Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

The internet prospects

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Chargement dans…3
×

Consultez-les par la suite

1 sur 17 Publicité
Publicité

Plus De Contenu Connexe

Plus récents (20)

Publicité

The internet prospects

  1. 1. What is Internet Fraud?
  2. 2. Charity Fraud The scammer poses as a charitable organization soliciting donations to help the victims of a natural disaster, terrorist attack, regional conflict, or epidemic.
  3. 3. Online Gift Card Fraud A voucher or gift card scam takes place when unsuspecting victims are approached by fraudsters and persuaded to pay bills, fees or debts using iTunes gift cards or other vouchers. Other popular ones?
  4. 4. Social Media Fraud People tend to disclose more personal information about themselves (e.g. birthday, e-mail, hometown) in their social networking profiles. This personally identifiable information could be used by fraudsters to steal users' identities, and posting this information on social media makes it a lot easier for fraudsters to take control of it.
  5. 5. Phishing A phishing website is a domain similar in name and appearance to an official website. They're made in order to fool someone into believing it is legitimate. Other names similar are smishing, spoofing, whaling,spearphishin g
  6. 6. Safety Measures 1. Keep Financial Data Separate For business users in particular, use a dedicated work station to perform all company banking activity. Use other computers to access the Internet and conduct non-banking business. 2. Know Who’s Asking As a general rule of thumb, banks don’t send emails or text messages that ask for personal information such as account and/or social security numbers. Banks will also not require you to verify account information in this manner.
  7. 7. Safety Measures 3. Keep Your Passwords Secret Use strong, unique passwords. Don't use name of family member, pets or anything close. ⭐ Rather, pick a sahaba or 2, encrypt their name(s) with symbols and special character 🔥 Use different password for your email 🏆 Have pairs of password for different purposes 4. No Phishing Allowed Beware of phishing emails. These emails are designed to prompt you to click links provided within the email to verify or change your account in some way.
  8. 8. Internet Prospects
  9. 9. Thank you all for Listening

×