02.06.2021

Presentation on the topic of banking fraud. Presentation "financial fraud"


Agreement on the use of site materials

Please use the works published on the site for personal purposes only. Publication of materials on other sites is prohibited.
This work (and all others) is available for download free of charge. Mentally, you can thank its author and the staff of the site.

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Similar Documents

    A plastic card is a form of cashless payment. Magnetic stripe and smart cards. Comparative characteristics magnetic cards and memory cards. National system"Belkart". The process of calculating with plastic cards, the reasons for the prohibition of transactions with them.

    abstract, added 04/29/2009

    Aspects of operations of commercial banks with plastic cards. Payment system and its participants. Analysis of passive and active operations, fulfillment of economic standards of a commercial bank, financial results and operations with plastic cards.

    thesis, added 06/12/2009

    Concept and types plastic cards. Regulatory regulation operations with plastic cards. Analysis of operations with bank cards of JSC "VTB". Foreign experience use of plastic cards. Plastic cards in conditions of economic instability.

    thesis, added 08/16/2010

    Classification and types of bank cards. Current state banking system Russian Federation. Organization of operations with plastic cards in JSC "Northern Credit". Improving the system of operations with plastic cards in Russia.

    thesis, added 11/19/2014

    Essence, meaning, classification of bank cards. Normative-legal regulation of the work of banks with bank cards. Comparative analysis organization of work with plastic cards by VTB 24 Bank (CJSC) and other banks in the Kostroma region.

    thesis, added 09/11/2014

    The history of the development of a plastic card, their modern views. Features of functioning payment system using plastic cards. Analysis of bank operations based on plastic cards. Functioning of a unified universal settlement network.

    thesis, added 09/18/2012

    concept banking product. Principles of work with plastic cards. Analysis of the services provided by the bank for individuals and legal entities. Prospects for improving operational and cash services in commercial banks of the Russian Federation.

    thesis, added 06/02/2014

"Banking System" - Types of deposits. Branches and representative offices of foreign banks. The principle of a two-level structure of the banking system. Central bank Russia. accountable State Duma. Banks with participation foreign capital. Reforming the banking system of the Russian Federation in the process of market reforms.

"Prospects for the development of the banking system in Russia" - Population. Goals financial policy. Assessment of available internal resources. Main contradictions. structural problems. Scenarios for the development of the Russian banking system. Banking system. Excess liquidity. institutional flows. Accelerated development of the banking system. Restrictions to achieve targets.

"Banks and the banking system" - Commercial banks perform two main types of operations. Carries out registration and licensing of commercial banks. Functions of commercial banks. Central (issuing) bank. Commercial bank income. profit of a commercial bank. Banks. Commercial banks. Modern banking system. Bank.

"Development of the banking system in Russia" - The history of the emergence of banks. Banking system. Types of commercial banks. Banking system of Russia. State commercial Bank. The development of banking. Middle Ages. Origin of the word. Modern banking system. capture State Bank Russia. Heads of the State Bank of the RSFSR.

"Money and Banks" - Banks. Functions. Law monetary circulation. Positive sides. Bimetallic system. Money offer. Securities. Investments. Gold demonetization processes. Types of loans. Credit market. Deviations from the state of equilibrium. Increase in demand. Functions of money. Movement interest rates. money market mechanism.

"Basel Accord" - Size operational risk. Implementation of new standards. international convergence. Comparison of rating scales. Standardized approach to calculating operational risk. Risk measurement methodology. Changing the system of capital adequacy ratios. standard approach. Basel I. Additional capital.

Description of the presentation on individual slides:

1 slide

Description of the slide:

2 slide

Description of the slide:

Goals and objectives Goals: Expand knowledge of bank cards and the security of their use Uncover technical methods of fraud Objectives: Get information about bank cards Learn how to protect bank cards Learn technical methods of fraud

3 slide

Description of the slide:

Bank card Bank card (eng. Bank Card, BCard, BC) - a plastic card linked to one or more bank accounts; a tool that gives you access to your personal bank account. It is used to pay for goods and services, including via the Internet, as well as cash withdrawals.

