1 / 20

Identity Theft

Identity Theft. By Omer Ersen. What is it. The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases. What types of Identity Theft are there?.

dillian
Télécharger la présentation

Identity Theft

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity Theft By Omer Ersen

  2. What is it • The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases.

  3. What types of Identity Theft are there? • Criminal identity theft (posing as another person when apprehended for a crime) • Financial identity theft (using another's identity to obtain credit, goods and services) • Identity cloning (using another's information to assume his or her identity in daily life) • Medical identity theft (using another's identity to obtain medical care or drugs)

  4. More in depth • Criminal identity theft • Giving a false name or fake ID when questioned by the cops. • Victims may not know that their name was given during the incident

  5. Financial identity theft • What you are a costumed to when dealing with Identity Theft. • Includes attackers getting credit card numbers, bank account numbers, and other information to obtain goods. • Goods can be physical or can be things like loans, and credit scores to be able to buy something

  6. Identity cloning • Impersonating someone to conceal Identity either to remain hidden or for their ammusment. • Ex- Catfishing, illegal immigrants.

  7. Medical identity theft • Used by people trying to obtain medical care using someone’s else's identity. • Usually for treatment that is too expensive, and for people who don’t have insurance • According to Ponemon Institute's “2013 Survey on Medical Identity Theft

  8. So why do we care • Growing at an unbelievable rate • Use of technology (online banking, online shopping) • If we do not educate people about the problem and teach them how to protect themselves then the numbers will only rise.

  9. Statistics • Done by the U.S. Department of Justice • For Individuals

  10. So how do Attackers obtain information? • Two ways • Physically obtaining your information • Through electronics. The norm now

  11. Physically • Some examples of physically obtaining your information are • Dumpster diving • “preapproved” credit cards from the mail • Stealing it directly from your possession • Obtaining storage devices that still have information on them

  12. Through electronics • Using malware to obtain information from your electronics. Ex Keystroke Trojans and spyware • Obtaining information from Social Media • Impersonating trusted organizations in emails • Fake WI-FI spots

  13. Fake Wi-Fi • Usually at public places like Hotels, conventions, and bars • The Wi-Fi looks legitimate but it is not • Used to obtain username and passwords • Can obtain bank/ credit information if a user logs in or uses there credit card using the fake Wi-Fi spot

  14. Impersonating trusted organizations in emails/ Early internet • Infamous 419 scam • Spam mail was sent to potential victims stating that a Nigerian Prince has a huge fortune coming his way but he needs an upfront deposit first and he is willing to split the fortune with you if you agree to pay some cash

  15. Impersonating trusted organizations in emails/ Modern internet • This scam should have never worked but apparently it did • What is used today- • Receive an email from your bank saying there is a security breach and you must change your password. Email looks legit and looks exactly like emails you have received in the past

  16. Obtaining information from Social Media • Social Media has exploded over the last couple of years • Attackers use social media to obtain information that can help them break into your accounts • They scan for information that can help them answer the “forgot password” hint

  17. Malware • Attackers can obtain information through different types of malware • Keylogger Trojan-tracks what keys you have pressed • Spyware- Software that gathers information from an infected machine without the user knowing

  18. So what to do if you believe you are a victim • According to the Federal Trade Commission 3 steps • Place an initial Fraud Alert- Place alert for free at 1 of the three National credit reporting companies(Equifax, Experian, and TransUnion) • Order your Credit Reports-Get a free credit report from each of the credit reporting companies • Create an Identity theft Report- To help recover from the theft

  19. Protection • Antivirus Systems on your electronics can help against malware • Proper disposal of documents(where you discard them and how you destroy documents) • Caution against phishing scams • Identity theft protection services

  20. Identity theft protection services • Top Identity theft protection Services of 2013

More Related