SlideShare une entreprise Scribd logo
1  sur  15
199TH FAFD BATCH OF ICAI
HELD IN MUMBAI (OCT 2019)
RESEARCH PAPER
PRESENTATION
Prepared by
CA TEJAL SAMIR KOKILA ADANI (M.NO. 116412)
INTERNET RELATED FRAUD
Computer or computer networks are
used as a tool or a target or a place of
criminal activity. While there are
various methods for execution of cyber
crimes, majority of these make use of or
are executed over the internet.
INTERNET RELATED FRAUD is defined as “A crime in which
the perpetrator develops a scheme using one or more elements of
the internet to deprive a person of property or any interest, estate,
or right by a false representation of a matter of fact, whether by
providing misleading information or by concealment of
information.”
INTRODUCTION AND DEFINITION
HACKING
 Hacking occurs when a scammer gains access to personal
information by using technology to break into the victim’s
computer, mobile device or network.
 Government websites are generally the hot targets due to
the press coverage.
 Hacking offence is cognizable, bailable, compoundable
with permission of the court before which the prosecution
of such offence is pending and triable by any magistrate.
If crime is proved under IT Act, accused shall be punished
for imprisonment, which may extend to three years or
with fine, which may extend to five lakh rupees or both.
 Some examples include malware & ransomware,
exploiting security weaknesses, payment redirection
scams, etc.
 Spam is a generic term used to describe electronic ‘junk
mail’ or unwanted messages sent to one’s email account
or mobile phone.
 They may try to persuade the victim to buy a product or
service; or they may attempt to trick people into divulging
bank account or credit card details.
 An act by the criminals to flood the bandwidth of the
victim’s network or fill his E-mail box with spam
mail depriving him of the service he is entitled to.
 A Distributed Denial of Service (DDoS) attack uses
multiple computers and Internet connections to flood
a network/system.
 Examples: ping of death (attacker sends a very large
network packet) and Tear drop attacks (victim server
receives fragmented packets that it is not able to
process).
SPAM
DENIAL OF SERVICE ATTACKS
PHISHING
Form of social engineering attack
– an act of sending an e-mail
falsely claiming to be an
established legitimate business in
an attempt to deceive the
unsuspecting recipient into
divulging personal, sensitive
information such as passwords,
credit card numbers, and bank
account information after
directing the user to visit a
specified website.
IDENTITY THEFT  Fraud that involves stealing money or getting
other benefits by pretending to be someone
else
 Stolen credit cards are the most common form
of Identity theft schemes
 Common methods are phishing, hacking, fake
online profiles, remote access scams, malware
& ransomware, etc.
MALWARE & RANSOMWARE
Malware tricks one into installing software that
allows scammers to access files and track
activities, while ransomware demands payment
to ‘unlock’ computer or files.
A spoof email is one that appears to originate
from one source but actually has been sent from
another source.
E-MAIL SPOOFING
NIGERIAN SCAMS
INHERITANCE SCAMS
Nigerian scams involve someone
overseas offering the victim a
share in a large sum of money or a
payment on the condition they are
helped to transfer money out of
their country.
These scams offer the false promise of an
inheritance to trick the victim into parting
with money or sharing bank or credit
card details.
UNEXPECTED PRIZE & LOTTERY SCAMS
SCRATCHIE SCAMS
TRAVEL PRIZE SCAMS
Unexpected prize and lottery scams work
by asking one to pay some sort of fee in
order to claim prize or winnings from a
competition or lottery one never entered.
Scratchie scams take the form of fake scratchie
cards that promise some sort of prize, on the
condition that the ‘winner’ pays a collection fee
Travel prize scams are attempts to trick
one into parting with money to claim a
‘reward’ such as a free or discounted
holiday.
SECURITIES FRAUD
 Also called investment fraud -
involves the offer of bogus stocks
or high-return investment
opportunities, market
manipulation schemes, pyramid
and Ponzi schemes, or other "get
rich quick" offerings.
DATING & ROMANCE FRAUD
 Scammers take advantage of people looking
for romantic partners, often via dating
websites, apps or social media by pretending to
be prospective companions.
 They play on emotional triggers to get the
victim to provide money, gifts or personal
details.
PREVENT LOSSES FROM INTERNET FRAUDS...
 Stay informed and be very sceptical of anything
that seems too good to be true
 Modify behavioural response – to hardwire tricks
to avoid internet scam traps based on shared
experiences about safety
 Verifying before action is a safe rule, always -
know that a bank, card provider or tax authorities
will never ask to reveal details over the phone or
click a link on a mail
...PREVENT LOSSES FROM INTERNET FRAUDS
 Low-limit separate credit card for
online purchases to minimise the
potential loss if things go wrong
 Limiting the amount of personal
information one allows to be in ‘the
public domain’ that could be used to
assist in identity theft
 Keep the firewall turned on
 Install or update Antivirus/
Antispyware software
 Keep the operating system up to date
 Be careful what to download
 Turn off the computer
THANK YOU !

