210 likes | 353 Vues
Identity Theft. By Omer Ersen. What is it. The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases. What types of Identity Theft are there?.
E N D
Identity Theft By Omer Ersen
What is it • The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases.
What types of Identity Theft are there? • Criminal identity theft (posing as another person when apprehended for a crime) • Financial identity theft (using another's identity to obtain credit, goods and services) • Identity cloning (using another's information to assume his or her identity in daily life) • Medical identity theft (using another's identity to obtain medical care or drugs)
More in depth • Criminal identity theft • Giving a false name or fake ID when questioned by the cops. • Victims may not know that their name was given during the incident
Financial identity theft • What you are a costumed to when dealing with Identity Theft. • Includes attackers getting credit card numbers, bank account numbers, and other information to obtain goods. • Goods can be physical or can be things like loans, and credit scores to be able to buy something
Identity cloning • Impersonating someone to conceal Identity either to remain hidden or for their ammusment. • Ex- Catfishing, illegal immigrants.
Medical identity theft • Used by people trying to obtain medical care using someone’s else's identity. • Usually for treatment that is too expensive, and for people who don’t have insurance • According to Ponemon Institute's “2013 Survey on Medical Identity Theft
So why do we care • Growing at an unbelievable rate • Use of technology (online banking, online shopping) • If we do not educate people about the problem and teach them how to protect themselves then the numbers will only rise.
Statistics • Done by the U.S. Department of Justice • For Individuals
So how do Attackers obtain information? • Two ways • Physically obtaining your information • Through electronics. The norm now
Physically • Some examples of physically obtaining your information are • Dumpster diving • “preapproved” credit cards from the mail • Stealing it directly from your possession • Obtaining storage devices that still have information on them
Through electronics • Using malware to obtain information from your electronics. Ex Keystroke Trojans and spyware • Obtaining information from Social Media • Impersonating trusted organizations in emails • Fake WI-FI spots
Fake Wi-Fi • Usually at public places like Hotels, conventions, and bars • The Wi-Fi looks legitimate but it is not • Used to obtain username and passwords • Can obtain bank/ credit information if a user logs in or uses there credit card using the fake Wi-Fi spot
Impersonating trusted organizations in emails/ Early internet • Infamous 419 scam • Spam mail was sent to potential victims stating that a Nigerian Prince has a huge fortune coming his way but he needs an upfront deposit first and he is willing to split the fortune with you if you agree to pay some cash
Impersonating trusted organizations in emails/ Modern internet • This scam should have never worked but apparently it did • What is used today- • Receive an email from your bank saying there is a security breach and you must change your password. Email looks legit and looks exactly like emails you have received in the past
Obtaining information from Social Media • Social Media has exploded over the last couple of years • Attackers use social media to obtain information that can help them break into your accounts • They scan for information that can help them answer the “forgot password” hint
Malware • Attackers can obtain information through different types of malware • Keylogger Trojan-tracks what keys you have pressed • Spyware- Software that gathers information from an infected machine without the user knowing
So what to do if you believe you are a victim • According to the Federal Trade Commission 3 steps • Place an initial Fraud Alert- Place alert for free at 1 of the three National credit reporting companies(Equifax, Experian, and TransUnion) • Order your Credit Reports-Get a free credit report from each of the credit reporting companies • Create an Identity theft Report- To help recover from the theft
Protection • Antivirus Systems on your electronics can help against malware • Proper disposal of documents(where you discard them and how you destroy documents) • Caution against phishing scams • Identity theft protection services
Identity theft protection services • Top Identity theft protection Services of 2013