Scams and Schemes
What is identity theft, and how can you protect yourself from it?
By the end of the class, you will be able to...
• Understand what identity theft is and why it is important to guard against it.
• Learn to recognize strategies that scam artists use to access private information.
• Learn how to guard against phishing and identity theft.
By the end of the class, you will be able to...
• Understand what identity theft is and why it is important to guard against it.
• Learn to recognize strategies that scam artists use to access private information.
• Learn how to guard against phishing and identity theft.
In Class:
Today we're going to learn strategies for guarding against online scams and theft. There are specific kinds of information identity thefts want. We will practice what we learn by identifying tricks thieves use online to gather information in phony emails. Then we will create our own phishing email that includes features we learned about. Do you think your classmates will be able to tell the difference?
Final Assignment:
1. After competing the student handout and participating in class discussion of how to spot a scam, you will create your own.
2. Choose at least four of the eight features of a phishing e-mail listed in the handout.
3. Create a phishing e-mail that demonstrate the four features you chose on Microsoft word.
4. Fill in your first and last name in the link below.
5. After you have completed your email, copy and paste the email to the link below.
6. Press the submit button
4. When complete, we will share the examples with the class.
5. As a class, we will try to identify which features tipped us off that your email is a phishing scam.
Today we're going to learn strategies for guarding against online scams and theft. There are specific kinds of information identity thefts want. We will practice what we learn by identifying tricks thieves use online to gather information in phony emails. Then we will create our own phishing email that includes features we learned about. Do you think your classmates will be able to tell the difference?
Final Assignment:
1. After competing the student handout and participating in class discussion of how to spot a scam, you will create your own.
2. Choose at least four of the eight features of a phishing e-mail listed in the handout.
3. Create a phishing e-mail that demonstrate the four features you chose on Microsoft word.
4. Fill in your first and last name in the link below.
5. After you have completed your email, copy and paste the email to the link below.
6. Press the submit button
4. When complete, we will share the examples with the class.
5. As a class, we will try to identify which features tipped us off that your email is a phishing scam.