Скачать презентацию Identity Theft — Here and Now Shaw High Скачать презентацию Identity Theft — Here and Now Shaw High

ec1a3d5f537d884650b4622c8e82afeb.ppt

  • Количество слайдов: 24

Identity Theft - Here and Now Shaw High School February 5, 2010 Dr. Shamim Identity Theft - Here and Now Shaw High School February 5, 2010 Dr. Shamim Khan TSYS School of Computer Science Columbus State University [email protected] edu http: //csc. colstate. edu/khan

Identity Theft ØThe fastest growing crime in America ØApprox. 15 million victims each year Identity Theft ØThe fastest growing crime in America ØApprox. 15 million victims each year ØFinancial losses totaling >$50 billion (http: //www. identitytheft. info/victims. aspx) ØEven the Federal Reserve Board Chair Ben Bernanke! 3/15/2018 Columbus State University 2

What is Identity Theft? What is Identity Theft?

What is Identity Theft? Using another’s identity for one’s benefit (usually financial gain) Citibank What is Identity Theft? Using another’s identity for one’s benefit (usually financial gain) Citibank Identity Theft commercial - Darrel P.

Identity Theft What else can identity thieves do? – Illegal immigration – Espionage – Identity Theft What else can identity thieves do? – Illegal immigration – Espionage – Terrorism

Identity Theft How does it affect the victim? Consequences of being held responsible for Identity Theft How does it affect the victim? Consequences of being held responsible for the thief's actions – financial loss, damaged credit report Citibank Identity Theft commercial – Thelma & Norma

Types of Identity theft ØFinancial Identity Theft- Using another's identity to obtain goods and Types of Identity theft ØFinancial Identity Theft- Using another's identity to obtain goods and services. ØCriminal Identity theft- Committing a crime with someone else’s identity 3/15/2018 Columbus State University 7

Types of Identity theft (cont. ) ØIdentity Cloning Using another's information to assume his Types of Identity theft (cont. ) ØIdentity Cloning Using another's information to assume his or her identity in daily life. ØMedical Identity Theft Using another's information to receive care, make false claims. 3/15/2018 Columbus State University 8

Types of Identity theft (cont. ) ØSocial Media Identity Theft Use of social networking Types of Identity theft (cont. ) ØSocial Media Identity Theft Use of social networking sites to steal someone’s identity to Ødisrupt their lives, harass and stalk them. 3/15/2018 Columbus State University 9

How Identities Are Stolen ØIllegally obtaining personal identification information such as ØName ØSocial security How Identities Are Stolen ØIllegally obtaining personal identification information such as ØName ØSocial security number ØCredit card numbers ØFinancial account information. 3/15/2018 Columbus State University 10

11 How Identities Are Stolen (cont. ) ØDumpster Digging Rummage through trash looking for 11 How Identities Are Stolen (cont. ) ØDumpster Digging Rummage through trash looking for bills, paper with personal information. ØSkimming Using a special storage device when processing your card. ØPhishing Pretend to be financial institutions and send spam or pop up messages to get you to reveal personal information. 3/15/2018 Columbus State University

IRS Phish 3/15/2018 Columbus State University 12 IRS Phish 3/15/2018 Columbus State University 12

Pay. Pal Phishing Site Arrives as Attachment Pay. Pal Phishing Site Arrives as Attachment

E-mail from E-mail from "Microsoft“ [email protected] com SUBJECT: {Virus? } Use this patch immediately ! Dear friend , use this Internet Explorer patch now! There are dangerous virus in the Internet now! More than 500. 000 already infected!

15 How Identities Are Stolen (cont. ) ØChanging your address Diverting your billing statements 15 How Identities Are Stolen (cont. ) ØChanging your address Diverting your billing statements to another location by completing a change of address form. ØOld Fashion Stealing wallets, purses, and mail including bank or credit card statements, new checks, tax information. 3/15/2018 Columbus State University

16 How Identities Are Stolen (cont. ) ØPretexting Using pretenses to obtain personal information 16 How Identities Are Stolen (cont. ) ØPretexting Using pretenses to obtain personal information from people, financial institutions, utilities etc. Example: The Nigerian Email Scam Message stating sender has a large sum of money and needs help transferring it out of Nigeria, or some other country. 3/15/2018 Columbus State University

Typical Nigerian Email Scam Message 17 DEAR SIR, URGENT AND CONFIDENTIAL BUSINESS PROPOSAL I Typical Nigerian Email Scam Message 17 DEAR SIR, URGENT AND CONFIDENTIAL BUSINESS PROPOSAL I AM MARIAM ABACHA, WIDOW OF THE LATE NIGERI PERSONAL INVESTMENT. ALONG THE LINE, MY HUSBAND DIED AND SINCE THE ADDRESS FROM THE PUBLICATION OF THE NIGERIAN I HAVE SUCCEEDED IN CARRYING THE FOUR METAL B TO GHANA. THEREFORE, I NEED AN URGENT HELP FROM YOU AS YOU CAN CONTACT ME THROUGH MY FAMILY LAWY THANKS AND BEST REGARD - MRS. MARIAM ABACHA 3/15/2018 Columbus State University

Safeguards ¨ E-mail – should be considered like a postcard – Don’t transmit personal Safeguards ¨ E-mail – should be considered like a postcard – Don’t transmit personal data unless it is encrypted ¨ Social networks (Facebook, Myspace) are open to others – Don’t post personal data that could be used for identification – Don’t post anything you would be ashamed of 3/15/2018 Columbus State University 18

What Else Can You Do? ¨ Do not give your personal information out over What Else Can You Do? ¨ Do not give your personal information out over the phone or Internet. ¨ Take all outgoing mail to a U. S. Postal Service mail box. ¨ Use a P. O. Box for all incoming mail. ¨ Buy a document/credit card/CD crosscut shredder.

Credit Security ¨ Monitor activity on all credit cards closely. ¨ Checking your credit Credit Security ¨ Monitor activity on all credit cards closely. ¨ Checking your credit history at least twice a year. ¨ You can buy identity theft recovery insurance.

Computer Protection ¨ Properly configure all devices ¨ Install firewalls, antivirus, anti-spyware ¨ Removed Computer Protection ¨ Properly configure all devices ¨ Install firewalls, antivirus, anti-spyware ¨ Removed unneeded cookies 3/15/2018 Institute of Management Accountants 21

Computer Protection ¨ Do not enter personal information on a website over a non-encrypted Computer Protection ¨ Do not enter personal information on a website over a non-encrypted connection ¨ Always look for https: // in the address bar signifying it’s a secure page ¨ Keep patches up to date 3/15/2018 Institute of Management Accountants 22

ID Theft Face. Off Game ¨ http: //www. onguardonline. gov/games/id-theft- faceoff. aspx 3/15/2018 Columbus ID Theft Face. Off Game ¨ http: //www. onguardonline. gov/games/id-theft- faceoff. aspx 3/15/2018 Columbus State University 23

Questions? 3/15/2018 Columbus State University 24 Questions? 3/15/2018 Columbus State University 24