Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

REPORT VAC

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Title: EMPOWERING WITH AWARENESS: REPORTS

ON RECOGNIZING AND AVOIDING ONLINE FRAUD

Case studies Under Digital Empowerment

6 November,2024

SUBMITTED BY: SUBMITTED TO:


CHANDRA BHAN SITARE
SILICA MANGAL (308)
RISHI RAI (51)
PIYUSH RANJAN (743)
AYUSH BHAGAT (47)
RISHAV SINGLA
ANANDU VR (1317)
(All students are from BA hons philosophy)

VAC: DIGITAL EMPOWERMENT


Department of Statistics
Hindu College, University of
Delhi-110007
Report-1: Phishing Fraud

Introduction:

Phishing fraud has emerged as a significant threat in the digital age, exploiting vulnerabilities in
human psychology and technological systems to deceive individuals into divulging sensitive
information. This report aims to provide a comprehensive understanding of phishing fraud, including
its types, definition, real-life examples, preventative measures, government initiatives, legal
procedures, and conclusions.

What is Phishing Fraud?

Definition:

Phishing involves the fraudulent attempt to obtain sensitive information by posing as a legitimate
entity in electronic communication. Attackers employ tactics such as email spoofing, where they
forge sender addresses to appear as if the message is from a trustworthy source. The goal of
phishing is to deceive recipients into divulging confidential information or downloading malicious
software onto their devices.

Type of Phishing Fraud:

Phishing fraud is prevalent in cybercrime.

➢ Attackers use various techniques and channels:

• Email

• Instant messaging

• Social media

• Other platforms

➢ They impersonate trusted entities:

• Banks

• Government agencies

• Reputable organizations➢ Social engineering tactics are exploited to trick victims into disclosing:

• Personal information

• Financial details

• Willingly

Real-Life Story:

I had the opportunity to meet Priya, a small business owner who shared her harrowing experience
of falling victim to a phishing scam. As Priya recounted, one morning she was going through her
emails when she received an urgent message that appeared to be from her business bank. The
email alerted her to suspicious activity on her account and emphasized the need for immediate
action to prevent any potential breaches. Concerned about the security of her business finances,
Priya quickly clicked on the link provided in the email, leading her to a website that looked
remarkably like her bank's official site. Without giving it a second thought, Priya proceeded to enter
her login credentials as requested. Reflecting on the incident during our conversation, Priya
expressed how the urgency conveyed in the email had clouded her judgment. She admitted feeling a
sense of panic at the thought of her business being at risk, which led her to overlook certain warning
signs.

In hindsight, Priya acknowledged that she should have been more cautious. She mentioned that if
she had taken a moment to verify the authenticity of the email or contacted her bank directly, she
might have avoided the phishing scam altogether.

Priya's story serves as a poignant reminder of the importance of staying vigilant in the face of online
threats, especially in today's digital age where cybercriminals are becoming increasingly
sophisticated in their tactics.

What She Did:

➢ Priya acted quickly without questioning the email's authenticity.

➢ She clicked on the link and entered her details, unaware of the scam.

What She Should Have Done:

➢ Verified the authenticity of the email by contacting her bank directly.

➢ Checked for signs of phishing, such as suspicious sender addresses or

requests for personal information.

➢ Avoided clicking on links in emails and visited the bank's website directly.

Government Initiative for This:

➢ Governments raise awareness about phishing through public campaigns.

➢ Collaborate with law enforcement and cybersecurity experts to

investigate and prosecute scammers.

Legal Procedures:

➢ Phishing is considered a criminal offense punishable by law.

➢ Law enforcement agencies conduct investigations to apprehend

perpetrators.

➢ Perpetrators may face fines, imprisonment, or both, depending on the

severity of the offense.

Conclusion:

➢ Phishing fraud is a significant threat that exploits trust and technological

vulnerabilities.

➢ Individuals and organizations need to remain vigilant and adopt

proactive measures to protect against scams.


➢ Government initiatives play a crucial role in raising awareness and

enforcing laws to combat phishing effectively

Report-2 : Credit Card Scam

Introduction:

Credit cards, while offering convenience and financial flexibility, have also become a prime target for
scammers. The ease of online transactions and the widespread use of credit cards have made them
susceptible to various fraudulent activities. This report delves into the nature of credit card scams,
their different types, a real-life case study, preventive measures, government initiatives, legal
procedures, and concludes with essential recommendations.