4 slide

Description of the slide:

Rules for safe use of the card To avoid using your card by another person, keep the PIN code separately from the card, do not write the PIN code on the card, do not disclose the PIN code to other persons (including relatives), do not enter the PIN code when working on the Internet

5 slide

Description of the slide:

Safe Use Rules bank card If you are contacted by phone, on the Internet, through social networks or in other ways, and under various pretexts they try to find out your bank card details, passwords or other personal information, be careful: these are clear signs of fraud. If you have any doubts, we recommend that you stop communicating and contact the bank by the phone number indicated on the back of your bank card. Do not listen to the advice of third parties, and do not accept their help when conducting transactions. If necessary, contact the employees at the bank branch or call the numbers indicated on the device or on the back of your card

6 slide

Description of the slide:

Rules for the safe use of a bank card Destroy checks with passwords from Internet banking systems if you do not plan to use them. Do not transfer checks to third parties, incl. bank employees Keep your card out of the reach of others. Do not transfer the card to another person, except for the seller (cashier). It is recommended to keep the card separate from cash and documents, especially when traveling

7 slide

Description of the slide:

Fraud Fraud is the theft of someone else's property or the acquisition of the right to someone else's property by deceit or breach of trust. The person doing this is called a swindler or swindler.

8 slide

Description of the slide:

The main types of fraud with bank cards Theft of bank cards Technical tricks Copying card data Theft using viruses Phantom ATM Scotch method Influence on the psyche Technical tricks Skimming Letters and calls from scammers Phishing

9 slide

Description of the slide:

Theft of bank cards Theft is the most common way of fraud. Your wallet was stolen, and there are several of your cards in it, including credit cards. If all the cards are with a chip, then the criminal will need to find out the pin code, without which you cannot pay for the goods in the store, and you cannot withdraw money from the ATM. If there is an old-style card, it can be cashed in the store by purchasing any product.

10 slide

Description of the slide:

Technical tricks. Copying card data by service workers The salesperson or waiter rolls your card on a special miniature hand-held skimmer. The PIN code or other details of the card are easily recorded on a video camera, after which a clone of your card is also made and money is withdrawn from it.

11 slide

Description of the slide:

Theft with the help of viruses A very dangerous type of technically advanced fraud, when a smartphone or computer is "infected" with a virus program, for example, a Trojan (details in the article). This is such a smart "digital pest" that it can not only corrupt the data on your computer or "steal" valuable information, but also act on behalf of the owner of the phone (whether it will be!).

12 slide

Description of the slide:

Theft with the help of viruses For example, you installed on your android some free program with GooglePlay, and with it a virus has entered your smartphone. Your phone number is linked to the card, i.e. service is connected to your phone mobile bank. So, a Trojan accidentally installed by you can find out your balance using SMS banking commands, send an SMS command to transfer from your card to another, and independently respond with an SMS to a message confirming the operation. Moreover, the owner of the smartphone may not see any signs of activity, the virus will simply hide them from him, or he will see them, but it will be too late.

13 slide

Description of the slide:

Phantom ATM Instead of a real ATM, scammers can build a plastic frame with a skimmer built into it. From the inserted card, all the necessary information for its subsequent cashing out can be read into the card reader, and at the same time, the attackers will find out your pin code typed on the “pseudo-keyboard”. Alternatively, the ATM may swallow and not give the card at all.

14 slide

Description of the slide:

Scotch method A person approaches an ATM, wanting to withdraw money from his card, inserts the card into the card reader and types a pin code on the keyboard. From the side of the dispenser, a characteristic rustle is heard, but for some reason the money is not visible. The person “writes off” this to a malfunction of the ATM, shrugs his shoulders, takes out his card and goes to another ATM. What is the result? The money was really withdrawn from the card and even the ATM gave it out, but in reality they stuck to the double-sided tape stuck in the dispenser by the scammer, who will take the money for you.

