1 / 10

Safe and Effective Internet Browsing

Safe and Effective Internet Browsing . Financial Fraud and Identity Theft. Financial Fraud and Identity Theft. There are many ways that criminals can ‘steal’ your information while you are online conducting business or just browsing the internet.

dawn
Télécharger la présentation

Safe and Effective Internet Browsing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Safe and Effective Internet Browsing Financial Fraud and Identity Theft

  2. Financial Fraud and Identity Theft • There are many ways that criminals can ‘steal’ your information while you are online conducting business or just browsing the internet. • You must be careful to ‘protect’ your information while working online or browsing the internet.

  3. Financial Fraud and Identity Thefthttp://www.ic3.gov/preventiontips.aspx • According to the FBI, the following is a list of some ways criminals or ‘fraudsters’ attempt to obtain your financial information: • Auction Fraud • Counterfeit Cashier’s Check • Credit Card Fraud • Debt Elimination Scheme • Identity Theft • “Nigerian” Letter or “419” • Phishing/Spoofing • Third Party Receiver of Funds

  4. Financial Fraud and Identity Thefthttp://www.ic3.gov/preventiontips.aspx • According to the FBI and the iC3, here are some tips to keep your information safe when it concerns Identity Theft: • Ensure websites are secure prior to submitting your credit card number (SSL encryption) • Be cautious of scams requiring you to provide your personal information • Review your credit report regularly

  5. Financial Fraud and Identity Theft • According to the government website, http://www.onguardonline.gov/topics/computer-security.aspx, concerning safety online; Here are their 7 recommendations: • 1. Protect your personal information. It is valuable • 2. Know who you are dealing with • 3. Use security software that updates automatically • 4. Keep your operating system and web browser up-to-date

  6. Financial Fraud and Identity Theft • According to the government website, http://www.onguardonline.gov/topics/computer-security.aspx, concerning safety online; Here are their 7 recommendations (cont.): • 5. Keep your passwords safe, secure and strong • 6. Back-up important files • 7. Learn what to do in an e-mergency

  7. Financial Fraud and Identity Theft • Identity Theft is when a person uses your personal financial or identification information with out your permission to obtain goods or services. • Some ways ‘criminals’ obtain your information: • Dumpster Diving • Skimming • Phishing • Changing your Address • “Old-Fashion” Stealing • Pretexting

  8. Financial Fraud and Identity Theft The two popular ways to gain personal information via technology are: 1. “Skimming”: the stealing of credit card information via the use of a skimming device attached to commonly used payment machines; ATM’s and fast food restaurant payment machines.

  9. Financial Fraud and Identity Theft The two popular ways to gain personal information via technology are: 2. “Phishing” is criminals pretend to be financial institutions or other companies and send spam emails or text messages in an effort to get you to give them your financial or personal information.

  10. Financial Fraud and Identity Thefthttp://www.webopedia.com/TERM/S/SSL.html • SSL Encryption • SSL stands for Secure Sockets Layers • SSL Encryption was developed by Netscape for the transmission of sensitive information via the internet • SSL Encryption consists of two parts, a public key and a private key; when computers communicate concerning the transfer of sensitive data, the keys must match for the information to be transferred

More Related