1 of 41

Scams & Schemes

CIPA/E-Rate Internet Safety Lesson

Please log on to

Google Using Chrome

2 of 41

Explain

Students log on to Google us ing Chrome

Students go to Google Classroom

Complete the SACC Form

Open Scams & Schemes

Directions are provided on each slide

3 of 41

What is identity theft, and how can you protect yourself

from it?

Focus Question:

4 of 41

Warm-up

Do you know someone who has been scammed?

What happened?

Discuss as a class

  • 2 minutes

5 of 41

Warm-up

What is the purpose of a scam?

What tricks do people use to carry out a scam?

Discuss as a class

  • 2 minutes

6 of 41

Warm-up

Can people get scammed on the Internet?

How?

Discuss as a class

  • 2 minutes

7 of 41

EXPLAIN

You will be learning about:

  • a variety of online scams
    • which kinds of information scammers look for
    • how that information can be used.
  • how to protect themselves against online scams.

8 of 41

EXPLAIN

You will prompted on how to interact with each slide by an icon:

  • Listen for teacher directions
  • Class discussion
  • Read everything printed and linked
  • Click on link to watch a video
  • Click on the Google icon to respond to the question.
    • Follow the directions on Google
  • Discuss with your partner
  • Complete a handout

9 of 41

Blended Lesson Directions:

  • read each presentation slide
  • click on links to media information
  • click on links for Google discussions

Tech tips:

  • You & your partner both log on to your own computer
  • log onto Moodle
  • check headphones are turned on & volume set
  • You may need to click on the plugin update 2 times when it appears to be able to view videos or games.

10 of 41

Define: scam

  • use your favorite browser & search engine to find the definition
  • decide on the 3 key words

Google Form:

  • click on the above link
  • report out your 3 key words
  • follow the directions on Google

11 of 41

Video: What You Need to Know About Scams & How to Avoid Them

Click on video then link to watch. You may need to click on the plugin update 2 times to be able to view.

12 of 41

Checkpoint Stop

Please make sure you have completed all of the work this far before moving on....

  • Define: Scam
  • Report out on Google Form
  • Watch: Scam Video

13 of 41

Teach 1:

What Is Identity Theft?

People who scam others online don’t always have to get money from them directly. Instead, they use a variety of strategies to trick people into giving out private information. They then use this information to access their bank and credit card accounts or other personal accounts. They can even “re-create” someone’s identity and produce false documents, such as Social Security cards, credit cards, or drivers’ licenses

in someone else’s name.

14 of 41

Define: identity theft

  • use your favorite browser & search engine to find the definition
  • decide on the 3 key words

Google Form:

  • click on the above link
  • report out your 3 key words
  • follow the directions on Google

15 of 41

Identity thieves look for any information that might help them pretend to be their victims.

  • Full name
  • Date of birth and where you were born
  • Current and previous addresses and phone numbers
  • Driver’s license or passport number

  • Account numbers and the companies where you hold accounts
    • (e.g., Amazon, PayPal, etc.)
  • Passwords
  • Social Security Number

16 of 41

Checkpoint Stop 2

Please make sure you have completed all of the work this far before moving on....

17 of 41

Define: vulnerable

  • use your favorite browser & search engine to find the definition
  • decide on the 3 key words

Google Form:

  • click on the above link
  • report out your 3 key words
  • follow the directions on Google

18 of 41

Anyone is vulnerable:

  • Identity thieves look for “clean” Social Security numbers that haven’t yet been used to get credit. They target teens and kids, who often have Social Security numbers that have no credit history yet. Identity thieves might sell or use these numbers, which would allow someone else to get a credit card or loan and build up debt under your name.

19 of 41

Anyone is vulnerable:

  • Being a victim of identity theft can ruin your financial future and your ability to obtain loans and purchase things. For example, it could affect your ability to get a student loan for college or a loan to buy a car.