15 slide

Description of the slide:

Letters and calls from scammers A typical example of SMS fraud is receiving an SMS message from an alleged bank number about the blocking of funds on your card due to unauthorized access to them, with a recommendation to call the number given in this message. By phone, you will be informed that in order to unlock the money on the card account, you must transfer its details: card number, full name, expiration date and a three-digit secret code on the back of the plastic (CVV / CVC).

16 slide

Description of the slide:

Letters and calls from fraudsters Thus, the unlucky cardholder, in order to save his money, transfers all the important data - he is not given time to think and analyze the situation, which is the calculation of cunning attackers. Moreover, scammers will also ask you to dictate to them the password that came to cellular telephone victims (and this is the same one-time password with which they need to confirm the operation of transferring money from the attacked card). If a person is not blind, then in the incoming SMS he will see a phrase about the inadmissibility of transferring a one-time password to an unauthorized person. But he will read it later, when he realizes that a decent amount was taken from his card account.

17 slide

Description of the slide:

Phishing A very common type of fraud, when, for example, an Internet user is given a pseudo-site of his Internet bank, which is very similar to the original, on which they will try to fish out (catch) his card data by all means. Hence the name of this method of fraud, translated from English. "fishing" is fishing. The main thing is that a person goes to a fake site and believes that he is on the original resource. A link to such fake sites may contain, for example, an email from a scammer, made in a typical banking form (colors, logo, etc.), and the text will stimulate to click on it, scaring possible problems with money in your card accounts. At the same time, the names of such sites are outwardly similar, but still slightly different. Find, for example, the differences between the original name of the site sberbank.ru and the pseudo-site sbepbank.ru. Differences are not so easy to notice to the "inexperienced" eye.

18 slide

Lack of proper attention to the security issues of transactions conducted on the Internet can make them vulnerable to criminals. By following the recommendations given in this section, you will be able to protect yourself and your funds from the encroachments of scammers.

Fraud in online stores

How to protect yourself from fraud when buying goods over the Internet? Low-quality goods are difficult to recognize at a distance, and the terms of the transaction are not always clear.

First of all, the buyer should be alerted too low price the proposed product, as well as the absence of the actual address of the seller. In this case, be sure to make inquiries about the store, call there and find out the features of the product you already know. Fuzzy answers or incorrect information should be a reason to refuse a purchase. If in doubt, pay for the goods only upon receipt.

Phone scams

The methods used by scammers are extremely diverse. For example, a client receives a call ostensibly from a radio station and is told that he has won the lottery. However, in order to receive a prize (or take part in the jackpot draw), the client is offered to activate an express payment card and top up someone else's phone account. If you receive such a call, make sure that this transmission really goes to live. Remember that the largest cellular companies never require you to activate express payment cards when conducting lotteries.

In addition, an SMS message may be sent to your mobile phone with a proposal to either protect you from spam mailings or take part in a promotion from your mobile operator. At the same time, it is proposed to send a "free" SMS-message to one of the short numbers, and then follow the link to remove your name from the mailing list. As a result of these manipulations, you will lose about 100-150 rubles, but you will still receive spam. Therefore, upon receipt of such a message, call the telecom operator and report the information that has come to your phone.

Recently, subscribers of cellular operators began to receive SMS messages supposedly from acquaintances with a request to deposit money into their account.

If you receive such a message, call back the specified number and find out the identity of the sender of the SMS-message, and only then make a decision.

Plastic card fraud

Currently, experts identify several main types of fraud using plastic cards. The first (and this moment The most common) type of card fraud is the creation of so-called "white cards" or "clone cards". Fraudsters read secret information from the magnetic stripe of the user's card, and then make "white cards" - pieces of plastic with a magnetic stripe and stolen information printed on it. After that, attackers can freely use the account of the real cardholder, who, in this case, will be very difficult to prove his non-involvement in "left" payments.

