Cybersecurity and Personal Finance Identity Theft by Sue Lynn Sasser

24 Slides134.02 KB

Cybersecurity and Personal Finance Identity Theft by Sue Lynn Sasser

Lesson Objectives Recognize the importance of protecting yourself from identity theft. Determine the relationship between identity theft and fraud. Explain the history and the role of Social Security Numbers in identity theft. Apply the concept of identity theft to the use of credit cards and other personal information such as Social Security Numbers and passwords. Discuss how to protect yourself from identity theft. Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 2

Introduction Identity theft is one of the fastest growing crimes Technology provides easy access to everyone’s personal information “Hackers” attempt to gain access to databases Government Banks and other financial institutions Other private businesses Identity theft creates problems for business, for government, and for individuals Understanding how to protect yourself from identity theft is important Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 3

Opening Questions What is identity theft? How can you protect yourself from becoming a victim? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 4

Answers to Opening Questions What is identity theft? o The deliberate use of someone else’s identity (name and personal information), usually for financial gain How can you protect yourself from becoming a victim? o Take steps to protect your personal information such as passwords and Social Security Numbers Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 5

Overview Anyone can become a victim Identity theft can cause multiple problems for the victim o May prevent you from getting credit cards or other loans o May prevent you from getting a school loan for your college education o May prevent you from buying a house o May prevent you from getting a job Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 6

Essay Scenario Fastview Middle School is preparing for its annual essay competition. Winners will be announced at a special ceremony this morning. Everyone is gathered in the auditorium and excited to hear who will win. Now, the big moment has come. Mrs. Rodriquez announces the top three essay winners and Johnny wins first place. Everyone is surprised as he slowly walks up to receive his award and a gift certificate for 100. As Johnny starts reading his essay to all of the students, Malia realizes that he is reading her essay. How could this happen? She was Cybersecurity and Personal Finance: Identity Theft happy when they www.EconEdLink.org said she got second place, 7

Essay Scenario Questions What should Malia do? How can she prove it was her essay? Do things like this ever happen? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 8

Essay Scenario Recap Malia is a victim of fraud o Johnny took her essay without her permission and used it for his own gain Definition of fraud o Deliberate attempt to gain from deceiving or misleading others The burden of proof is on Malia o Malia will have to show proof that Johnny stole her essay and entered it in the competition Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 9

Identity Theft and Fraud Identity theft and fraud are very similar o Personal information is stolen, such as – – – – – – – Name Social Security Number Address Phone number Bank account number Credit card number Password o The stolen information is then used to buy things, leaving you to pay the bills or to prove you did not buy them Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 10

Identity Theft and Fraud (continued) What if Johnny stole Malia’s credit card number and purchased new clothes for the awards ceremony? Malia would have to prove he did it or pay the bill. Being a victim of identity theft or fraud is much more serious than just having someone steal your essay. Identity theft can create very difficult situations for the victim to resolve. Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 11

Why is identity theft growing? Electronic access to databases Tossing paper with personal information into the trash Online access for individuals o Social media o Chat rooms o Emails o Online surveys o Other Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 12

Potential Sources of Identity Theft Posting personal information on social media Giving out personal information in a chatroom Responding to emails asking for personal information Answering online surveys that require personal information Others? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 13

Even cell phones! People store important information on cell phones and tablets If not protected, someone can easily access that information Protect cell phone and other electronic devices Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 14

Remember . Protecting personal information is important, even if you do not have a bank account or a credit card. Someone can still steal your identity and use it. Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 15

Activity #1 Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 16

Identity Theft and Credit Have you ever loaned money to a friend who did not repay you? How did it make you feel? What if you found out that friend had borrowed from several others in class and did not repay them either? Would you want to loan this friend more money? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 17

Identity Theft and Credit (continued) Failing to repay your friends gives them a bad impression of you. Companies also want to know if you repay your bills when you ask to borrow money from them. o Credit History Credit cards are an easy way to get credit. o With credit cards, you can buy today and pay for things later. What would you think if someone used your credit card to make purchases? What would you think if someone got a credit card in your name and you did not even know about it? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 18

Identity Theft and Credit (continued) How would you feel if someone used your credit card to make purchases? How would you feel if someone got a credit card in your name and you did not even know about it – and made purchases? Both are examples of identity theft. In both examples, you must prove it was not you who made those purchases. o If you cannot prove it, then you are responsible for paying the bills! Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 19

Identity Theft and Bank Account Numbers Bank Account Numbers o Issued by a bank when you open an account Checking Account Savings Account o Unique to you and to your account o Provides you and only you access to your money Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 20

Identity Theft and Social Security Numbers Social Security Number o Issued by the Federal Government o Basically serve as a national identification number o Unique to you o Provides you and only you access to your personal information o Used to track your credit history (your use of credit) o Other uses Cybersecurity and Personal Finance: Identity Theft https://www.youtube.com/watch?v PWJMMIwjWYE www.EconEdLink.org 21

Review of Social Security Numbers What is a Social Security Number? How are they used? Why are they important? Why should you protect you Social Security Number from others? Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 22

Activity #2 http://www.netsmartz.org/NetSmartzKids/PasswordRap Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 23

Conclusion Anyone can become a victim of identity theft – even you! o Even if you do not have a credit card o Even if you do not have a bank account o Even if you do not have a computer or tablet o Even if you do not have a cell phone Protecting personal information reduces the potential for becoming a victim. Talk with your parents/guardians about ways to protect your personal information and theirs. Cybersecurity and Personal Finance: Identity Theft www.EconEdLink.org 24

Back to top button