Contenu connexe

Tendances

Phishing
PhishingPhishing
PhishingHHSome
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crimeAman Kumar
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 

Tendances (20)

Phishing
PhishingPhishing
Phishing
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing
PhishingPhishing
Phishing
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Data breach
Data breachData breach
Data breach
 

Similaire à CA Tejal Kokila Adani's Research on Internet Fraud

Similaire à CA Tejal Kokila Adani's Research on Internet Fraud (20)

cyber_crim.pptx
cyber_crim.pptxcyber_crim.pptx
cyber_crim.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
 
Emp...err
Emp...errEmp...err
Emp...err
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Dernier

Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 

Dernier (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 

CA Tejal Kokila Adani's Research on Internet Fraud

  • 1. 199TH FAFD BATCH OF ICAI HELD IN MUMBAI (OCT 2019) RESEARCH PAPER PRESENTATION Prepared by CA TEJAL SAMIR KOKILA ADANI (M.NO. 116412) INTERNET RELATED FRAUD
  • 2. Computer or computer networks are used as a tool or a target or a place of criminal activity. While there are various methods for execution of cyber crimes, majority of these make use of or are executed over the internet. INTERNET RELATED FRAUD is defined as “A crime in which the perpetrator develops a scheme using one or more elements of the internet to deprive a person of property or any interest, estate, or right by a false representation of a matter of fact, whether by providing misleading information or by concealment of information.” INTRODUCTION AND DEFINITION
  • 3. HACKING  Hacking occurs when a scammer gains access to personal information by using technology to break into the victim’s computer, mobile device or network.  Government websites are generally the hot targets due to the press coverage.  Hacking offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate. If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to three years or with fine, which may extend to five lakh rupees or both.  Some examples include malware & ransomware, exploiting security weaknesses, payment redirection scams, etc.
  • 4.  Spam is a generic term used to describe electronic ‘junk mail’ or unwanted messages sent to one’s email account or mobile phone.  They may try to persuade the victim to buy a product or service; or they may attempt to trick people into divulging bank account or credit card details.  An act by the criminals to flood the bandwidth of the victim’s network or fill his E-mail box with spam mail depriving him of the service he is entitled to.  A Distributed Denial of Service (DDoS) attack uses multiple computers and Internet connections to flood a network/system.  Examples: ping of death (attacker sends a very large network packet) and Tear drop attacks (victim server receives fragmented packets that it is not able to process). SPAM DENIAL OF SERVICE ATTACKS
  • 5. PHISHING Form of social engineering attack – an act of sending an e-mail falsely claiming to be an established legitimate business in an attempt to deceive the unsuspecting recipient into divulging personal, sensitive information such as passwords, credit card numbers, and bank account information after directing the user to visit a specified website.
  • 6. IDENTITY THEFT  Fraud that involves stealing money or getting other benefits by pretending to be someone else  Stolen credit cards are the most common form of Identity theft schemes  Common methods are phishing, hacking, fake online profiles, remote access scams, malware & ransomware, etc. MALWARE & RANSOMWARE Malware tricks one into installing software that allows scammers to access files and track activities, while ransomware demands payment to ‘unlock’ computer or files. A spoof email is one that appears to originate from one source but actually has been sent from another source. E-MAIL SPOOFING
  • 7. NIGERIAN SCAMS INHERITANCE SCAMS Nigerian scams involve someone overseas offering the victim a share in a large sum of money or a payment on the condition they are helped to transfer money out of their country. These scams offer the false promise of an inheritance to trick the victim into parting with money or sharing bank or credit card details.
  • 8. UNEXPECTED PRIZE & LOTTERY SCAMS SCRATCHIE SCAMS TRAVEL PRIZE SCAMS Unexpected prize and lottery scams work by asking one to pay some sort of fee in order to claim prize or winnings from a competition or lottery one never entered. Scratchie scams take the form of fake scratchie cards that promise some sort of prize, on the condition that the ‘winner’ pays a collection fee Travel prize scams are attempts to trick one into parting with money to claim a ‘reward’ such as a free or discounted holiday.
  • 9. SECURITIES FRAUD  Also called investment fraud - involves the offer of bogus stocks or high-return investment opportunities, market manipulation schemes, pyramid and Ponzi schemes, or other "get rich quick" offerings. DATING & ROMANCE FRAUD  Scammers take advantage of people looking for romantic partners, often via dating websites, apps or social media by pretending to be prospective companions.  They play on emotional triggers to get the victim to provide money, gifts or personal details.
  • 10. PREVENT LOSSES FROM INTERNET FRAUDS...  Stay informed and be very sceptical of anything that seems too good to be true  Modify behavioural response – to hardwire tricks to avoid internet scam traps based on shared experiences about safety  Verifying before action is a safe rule, always - know that a bank, card provider or tax authorities will never ask to reveal details over the phone or click a link on a mail
  • 11. ...PREVENT LOSSES FROM INTERNET FRAUDS  Low-limit separate credit card for online purchases to minimise the potential loss if things go wrong  Limiting the amount of personal information one allows to be in ‘the public domain’ that could be used to assist in identity theft  Keep the firewall turned on  Install or update Antivirus/ Antispyware software  Keep the operating system up to date  Be careful what to download  Turn off the computer
  • 12.
  • 13.
  • 14.