become a victim of Cyber
Crime.”
Is this statementTrue or False?
Knowledge Check
“IdentityTheft is a type of crime in which
personal information is stolen to carry out
criminal activities.”
Is this statementTrue or False?
Knowledge Check
“Cyber Crime is a type of crime carried out by
criminals using computers, or similar devices,
with a connection to the internet.”
Is this statementTrue or False?
Knowledge Check
“The Internet is so big that things like fraud or
identity theft shouldn't really concern you; the
probability you will be targeted is very small
unless you use the Internet a lot.”
Is this statementTrue or False?
What is Cyber Crime?
Criminal activity (electronic device with
a connection to the internet.)
Device can become infected within 5
minutes.
IdentityTheft
Using another's personal details to obtain
credit, loans.
Approx. 10 million people affected per year.
19 victims every minute.
If caught early it can be resolved.
How do they do it?
Phishing – Criminals pose as
‘legitimate companies’.
Email hundreds of people from the
Suckers List.
people reply criminals now have
everything they need to steal your
identity.
Tips to Prevent IDTheft
1. Shred anything with your details on.
2. Check your statements and report
anything suspicious.
3. Ensure your home network is secure.
4. Ignore emails saying “You’veWon…” or
from somebody you’re suspicious
about.
Phishing
A bad day ‘phishing’, beats a good day working:
2,000,000 emails sent
100,000 delivered to recipient
5,000 click on the Phishing link
100 enter personal details
£1,200 from each person who enters information
Potential Reward: £120,000
David Levi made over £360,000 from 160 people
GENUINE EMAIL?
LOOKS IT!
GENERIC
GREETINGS
ATTACHMENT
BIG DANGER
DIDYOU MAKE
ATAX RETURN?
PreventionTips
Be cautious of emails that request your
details. Companies will not ask via email.
From someone you don’t know/contains an
attachment - delete it.
Call the sender to confirm that it was them
that sent it.
Mass Market Scam Mail (MMSM)
Receiving a letter or email saying someone
has won a lottery or a prize.
A person will input their details to claim the
“prize”.
Criminals then obtain personal details, inc.
bank details to steal money.
PreventionTips
You cannot win money/a prize if you
haven’t entered into any
competition.
You do not have to pay a fee to
claim a legitimate prize.
Do not give personal information
Delete the email straight away!
Common Scams – Online Shopping
Deceitful shopping's scams reliant on
the secrecy of the internet.
Whilst majority of auction sellers are
genuine, there’re some who sell fake
goods.
Sellers use these sites to “sell” popular
items.
Which one is fake?
1. http://signin-ebay.com/
2. https://signin.ebay.com/
Dashes not
used
"HTTPS"
S = Secure
Periods
are used
Site
One
Site
Two
Company
Name
NotWell
Designed
Prices to
low
FakeVirus Software – Example One
FakeVirus Software – ExampleTwo
NoYes/No
Buttons
Unnecessary
Detail
Romance Scams
Cost £24.5 million per year.
2,800 online dating crimes are reported.
55% of all reported crimes came from 40-59
year olds and 63% from females.
Victims are fooled by criminals using fake
personal profiles.
Gain the trust of their victims, then request
money.
PreventionTips
Don’t put yourself and your identity in
jeopardy.
Do not reveal to much/protect your privacy.
Never send money to people you haven’t
met.
Keep all communication on the dating
website.
Be courteous when "keep this is a secret" is
motioned
Mobile Phone Scams
Receiving a text from an
unknown number saying you
have won and that you need to
claim money/prize.
Costs to text back are
an extortionate amount.
PreventionTips
Do NOT reply to text messages that
offer you money.
Do NOT reply to text messages
encouraging you to enter a
competition.
You may have to call a premium rate
number - Do NOT phone them back.
Prevention Methods
Secure websites and an internet safety software.
Responding to unusual emails can put you on a
‘Suckers List’ – Do NOT reply.
Banks never ask for personal bank details via
email. Do NOT reply.
Be aware of your surroundings – never reuse a
password.
steve@email.com – his password is Steve123.
How about 5t3vE123? Capital letter
and numbers
included.
Capital letter and
numbers to spell
‘Steve’ This is
stronger.
Viruses and Anti-Virus
Via email, websites & portable devices.
Vital that you have some form of Anti-
Virus protection.
Strongly recommended that you use
additional protection.
Payware an freeware software out there,
bought in most technology shops.
10Golden Rules
1. There’s no guaranteed get-rich-quick schemes - sound to good to be true?
2. Never send money or give out your details when you do not know/trust the
person or company you are giving them to.
3. Destroy personal information, shred documents, credit cards etc.
4. Log directly onto a website rather than clicking on the link provided.
5. Never reply to spam emails, even when you're trying to stop them.
6. Always remember: scammers are cunning and clever.They know how to
manipulate you to produce the response they want.
7. Legitimate banks and companies will not ask for your details via email or phone.
8. Just because a company has a well design website doesn't means it ligitimate.
9. Be suspicious. If you are unsure about anything, seek advice from family or
Police.
10. Never get embarrassed by reporting a scam – If you spot a scam or have been
scammed contact ActionFraud on 0300 123 2040 or visit their website at
www.actionfraud.org.uk
Thank you!
Feel free to ask
any questions!