What are credit card scams?

Definition:

A credit card scam is a fraudulent activity aimed at obtaining unauthorized access to a credit
cardholder's account for financial gain. Scammers employ various tactics to deceive individuals and
steal their personal and financial information.

Types of Credit Card Scams

1. Phishing: This involves sending fraudulent emails or messages that appear to be from
legitimate organizations, such as banks or credit card companies. The aim is to trick
individuals into revealing their personal and financial information.

2. Skimming: This involves using a device to capture card data from ATMs or point-of-sale
terminals. The device, known as a skimmer, is installed on top of the original card reader.

3. Card-Not-Present (CNP) Fraud: This occurs when a fraudulent transaction is made using a
credit card number without the physical card being present. Online purchases, telephone
orders, and mail-order transactions are common avenues for CNP fraud.

4. Identity Theft: Scammers may steal a person's identity to open new credit card accounts,
make unauthorized purchases, and damage their credit history.

5. Chargebacks: In some cases, scammers may charge goods or services to a stolen credit card
and then file a chargeback dispute with the issuing bank.

A Real-Life Story

John was in a hurry to withdraw cash. He stopped at a nearby ATM, inserted his card, entered his
PIN, and selected the withdrawal amount. As he waited for his cash, he noticed a small device
attached to the ATM's card reader. He dismissed it as a common feature of newer ATMs.

After withdrawing his cash, John continued on his way. However, a few days later, he received a
notification from his bank about unauthorized transactions on his credit card. The transactions were
for small amounts, but they added up to a significant sum.

John realized that he had been the victim of a skimming scam. The device attached to the ATM had
captured his card data. The scammers had used this information to create a counterfeit card and
make unauthorized purchases.
Key takeaways from this story:

 Be vigilant at ATMs: Always inspect the ATM for signs of tampering, such as loose panels or
unusual devices.

 Cover your PIN: Shield your keypad with your hand to prevent others from seeing your PIN.

 Monitor your account regularly: Check your credit card statements for any unusual activity.

 Report suspicious activity immediately: Contact your bank as soon as you notice
unauthorized transactions.

Government Initiatives

Governments worldwide have implemented various measures to combat credit card fraud.
Here are some key initiatives:

 Enhancing Security Standards:

o EMV Chip Technology: Many countries have transitioned to EMV chip cards, which
are more secure than magnetic stripe cards.

o Tokenization: This involves replacing sensitive card data with a unique code,
reducing the risk of data breaches.

o Two-Factor Authentication: Requiring a second form of verification, such as a code


sent to a mobile device, adds an extra layer of security.

 Protecting Consumer Data:

o Data Breach Notification Laws: These laws require businesses to notify consumers if
their personal information has been compromised.

o Data Privacy Regulations: Regulations like the General Data Protection Regulation
(GDPR) and the California Consumer Privacy Act (CCPA) impose strict data handling
requirements.

 Raising Awareness:

o Public Education Campaigns: Governments and financial institutions conduct


campaigns to educate consumers about credit card fraud prevention.

o Partnerships with Industry: Collaboration with banks, credit card companies, and
retailers helps disseminate information and best practices.

 Supporting Law Enforcement:

o International Cooperation: Governments work together to track down and


prosecute cross-border fraudsters.

o Investment in Technology: Law enforcement agencies invest in advanced tools to


investigate and prevent fraud.
Legal Procedures

If you are a victim of credit card fraud, you should take the following legal steps:

 Report the Fraud to Your Credit Card Issuer: Contact your bank immediately to dispute
unauthorized charges and prevent further losses.

 File a Police Report: Provide the police with detailed information about the fraudulent
transactions.

 Contact the Credit Bureaus: Place a fraud alert or security freeze on your credit report to
prevent unauthorized new accounts from being opened.

 Monitor Your Credit Report: Regularly review your credit report for any suspicious activity.

 Seek Legal Advice: If the fraud has caused significant financial damage, consider consulting
with an attorney.

Conclusion

Credit card fraud remains a persistent threat, but by understanding the various types of
scams, practicing safe online habits, and taking prompt action when fraud occurs, you can
significantly reduce your risk. Governments and financial institutions are continuously
working to strengthen security measures and protect consumers. By staying informed and
vigilant, you can safeguard your personal and financial information and enjoy the benefits of
using credit me his or her identity in daily life.

You might also like