
ec1a3d5f537d884650b4622c8e82afeb.ppt
- Количество слайдов: 24
Identity Theft - Here and Now Shaw High School February 5, 2010 Dr. Shamim Khan TSYS School of Computer Science Columbus State University [email protected] edu http: //csc. colstate. edu/khan
Identity Theft ØThe fastest growing crime in America ØApprox. 15 million victims each year ØFinancial losses totaling >$50 billion (http: //www. identitytheft. info/victims. aspx) ØEven the Federal Reserve Board Chair Ben Bernanke! 3/15/2018 Columbus State University 2
What is Identity Theft?
What is Identity Theft? Using another’s identity for one’s benefit (usually financial gain) Citibank Identity Theft commercial - Darrel P.
Identity Theft What else can identity thieves do? – Illegal immigration – Espionage – Terrorism
Identity Theft How does it affect the victim? Consequences of being held responsible for the thief's actions – financial loss, damaged credit report Citibank Identity Theft commercial – Thelma & Norma
Types of Identity theft ØFinancial Identity Theft- Using another's identity to obtain goods and services. ØCriminal Identity theft- Committing a crime with someone else’s identity 3/15/2018 Columbus State University 7
Types of Identity theft (cont. ) ØIdentity Cloning Using another's information to assume his or her identity in daily life. ØMedical Identity Theft Using another's information to receive care, make false claims. 3/15/2018 Columbus State University 8
Types of Identity theft (cont. ) ØSocial Media Identity Theft Use of social networking sites to steal someone’s identity to Ødisrupt their lives, harass and stalk them. 3/15/2018 Columbus State University 9
How Identities Are Stolen ØIllegally obtaining personal identification information such as ØName ØSocial security number ØCredit card numbers ØFinancial account information. 3/15/2018 Columbus State University 10
11 How Identities Are Stolen (cont. ) ØDumpster Digging Rummage through trash looking for bills, paper with personal information. ØSkimming Using a special storage device when processing your card. ØPhishing Pretend to be financial institutions and send spam or pop up messages to get you to reveal personal information. 3/15/2018 Columbus State University
IRS Phish 3/15/2018 Columbus State University 12
Pay. Pal Phishing Site Arrives as Attachment
E-mail from "Microsoft“ [email protected] com SUBJECT: {Virus? } Use this patch immediately ! Dear friend , use this Internet Explorer patch now! There are dangerous virus in the Internet now! More than 500. 000 already infected!
15 How Identities Are Stolen (cont. ) ØChanging your address Diverting your billing statements to another location by completing a change of address form. ØOld Fashion Stealing wallets, purses, and mail including bank or credit card statements, new checks, tax information. 3/15/2018 Columbus State University
16 How Identities Are Stolen (cont. ) ØPretexting Using pretenses to obtain personal information from people, financial institutions, utilities etc. Example: The Nigerian Email Scam Message stating sender has a large sum of money and needs help transferring it out of Nigeria, or some other country. 3/15/2018 Columbus State University
Typical Nigerian Email Scam Message 17 DEAR SIR, URGENT AND CONFIDENTIAL BUSINESS PROPOSAL I AM MARIAM ABACHA, WIDOW OF THE LATE NIGERI PERSONAL INVESTMENT. ALONG THE LINE, MY HUSBAND DIED AND SINCE THE ADDRESS FROM THE PUBLICATION OF THE NIGERIAN I HAVE SUCCEEDED IN CARRYING THE FOUR METAL B TO GHANA. THEREFORE, I NEED AN URGENT HELP FROM YOU AS YOU CAN CONTACT ME THROUGH MY FAMILY LAWY THANKS AND BEST REGARD - MRS. MARIAM ABACHA 3/15/2018 Columbus State University
Safeguards ¨ E-mail – should be considered like a postcard – Don’t transmit personal data unless it is encrypted ¨ Social networks (Facebook, Myspace) are open to others – Don’t post personal data that could be used for identification – Don’t post anything you would be ashamed of 3/15/2018 Columbus State University 18
What Else Can You Do? ¨ Do not give your personal information out over the phone or Internet. ¨ Take all outgoing mail to a U. S. Postal Service mail box. ¨ Use a P. O. Box for all incoming mail. ¨ Buy a document/credit card/CD crosscut shredder.
Credit Security ¨ Monitor activity on all credit cards closely. ¨ Checking your credit history at least twice a year. ¨ You can buy identity theft recovery insurance.
Computer Protection ¨ Properly configure all devices ¨ Install firewalls, antivirus, anti-spyware ¨ Removed unneeded cookies 3/15/2018 Institute of Management Accountants 21
Computer Protection ¨ Do not enter personal information on a website over a non-encrypted connection ¨ Always look for https: // in the address bar signifying it’s a secure page ¨ Keep patches up to date 3/15/2018 Institute of Management Accountants 22
ID Theft Face. Off Game ¨ http: //www. onguardonline. gov/games/id-theft- faceoff. aspx 3/15/2018 Columbus State University 23
Questions? 3/15/2018 Columbus State University 24