More Related Content

Similar to Unit 3 - Cyber Crime.pptx

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
 
123.pptx
123.pptx123.pptx
Scams
ScamsScams
Scams
dentonjo
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
Anthony Semadeni
 
Online-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptxOnline-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptx
remisisdulawan22
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
srishtig993
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Nazish Jamali
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
- Mark - Fullbright
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
- Mark - Fullbright
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
Phishing
PhishingPhishing
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
gaby350
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P Ptawnygsu
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
Dixita S
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
jaysonstreet
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
Scott Schober
 

Similar to Unit 3 - Cyber Crime.pptx (20)

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
123.pptx
123.pptx123.pptx
123.pptx
 
Scams
ScamsScams
Scams
 
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber CrimMy #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
My #1 Complaint – My Clients Don’t Protect Themselves from Fraud and Cyber Crim
 
Online-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptxOnline-Scams, Dont be fooled by online scammers.pptx
Online-Scams, Dont be fooled by online scammers.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Phishing
PhishingPhishing
Phishing
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 

Recently uploaded

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 

Recently uploaded (20)

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 

Unit 3 - Cyber Crime.pptx

  • 1.
  • 2. Agenda… Knowledge Check What is Cyber Crime? IdentityTheft Phishing Common Scams Prevention Methods
  • 3. Knowledge Check “I have internet access but I don’t shop online, this means I won’t become a victim of Cyber Crime.” Is this statementTrue or False?
  • 4. Knowledge Check “IdentityTheft is a type of crime in which personal information is stolen to carry out criminal activities.” Is this statementTrue or False?
  • 5. Knowledge Check “Cyber Crime is a type of crime carried out by criminals using computers, or similar devices, with a connection to the internet.” Is this statementTrue or False?
  • 6. Knowledge Check “The Internet is so big that things like fraud or identity theft shouldn't really concern you; the probability you will be targeted is very small unless you use the Internet a lot.” Is this statementTrue or False?
  • 7. What is Cyber Crime? Criminal activity (electronic device with a connection to the internet.) Device can become infected within 5 minutes.
  • 8. IdentityTheft Using another's personal details to obtain credit, loans. Approx. 10 million people affected per year. 19 victims every minute. If caught early it can be resolved.
  • 9. How do they do it? Phishing – Criminals pose as ‘legitimate companies’. Email hundreds of people from the Suckers List. people reply criminals now have everything they need to steal your identity.
  • 10. Tips to Prevent IDTheft 1. Shred anything with your details on. 2. Check your statements and report anything suspicious. 3. Ensure your home network is secure. 4. Ignore emails saying “You’veWon…” or from somebody you’re suspicious about.
  • 11. Phishing A bad day ‘phishing’, beats a good day working: 2,000,000 emails sent 100,000 delivered to recipient 5,000 click on the Phishing link 100 enter personal details £1,200 from each person who enters information Potential Reward: £120,000 David Levi made over £360,000 from 160 people