20 of 41

Anyone is vulnerable:

  • If you use your parents’ accounts and credit cards online, or fill out forms with your parents’ information, you are sharing information that could potentially put your parents’ identities at risk.
  • It can take months, even years, to recover your identity.

21 of 41

Checkpoint Stop 2

Please make sure you have completed all of the work this far before moving on....

22 of 41

Teach 2:

How to Catch a Phish...

How do you think identity thieves might try to get your information?

Discuss with your partner.

23 of 41

Define: phishing

Phishing Video

  • click on the link and watch the video
  • decide on 3 key words that best define phishing

Google Form:

  • click on the above link
  • report out your 3 key words
  • follow the directions on Google

24 of 41

Avoiding Phishing Scams:

The best way to avoid phishing scams is to:

  • be skeptical about any online request for personal information
  • be skeptical of online messages or posts from friends that seem out of character for them, which is a warning sign that their accounts have been hacked.

There are clues that can help you spot phishing, and you will learn some of these by studying one type of phishing scam: a phony email message.

25 of 41

Checkpoint Stop 2

Please make sure you have completed all of the work this far before moving on....

26 of 41

Features of a Phishing Email

  • Need to verify account information
  • Sense of urgency
  • Spelling errors
  • Alert that account is in trouble
  • Link in email or attachment
  • Too good to be true
  • Generic greeting

Click & read features definitions

27 of 41

The Case of the Cyber Criminal Game (5 minutes)

Play the Case of the Cyber Criminal game.

28 of 41

Spotting Scams Student Activity

  • With your partner complete both pages of the Google document .
  • When done, share your answers with another group.
  • Compare your answers using comments.
  • Only positive comments please.

29 of 41

Checkpoint Stop 2

Please make sure you have completed all of the work this far before moving on....

30 of 41

How to Catch a Phish...

Phishing emails can be very convincing, and some may not contain many of the clues you just learned about. So it’s smart to distrust any email that asks you to provide private information.

31 of 41

Create a Phishing e-mail

Open Ended Response Task:

Phishing is the attempt to acquire sensitive information such as usernames, passwords,and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

Construct a phishing e-mail on Google demonstrating your understanding of at least 5 of the 7 features of a phishing email

Respond to 2 classmates. What features did they use?

  • Need to verify account information
  • Sense of urgency
  • Spelling errors
  • Alert that account is in trouble
  • Link in email or attachment
  • Too good to be true
  • Generic greeting

32 of 41

Checkpoint Stop 2

Please make sure you have completed all of the work this far before moving on....

33 of 41

Click on the link to take a survey

34 of 41

Enrichment Activities

You have completed Scams & Schemes. Select enrichment activities to take your learning one step further.

Your teacher will tell you when it is time to wrap up as a class.

35 of 41

Spam Scan Slam Game (5 minutes)

Play the

Spam Scam Slam” game.

36 of 41

Scams & Schemes Poster

With your partner, create a collaborative poster warning people about scams & schemes.

1 document per group.

    • Google Document
      • poster with a poem, cheer, etc.
    • Google Presentation
      • advertisement, picture story,etc.
    • Google Site blog page
  • This is a 1 day activity so stay on task!!!

Share with your Partners

Share with Mr. A

Use our naming protocol:

Class# L Name Slogan

37 of 41

Go to Keyboarding (typing) Practice Games

  • Practice typing until notified to stop by the teacher
  • Use all 10 fingers in the proper position

38 of 41

Wrap-up

What kinds of information do identity

thieves look for?

Why?

Discuss as a class

  • 1 minute

39 of 41

Wrap-up

How do thieves try to get at your information?

Discuss as a class

  • 1 minute

40 of 41

Wrap-up

What can you do to avoid falling for online scams?

Discuss as a class

  • 1 minute

41 of 41

Ticket out the Door

  • Each student is to complete the ticket individually
  • Please write your name on the paper
  • Hand in the ticket as you exit