Reading the secret information stored on the card can be done in different ways. The most common of them is the conspiracy of scammers with employees of shops, hotels, restaurants, and other shopping and entertainment enterprises. The result of such a conspiracy is the transfer of information about the details of the cards to representatives of criminal structures. If the card is in their hands, the so-called skimming occurs when the payment card is passed through a special device (skimmer) and the data stored on its magnetic strip is read. Thus, scammers get a kind of imprint of the card. And it doesn’t cost anything to enter the required amount into it, imitate a signature, and redirect all payments for the operation to the legal owner of the card.

A fairly common way is when criminal structures organize their own stores. The purpose of the existence of such outlets» is simple - get as much data as possible about customers' plastic cards. Often scammers use Internet sites for this. Having used the services of such a site once (for example, bought a product or downloaded a video), the cardholder is surprised to find out that he has become his subscriber, and, thus, he is charged a monthly subscription fee, which is rather problematic to refuse.

Another type of card fraud is the so-called phishing, when data about a plastic card is obtained from the user himself. Attackers send emails to users, in which they report on behalf of the bank about changes allegedly made in its security system. At the same time, scammers ask gullible users to renew information about the card, including specifying the credit card number and its PIN code, either by sending a response letter or by going to the website of the issuing bank and filling out the appropriate form. However, the link attached to the letter does not lead to the bank's resource, but to a fake site that imitates the work of the real one.

A variation of this offense is calls to cell phones of citizens from "representatives" of the bank with a request to repay the loan debt. When a citizen reports that he did not take a loan, he is invited to clarify the details of his plastic card. In the future, this information is used to initiate unauthorized money transfers from the user's card account.

In order to save your money, remember: banks and payment systems never send letters or call their customers' phones with a request to provide them with account details. If this situation occurs, you will be asked to come to the bank in person.

How to protect yourself from fraud?

The only real way to reduce the chance of credit card fraud is to follow some simple security rules. Bank employees urge their customers to be more attentive to their cards: do not trust cards to third parties, do not leave them unattended, do not write down the PIN code in easily accessible places, and even more so on the card itself. Be sure to leave a sample of your signature on the back of the card as soon as you receive it. And never give your PIN to anyone. Neither the employees of the bank that issued the card, nor the attendants of the ATM have the right to demand it.

In no case do not lose sight of the card when paying in restaurants or shops. Better yet, ask the card to be passed through the imprinter in your presence. Take a closer look at what they do with your card, do not pay with a credit card in dubious establishments, and be sure to keep copies of checks with you. There are cases when, when paying for services in a restaurant, for only a couple of minutes, while the card was out of sight of the owner, the magnetic stripe of the card was read confidential information about its holder and the amount of funds on the card account.

Check the movement of money on your card account. There are strictly stipulated terms during which the cardholder can do something. Special attention should be paid for account transactions in which the card was used.

And the last piece of advice that bank security experts give to their clients is to report the loss or theft to the bank immediately. payment card. Investigating a crime in hot pursuit is much easier than if the owner suddenly comes to his senses in a couple of weeks.

Safety precautions when paying with a card on the Internet

Do not leave information about yourself and your card on those sites that you do not know anything about. Ask your friends and acquaintances about these sites, ask about the relevant conferences, find out where the organization with which you are going to produce is located. monetary transactions. At the same time, pay attention to various certificates confirming the security of payments through this site. If there is no address at all or it does not inspire confidence, then before paying, think about whether it is worth doing it?

Do not use cards containing large amounts of money to pay on the Internet. It is better to generally get a separate card for such purposes and transfer money there as needed.

If you have any suspicions about the illegal debiting of money from your account, contact the bank. The cardholder has certain period in order to refuse or challenge the illegal debiting of money from the card account. The duration of this period should be clarified with the bank that issued the card.

Fraud in ATM transactions

Another way of electronic financial fraud is the use of special technical means to receive card data through ATMs. For this, in particular, special "overlays" on the ATM keyboard are used, which remember keystrokes while the cardholder withdraws funds.