  • 13. PreventionTips Be cautious of emails that request your details. Companies will not ask via email. From someone you don’t know/contains an attachment - delete it. Call the sender to confirm that it was them that sent it.
  • 14. Mass Market Scam Mail (MMSM) Receiving a letter or email saying someone has won a lottery or a prize. A person will input their details to claim the “prize”. Criminals then obtain personal details, inc. bank details to steal money.
  • 15. PreventionTips You cannot win money/a prize if you haven’t entered into any competition. You do not have to pay a fee to claim a legitimate prize. Do not give personal information Delete the email straight away!
  • 16. Common Scams – Online Shopping Deceitful shopping's scams reliant on the secrecy of the internet. Whilst majority of auction sellers are genuine, there’re some who sell fake goods. Sellers use these sites to “sell” popular items.
  • 17. Which one is fake? 1. http://signin-ebay.com/ 2. https://signin.ebay.com/ Dashes not used "HTTPS" S = Secure Periods are used
  • 20. FakeVirus Software – Example One
  • 21. FakeVirus Software – ExampleTwo NoYes/No Buttons Unnecessary Detail
  • 22.
  • 23. Romance Scams Cost £24.5 million per year. 2,800 online dating crimes are reported. 55% of all reported crimes came from 40-59 year olds and 63% from females. Victims are fooled by criminals using fake personal profiles. Gain the trust of their victims, then request money.
  • 24. PreventionTips Don’t put yourself and your identity in jeopardy. Do not reveal to much/protect your privacy. Never send money to people you haven’t met. Keep all communication on the dating website. Be courteous when "keep this is a secret" is motioned
  • 25. Mobile Phone Scams Receiving a text from an unknown number saying you have won and that you need to claim money/prize. Costs to text back are an extortionate amount.
  • 26. PreventionTips Do NOT reply to text messages that offer you money. Do NOT reply to text messages encouraging you to enter a competition. You may have to call a premium rate number - Do NOT phone them back.
  • 27. Prevention Methods Secure websites and an internet safety software. Responding to unusual emails can put you on a ‘Suckers List’ – Do NOT reply. Banks never ask for personal bank details via email. Do NOT reply. Be aware of your surroundings – never reuse a password. steve@email.com – his password is Steve123. How about 5t3vE123? Capital letter and numbers included. Capital letter and numbers to spell ‘Steve’ This is stronger.
  • 28. Viruses and Anti-Virus Via email, websites & portable devices. Vital that you have some form of Anti- Virus protection. Strongly recommended that you use additional protection. Payware an freeware software out there, bought in most technology shops.
  • 29. 10Golden Rules 1. There’s no guaranteed get-rich-quick schemes - sound to good to be true? 2. Never send money or give out your details when you do not know/trust the person or company you are giving them to. 3. Destroy personal information, shred documents, credit cards etc. 4. Log directly onto a website rather than clicking on the link provided. 5. Never reply to spam emails, even when you're trying to stop them. 6. Always remember: scammers are cunning and clever.They know how to manipulate you to produce the response they want. 7. Legitimate banks and companies will not ask for your details via email or phone. 8. Just because a company has a well design website doesn't means it ligitimate. 9. Be suspicious. If you are unsure about anything, seek advice from family or Police. 10. Never get embarrassed by reporting a scam – If you spot a scam or have been scammed contact ActionFraud on 0300 123 2040 or visit their website at www.actionfraud.org.uk
  • 30. Thank you! Feel free to ask any questions!

