Time
1 hour 44 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:02
hi and welcome to lesson 1.3 off the end user cyber fundamental course.
00:09
This lesson will be focused on online scams.
00:15
In this lesson, you will learn about what online skins are.
00:20
We will discuss types of online scans, and we will review steps you can take to protect yourself against online skins.
00:31
So what are online scans?
00:33
Online scams are bad actors using the Internet to commit fraud. Typically for financial gain. Bad actors use online methods such as email, fake or spoofed websites, fake software downloads,
00:50
texting or smashing to connect with potential victims.
00:57
Some examples of online scams that usually initiated via phishing, email, R E card or greeting card scams.
01:06
These are most popular around Christmas time.
01:08
Then there is three. You won the lottery scam.
01:12
There are job offer scams, and many more
01:17
bed actors use social engineering techniques and are basically con artists out to commit fraud.
01:23
Remember, they rely on human emotion.
01:26
They may gather specific information about you
01:30
using information you have on social media or other sources and included in the phishing email to make it look more legitimate.
01:42
Bad actors also use social engineering
01:45
to prey on human emotion, such as our desire to help
01:49
or even greed.
01:52
One example is the very popular Nigerian scam,
01:56
where the scammer tells you a story about large amounts of their money being trapped in banks, and they offer you a large sum of money to help them transfer their personal fortune out of the country.
02:13
Another skin is the fake threat threat.
02:15
The scandal will send you a phishing email stating they know what you have been doing and usually include a password of yours in the email to make it look legitimate.
02:27
They will accuse you of doing something embarrassing or insinuating something embarrassing, such as browsing ***. It work, or they will claim they have to a webcam.
02:38
They threatened to expose you if you do not pay them.
02:40
Central password was likely exposed in another earlier breach, such as Yahoo Chase or the Equifax Breach. The bad actor likely obtained your password from the dark Web where it was being sold.
02:58
And then there are fake websites,
03:00
spoofed websites, which can lead to fake bank loans, credit card applications or fake shopping sites.
03:09
You may stumble upon these sites using the Internet
03:13
browsing
03:15
or social media or even received a phishing email with the Lincoln in.
03:21
There are many more examples, such as fake job offers, travel scans and fake text messages,
03:29
online scams or fraud.
03:30
Bad actors want to make money, either by stealing and using or selling your personal information
03:38
or having you by services off software that are unnecessary or do not exist
03:46
so you can protect yourself
03:49
by using a strong password or past phrase.
03:53
Do not use the same password for multiple accounts.
03:57
Cannot remember all of your passwords.
03:59
Consider using a password manager and use past phrases.
04:03
Ah, pass raises longer than a password, which is usually only no more than 10 characters.
04:11
A pass phrase is a string of words that can contain spaces as displayed in the examples Here.
04:18
Dictionary words should not be used in passwords but are permitted in pass raises as they longer and harder to crack.
04:28
Always used two factor authentication of possible,
04:30
especially for email or any financial accounts.
04:35
Make sure to install and maintain security software such as antivirus software,
04:42
security, firewall
04:44
and adware.
04:46
Never replied a phishing emails do not click links or open attachments
04:53
and never download software or respond to pop ups from unknown sources.
05:02
Never reply to unsolicited phone calls or texts. You should always back up your data.
05:10
Should you fall victim to an online scam, which can infect your machine and damage your data.
05:16
You can file an online complaint with the FBI's Internet Crime Complaint Center.
05:24
This is the central point for tracking patterns and fraud and abuse related to Internet crimes.
05:30
Be sure to report, especially if you suffered financial loss as a victim or identity theft.
05:41
What is the goal off online scams,
05:46
Typically the goal of online scams or financial gain.
05:50
This could be obtained through fake software purchases, identity theft scams that prey on human desire to help and theft off P II, to name a few.
06:02
In this lesson, we learned what online scams are and discuss the goal of online scams.
06:10
We also talked about different types of online scams and reviewed examples
06:15
we reviewed steps you can take to protect yourself and what to do should you fall a victim to an online scam.
06:25
Here are my references. I will see you in the next lesson

Up Next

End User Cyber Fundamentals

This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by downloads, Malvertising, and how to protect yourself using security best practices.

Instructed By

Instructor Profile Image
Lisa Martino
Director, Information Security Governance, Risk & Compliance
Instructor