Another device is special plastic envelopes, which are small in size. over size cards. They are placed in the opening of the ATM card reader. An ATM, unnaturally, cannot read data from a magnetic strip, but it is also impossible to return a card due to the design of the envelope. At this time, an attacker comes up and offers his help, but for this, the holder needs to perform a number of actions, including dialing a PIN code. Despite this, the card is not returned. If the owner leaves to contact the issuing bank, the fraudster calmly takes out the envelope along with the credit card. He already knows the PIN code, and all he has to do is withdraw funds from the account.

Not only envelopes can be built into the card reader, but also special devices based on skimmers that read information from the card when a legitimate user withdraws funds.

Very often, a micro-camera is discreetly installed on ATMs. It records the person who dials the PIN code and transmits the dialing data to the attackers.

Another tool is fake ATMs that completely imitate real ones. They correctly read the information from the card, including the PIN code, but do not issue money. The card is returned to the owner, but all information about it is stored in the memory of such an "ATM".

This method is very expensive and is used only by large criminal groups.

ATM security

First, try not to use ATMs in deserted places or in crowded places. In a deserted place, when withdrawing money, the card holder becomes too vulnerable to robbery. And the crowd cannot be sure that no one will see the PIN entered by the user.

Secondly, do not let strangers see the PIN code you enter. Do not hesitate to close the ATM keyboard from strangers. And if possible, do not make mistakes when entering the PIN code. After all, after three erroneous code entries, the ATM will hold the card.

Thirdly, check if everything was taken from the ATM. After the completion of the operation, the holder should have: a card, money and an extract from the operation performed. If something is missing, and the ATM did not provide any additional information, then something is wrong here. It is quite possible that the holder risks becoming a victim of fraudsters.

Fourth, always keep the statements of the transaction that the ATM issues. This will allow you to keep track of expenses and control the debiting of money from the account.

What threatens electronic fraudsters?

In 1997, Russia introduced criminal liability for crimes in the field of computer information, and in 1998, a special unit was created in the Ministry of Internal Affairs of Russia to combat crimes in the field of computer information. information technologies, the so-called subdivision "K". Thus, the punishment provided for by the Criminal Code of the Russian Federation for the illegal receipt and use of information constituting banking secrecy (Article 183), as well as for illegal access to computer information (Article 272), can be up to five years in prison.

How money is stolen from plastic cards?

In order to withdraw money from your plastic card, it is enough to find out your card number and CVS (the last three digits on the back of the card). How do scammers get this information? It's very simple, people say them themselves. Basically, scammers use three to four ways to get card data from their victims.

First way:

An SMS is sent to the phone stating that you have won a laptop and are asked to call the return phone to receive a prize, when a person calls this number on the other end of the cellular line, he is offered to transfer the cost of the laptop to his plastic card and in order to do this they need a card number and CVS. The victim reports this data and says goodbye to all the money on this card.

Please note that all the SMS that the bank sends you do not have a return phone, but only have an identifier, that is, in the phone ‘from whom: "the name of the bank is displayed

Second way:

In this case, an SMS also comes to the phone, but only with the content that your card is blocked and they ask you to call the return phone. Here, the victim is already offered to go to the nearest terminal or ATM, enter the cash desk number and unlock number, and at the same time choose his mobile operator.

This is just one of those cases that proves to us how gullible people we have in Russia, since in fact the victim chooses a mobile operator and enters the amount, not the cash desk number, then the scammer asks, inserts a card and pays for his cell phone. Please note that money is transferred to the phone online, and in this case, the scammer immediately transfers it from his cell phone to some electronic wallets. Of course, SIM cards and electronic wallets are registered to a third party. In such cases, it is no longer possible to return the money.

Material - www.chclub.ru

Bankers advise

How to protect your bank card from thieves

The increasing spread of bank cards is accompanied by the emergence of an increasing number of various tricks aimed at stealing funds from the account. Experts gave a number of recommendations on how to protect yourself from possible theft.