Editor's Notes

  1. Landing page: Good Evening Ladies and Gentlemen my name is <NAME> and I’m from <GROUP NAME>. Working in Partnership with the Metropolitan Police, we’re here to deliver a bespoke Cyber Crime Prevention Presentation. In November 2013 it was clear that the police service had fallen behind with Cyber Crime, the Metropolitan Police created ‘Falcon’ – Fraud and Linked Crime Online, a unit consisting of 500 Detectives dedicated to driving Cyber Crime down – as an addition the Cyber Crime Community Initiative was introduced in October 2014, by Chief Superintendent Nick Downing, the Borough Commander for Hillingdon, to prevent cyber crime with education, focusing predominantly on the elderly and vulnerable people – we believe that if we take a proactive approach by educating certain individuals we can prevent people becoming victims and ensure they stay safe. This presentation will last around 20-30 minutes. If you have any questions write them down and ask at them at the end.
  2. Agenda - Today we’ll be covering the following topics; Knowledge Check – this is so we can see what you already know What exactly Cyber Crime is Identity Theft Phishing Common Scams including online and phone scams and finally the Prevention Method and how you protect yourself.
  3. Knowledge Check – First of all we’re going to have a Knowledge Check to see what you already know. “I have internet access but I don’t shop online, this means I won’t become a victim of Cyber Crime.” This statement is false, anyone can become a victim of Cyber Crime whether they do online shopping or not. You can become a victim through online banking, dating and even social media.
  4. “Identity Theft is a type of crime in which personal information is stolen to carry out criminal activities.” This statement is true, criminals will steal your Identity in order to carry out criminal activities in your name.
  5. “Cyber Crime is a type of crime carried out by criminals using computers, or similar devices, with a connection to the internet.” This statement is true, Cyber Crime can be carried out on all technical devices that are connected to a network, a network can be the internet or an internal internet known as intranet.
  6. “The Internet is so big that things like fraud or identity theft shouldn't really concern you; the probability you will be targeted is very small unless you use the Internet a lot.” This statement is false, anybody can become a victim at any given time. Just because someone has used the internet for 10 minutes or 10 years doesn’t change the probability of becoming a vic.
  7. What is Cyber Crime? A simple definition would be: Criminal activities carried out by means of an electrical device with a connection to the Internet. Some interesting facts about cyber crime would be that – Every year, thousands of Brits become victims of Cyber Crime and only small percentage of these victims report this to the police – 44% of adults where victims of Cyber Crime in 2014 which amounts to around 431 Million world-wide. Without a good security package, your unprotected device, computer, laptop, phone, tablet (iPad) etc. can become infected by viruses within five minutes of connecting to the Internet. In 2011 Cyber Crimes cost to the UK was £27Bn.
  8. The first form of scam that we’re going to discuss is Identity theft. A definition for identity theft would be - the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc. Research taken in February 2014 found that: The number of identity theft incidents has reached 9.9 million a year. Every minute about 19 people fall victim to identity theft. But, Most cases of identity theft can be resolved if they are caught early.
  9. How do they do it? One method scammer’s use is phishing. Phishers, pretending to be legitimate companies, use email to request personal information and direct recipients to respond through malicious web sites They will email hundreds of people on a list known as the Suckers List. If people reply to the email inputting their personal details criminals now have everything they need to steal your identity – they may even have access to your bank accounts.
  10. Here are our tips to avoiding ID Theft. Don’t throw out anything with your name, address or financial details on without shredding it first. Check your statements carefully and report anything suspicious to the bank or financial service provider concerned. If you have a wireless network at home or work, make sure that you secure it. A hacker can gain access to anything you do over an unsecured network in a matter of seconds. Normally on your wireless router you can find ways to encrypt your information and protect you from being at risk. Ignore any email saying “You’ve Won…” or from somebody you’ve never heard of before.
  11. Phishing Phishing is when you receive an email into your inbox saying that something has gone wrong with an account of yours and so your details need to be re-entered to update their systems. They will then get you to fill out an online form and steal thousands of pounds from you! So imagine this The average phisher may send 2,000,000 emails a day, 100,000 reach a computer user, 5,000 respond to the email, 100 enter their personal details, 1200 pounds from each person- potential profit of 120,000 pounds IN ONE DAY   In 2005 a man called David Levi sent a phishing email round to many people saying that their eBay accounts had gone wrong and they needed to update their personal information and payment details. Around 160 people entered their personal details resulting in a total loss for the people and profit for him of over £360,000 which is around 2,250 pounds each person.
  12. Here is an example of a Phishing Email. This email address is a genuine email address of HMRC but it does NOT mean it was from them… this is a clever disguise This is the biggest danger of this email… the attached webpage will ask for your personal details and will submit them to someone other than the real HMRC The person who received this e-mail didn't even make a tax return. If you’re not sure about the e-mail – ring them. IT IS FAKE! Although it is a genuine email address for HM revenue and customs does not mean it is from them, a very sneaky disguise The biggest danger on this email is the link attached- here it is called the verify form, it will ask for your details and they will be sent to someone who will have criminal agendas for your information. Also the links may include viruses that could give fraudsters access to other files on your system. Look out for generic greetings as well; most companies will address their emails directly to a name like Mr Joe Boggs however this email has a generic greeting which is Dear Applicant. Other commons greetings are Dear Valued Customer, Dear Member of…. Etc. The person who actually received the email never made a tax return which made them think it was fake, however this may have been a successful scam on the people who had! If you are ever unsure of an email, ring the company it is supposedly from!
  13. Prevention Tips Be cautious of emails that ask for your personal details as no legitimate company or banks will ask for you to reveal them. If the email is from someone you don’t know and contains an attachment (often shown by a paperclip alongside the email) do not open it, just delete it! Even opening the emails can result in catastrophic problems. If you are unsure if the email is genuine. PHONE the company, they will always be happy to help you and will make sure you are not scammed, however do not phone any numbers on the email as these are likely to be directly linked to the scammer and they will falsely reassure you, so find the number independently for example via google.
  14. Mass Market Scam Mail: Have you ever received an email or letter that says YOU’VE WON! – Well this is always going to be a scam! They will often say something along the lines of “you have won £xxx amount of money and to claim this you must reply to this letter with your bank account number, expiry date and CVC number (this is the 3 digit code on the back of the card)”. Or they will say please follow this link, which will be a website address where they will ask you to fill in your personal details. From these scams they aim to steal your personal information and your bank details.
  15. Prevention Tips Think about it logically, you cannot win money or a prize in a lottery or be chosen at random if you have not entered into any competition. You do not have to pay a fee to claim a legitimate prize. Do not give out any bank details or personal information Delete the email straight away! If you reply you’ll find yourself on the Suckers list and become bombarded with Junk E-mails. MAKE SURE AS SOON AS YOU RECIEVE ANY EMAIL OR LETTER LIKE THIS, DELETE IT!
  16. Did you know? Online fraud against UK retailers totalled an estimated £105.5 million in 2013, which is a rise of 4 per cent on the previous year. Shopping and auction fraud involves deceitful shopping scams that rely on the secrecy of the internet. Auction sites, such as eBay and Gumtree, are a popular way to buy products. Whilst the majority of auction sellers are genuine, there are some corrupt criminals who use auction sites to offer fake goods or those that simply do not exist. Fraudsters use these websites to “sell” popular items such as smartphones, gadgets and “designer” clothing at low prices to catch your attention. As a result, there is a risk that your identity details could be compromised. Fraudsters could steal your identity and use it to access your personal finances. ADDITIONAL: Never send money direct to sellers, always stay on trusted sites such as PayPal, eBay etc. When you send money direct it's out of the control of the auction site you seen the product on. This means if you don't receive the product nothing can be done by the auction site.
  17. Which one is fake? The internet has created many new ways for fraudsters to try and part people from their cash. One common technique is to create a “fake” website to trick people into making a purchase. The first web address is fake as the address includes additional characters prior to the forward slash such as dashes etc… it is not an eBay page. The best thing to do if you want to be safe is open up a new window on the internet and search for the eBay site again, and to double check to see if it’s a genuine site a green lock will appear on the left hand side of the web address to show that it’s a secure site – as shown in the image above. You can trust all sites with a green lock.
  18. Which site is fake? Site one or Site Two?
  19. Site two is fake as the companies name is not simply Tiffany & Co however Tiffany Jewelers (Tiffany Discount UK). Also, this site looks a little cheap looking compared to the other site. Furthermore, be suspicious if words are misspelt or pictures and logos look shabby. For the expensive products being advertised in this site, the layout is too simple hence reinforcing this site is fake. The prices are also far to low to be genuine Tiffany products. We also carried out a check on this company by searching for their address. Their address is a mailbox shop in Soho and due to confidentiality mailbox companies will not freely hand over the real address.
  20. These are examples of a fake virus checkers. They are fake because if there was a genuine threat then your anti- virus software you have installed will create a pop-up message with the company logo informing you that they are already fixing the problem.
  21. There will be no option for you to click yes or no to treating the virus. In circumstances like this by clicking “yes” as seen in the second example you may be actually installing a virus which will slow your computer or corrupt files etc…Also, both examples demonstrate a lot of unnecessary detail about the threats, detail which genuine anti-virus checkers do not need to include. If you have visited a site and multiple pop ups appear the best thing to do is close down the tab immediately to prevent you from getting a virus. It’s best to go for security software recommended by leading stores.
  22. This is an example of genuine anti-virus software, as the layout is professional and there is a step by step guide about how the threats will be treated. Also, this is a well-known virus checker and is recommended by stores such as PCworld, Maplin, and Comet etc…