First of all, you need to treat your bank card in the same way as your own money and keep it safe. You should not leave the card unattended, because a few seconds are enough for fraudsters to copy all the necessary information for transferring funds. By the way, for the same reason, you should not transfer the card itself to third parties, including relatives and friends. It is for them that most banks issue additional cards. But if the theft took place, you should immediately contact the support service and block the card.

The next part of the recommendations concerns the use of ATMs, which are often used by scammers for theft. Each time, approaching the terminal, you need to inspect it for suspicious objects that are out of the general structure of the device. Even after making sure that the device is safe, it is recommended to enter the PIN code, always hiding the numbers from prying eyes.

As for paying for goods and services, in any case, you should pay with a card with caution, carefully checking the purchase price and the amount to be debited. In online stores, this issue is of particular relevance, making purchases on dubious sites means exposing yourself to an increased risk of being left without a purchase and without money.

As a result, the owner greatly increases the reliability of his card if he observes minimal precautions. However, this alone is not enough. It is useful to connect the card to the service mobile bank, which, for a nominal monthly fee, sends information on all account changes and completed transactions from the card to the cardholder's mobile phone,

Today, customers of most banks also have the opportunity to insure their credit cards in case of possible loss or theft of funds, however, this payable service has not yet received wide distribution in Russia. However, card insurance is by far the most reliable way to protect your credit card. By classic cards the amount of compensation in Russia can reach 75 thousand rubles, and for "gold" cards - 150 thousand rubles. With a symbolic cost of insurance from 100-150 rubles per month, the benefits of such a service look more than obvious.

There are a great many fraud tools, but conventionally they are divided into several types. So, you can install readers on an ATM that steal information on the card. These include keyboard overlays for recording pressed buttons or envelopes - traps that “eat up” cards. In addition, scammers install hidden cameras at ATMs that record entered PIN codes and card numbers.

Some criminals are connected to the cable through which information on operations passes. Not inferior in popularity to such technological devices is the practice of phishing, in which information on the card is fraudulently “fished out” from the card holder.

Characteristics of the conditions for the implementation of the project Characteristics of the conditions for the implementation of the project