  23. Romance Scams: Dating or romance fraud is when you think you’ve met your perfect partner online, but they aren’t who they say they are. The internet is full of stories describing happy marriages which started with the click of a mouse; but there are also a number of horror stories out there such as the tale of a 50 year old woman who lost £19,000 from the solider scam. As older generations begin to embrace online dating, a lot of those using the sites are not particularly tech savvy and risk falling into the traps of scammers- 55% of all reported crimes came from 40-59 year olds and 63% were females. Although the average amount lost is £8,750 per person, one unfortunate victim lost £850,000 looking for love online. According to police reports, most dating scams stem from online dating websites or forums, whereby victims are fooled by criminals using fake personal profiles. Once these suspects have gained the trust of their victims, they begin to request money for various false cases. This could be anything from a medical problem for themselves or a family member that requires substantial funding; to them claiming to be military personnel based overseas who require funds for flights home (solider scam) or early discharge from the forces. They could even emotionally manipulate you by claiming to love you even when it’s been 24 hours and they want to meet you and be with you, but they can’t financially because they are overseas therefore need money. In other instances, as online relationships develops, the exchange become more intimate and the victims might be asked to share intimate pictures or videos of them. These images or videos are then used by criminals to blackmail the victim into handing over money.
  24. Prevention Tips: Don’t put yourself and your identity in jeopardy by trusting people too quickly – be cautious when getting to know people. Do reveal to much information about yourself online – protect your privacy Never send money to people you haven’t met – fraudsters will often ask for money for emotional reasons so you send it in good nature. If you’re dating online, keep all communication on that website. Do not go onto to using email addresses, social networking or text until you are fully comfortable. When someone says "keep this is a secret", question it. Why do you need to keep it secret? What needs to be hidden from others? Chances are when keep it a secret is said the person you're talking to has criminal intent.
  25. Mobile Phone Scams: Much like the mass market scam mail, they may send you a text message saying you've won And they will then ask you to reply to the message with your details so that they can ‘give you your prize@’ How many of you think that they will actually be offering you a legitimate prize? Well unfortunately you are wrong/right, a company or random person will never want to give away money to you without reason or entry into a competition. When you have replied to the text with your personal information they will then take an extortionate amount of money from you and also be able to take money from your monthly phone bill if on a monthly paid contract.
  26. Prevention Tips: Do not reply if they encourage you to enter a competition they will also be fake! These messages will cost lots of money to send. Also do not reply to text messages saying that you have a potential claim for a recent accident! Once again this will be fake and an extortionate amount of money can be taken from you. Never phone the numbers as they will often be premium rate numbers such as 0906 which cost a lot more to contact. So whatever you do ‘ NEVER REPLY, NOT EVEN WITH A STOP MESSAGE’
  27. Prevention Methods: Use secure websites and an internet safety programmes. You can often find these in technology stores or for free online. Responding to unusual emails can put you on a ‘Suckers List’ where people know your email is active and can send spam emails – Do NOT reply. Your bank will never ask for your PIN or any other personal bank details via email, so don’t reply to them. Be aware of who is around when logging onto accounts online, people may be able to see your password. - Never reuse a password and change them regularly. Here’s an Example: Steve’s has an email: steve@email.com – his password is Steve123. Can this be improved? How about 5t3vE123? In the first password 1 capital letter is used along with 3 numbers, this is a weak password as it’s easy to guess. The Second password has 1 capital letter, 2 lower case letters and 5 numbers, however 2 of the numbers replace some letters. 5 replaces the ‘S’ and 3 replaces the ‘E’. This is a strong password.
  28. Viruses and Anti-Virus: Viruses can find there way onto devices via email, websites and portable devices like USB’s. It’s vital that you have some form of Anti-Virus protection on your device, including your mobile phone. All devices come with built in protection however it’s strongly recommended that you use additional. There’s both payware an freeware software out there that can be downloaded or bought in most technology shops.
  29. There are no guaranteed get rich schemes. These schemes are designed to pull people in and scam them out of a lot of money. You should always be suspicious of offers that say “you can win a load of money by clicking on the link or get rich quick by going to this website” If it sound too good to be true its will be.   Never send money or give your details out to any one you haven’t met or do not know or trust. As seen before scammers will develop your trust with the use of online relationships and sob stories.   The same also applies to companies; do not send money or give your details to companies you do not know or trust – Always carry out checks on companies such as addresses and contact information, even searching the address on things like google maps will give you an idea if they are genuine – Banks & legitimate businesses will never ask for you details and information over the phone or by email so do not hand it over.   Destroy any documents, credit/debit cards and anything else with your personal details on. If criminals get hold of your personal information they can carry out criminal activities online with your money and information.   Never be embarrassed to report a scam these scammers are very clever and devious so there is no shame in being deceived. However if you spot a scam or have been scammed yourself you can contact action fraud or alternatively if you know the suspect or their location contact the police immediately.
  30. The audience will now ask questions in relation to Cyber Crime and the Presentation.