  • Type of student activity: extracurricular activities
  • Number of lessons on the topic / serial number in the topic: 4 / 1
  • Lesson type: assimilation of new knowledge
  • Conduct form: group
  • Equipment and / or characteristics of the educational environment: demonstration PC (multimedia projector, screen), presentation, cards for practical work;
  • Educational and methodological support:
    • Financial fraud on the Internet. Volkov S.E., Glotov V.I. under the editorship of Karataev M.V. Moscow
PEDAGOGICAL CHARACTERISTICS OF THE LESSON
  • PROJECT of scientific work
  • Topic: "Financial fraud" recommended for grade 11
Topic: "FINANCIAL FRAUD"
  • Purpose of the lesson:
  • study the types of phishing financial frauds,
  • practical consolidation of skills in developing a personal strategy for competent behavior in situations of growing financial risks and fraud.
  • formation of socially significant competencies
  • Subject educational outcomes
  • to acquaint students with the types of "financial fraud",
  • prepare a “memo on minimizing financial risks”.
  • Metasubject educational outcomes
  • ability to choose actions in accordance with the task
  • put forward versions, choose the means to achieve the goal in a group and individually.
  • development of communicative culture of students;
  • express their thoughts and ideas, discuss information in the working group.
  • Personal:
  • develop the ability to work in a group
  • education of rational conduct of financial transactions,
  • formation of social activity and independence,
  • development of cultural communication skills.
Description of the educational process
  • Duration
  • Student activities when completing assignments or types of assignments for students
  • Knowledge update
  • 2 minutes
  • Students participate in the definition of the topic and emotionally tune in to the lesson.
  • II. Information part
  • 17min
  • 2.1. Historical digression.
  • 4 min
  • Listen and analyze information about phishing, write down new terms in a notebook.
  • 10 min
  • Identifies the main causes of financial phishing fraud, identify the main types of phishing, get acquainted with ways to attract potential victims to financial fraud, answer the questions: From your experience: who is most often targeted by financial scammers? Why
  • III. Group work
  • 12min
  • They are divided into groups, receive cards with tasks, think over the situation, emotionally participate in the discussion of the tasks set, speak their steps and justifications aloud, think over recommendations for the task, fix them on the drawing paper.
  • IV. Work protection
  • 10 min
  • They verbally present a solution to the problem, put forward their hypotheses and substantiate them, exchange their opinions, correct the proposed items, create a memo “How not to become a victim of financial scammers”.
  • V. Reflection
  • 3 min
  • answer questions (the topic of the lesson, questions are posed according to the type of activity and content of the lesson), discuss homework about posting on their social media pages. networks of the memo they created
Description of the educational process
  • Method
  • Types of tasks of control and measuring procedures
  • 1.Updating knowledge
  • conversation
  • Introductory conversation
  • II. Dive into content
  • verbal
  • 2.1. Historical digression
  • Communicating conversation, dialogue, report
  • Filling in the table
  • 2.2. Formulation of the purpose of the lesson and the problem of the lesson
  • Brainstorm
  • Conversation with the class, discussion of questions
  • III. Group work
  • Consultations, independent work
  • Collective development of a strategy for behavior on the Internet
  • IV. Work protection
  • dialogue
  • Preparing a memo
  • V. Reflection
  • conversation
  • Conversation with the class
METHODOLOGICAL CHARACTERISTICS OF THE LESSON
  • Grade 11
  • topic: "Financial fraud"
List of methods (technologies, teaching methods) recommended for use in the lesson
  • Group work
  • Working with the concept
  • Brainstorm
Methodology for assessing the pedagogical effectiveness of a lesson
  • Summarizing
  • Did you like this form of training?
  • What would you change about the lesson?
  • Where can you use the acquired knowledge in life?
During the classes: I. Knowledge update. Greeting students. Creating an emotional mood II. Information part
  • 2.1 Historical digression.
  • Report on the topic “Financial fraud-phishing”.
  • 2.2 Formulation of the goal of the lesson and the problem of the lesson
  • Phishing types.
  • Phishing
  • "Bay on the map"
  • Pseudo-shares of brands
  • Phishing sites
  • Phishing messages
III Group work
  • Situation #1
  • VKontakte you receive a message: “Hi!!! I almost win the competition" best photo by March 8”, less than a percentage is not enough! The main prize is a smartphone, almost mine)))! … (your name), can you help me? You need to send an SMS with the text "photo8" without quotes to the number ****. If it's not hard, vote for me, I won't be in debt! Of course, if 1.5 rubles is not a pity ;-) Thanks in advance!!!” Will you try?
  • Situation No. 2 On the bulletin board and on social networks, you saw the sentence: “Money from gambling business. I take it out through strangers, for which I pay 50%”. You are offered a profitable operation. A fairly large amount of money will be credited to your account, which must be withdrawn from an ATM and divided into two parts (in half). Send the first part to another account (or online wallet) and keep the other half. Will you risk it?
IV. Work protection.
  • Memo: "How not to fall into the hands of scammers?"
  • * It is not advisable to post personal information on the Internet. Personal information is your number mobile phone, email address, home address and photos of you, your family or friends.
  • * If you publish photos or videos on the Internet - everyone can see them.
  • * Do not reply to Spam (unsolicited e-mail).
  • * Do not open files sent by people you do not know. You cannot know what these files actually contain - they may contain viruses or photos / videos with "aggressive" content.
  • * Do not add strangers to your IM contact list (ICQ, MSN messenger, etc.)
  • * Remember that virtual acquaintances may not be who they say they are.
  • * If there are no relatives near you, do not meet in real life with people whom you met on the Internet. If your virtual friend is really who he claims to be, he will be fine with your concern for his own safety!
  • * It's never too late to tell an adult if someone hurt you
Thank you for your attention

2023
ihaednc.ru - Banks. Investment. Insurance. People's ratings. News. Reviews. Credits