By: Micah Stevens Identity Theft in the World Today.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

My Name is Todd Davis My Social Security # is
Victoria ISD Common Sense Media Grade 6: Scams and schemes
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How Safe Are You? Steven Stone. What is Identity Theft Identity consists of: – Social Security Number – Credit Card Number and Credit.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Security Awareness Presenter: Royce Wilkerson.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
PART THREE E-commerce in Action Norton University E-commerce in Action.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
CYBER CRIME.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
Homework for Wed’s topic: Threats to E-Commerce 1. Review Chapter 5 in Laudon textbook 2. “Facebook's Top Cop”— Joe Sullivan and a staff of 50 people Fortune.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
A threat to global security and economy Koushik Mannepalli CMPE 294.
INTRODUCTION & QUESTIONS.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
By: Arjun Vachhani.  What is Cybercrime  What is Cybercrime Law  Cybercrime in Our Lives  Case 1: Albert Gonzalez  Case 2:Phishers  Statistics 
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Scams & Schemes Common Sense Media.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Cyber Security Awareness Workshop
Cyber Crime & What It Means For Your Business
Information Security Session October 24, 2005
Computer Security.
Marcial Quinones-Cardona
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

By: Micah Stevens Identity Theft in the World Today

Cyber Crimes Spam messages Viruses Hacking Piracy Fraud Pornography Identity Theft

In 1997 consumers lost more than 745 million dollars Today it is in the billions Identity theft increased 22% from 2007 to 2008 Affects over 10 million victims 57 million adults have experienced a phishing attack

How do they do it? They use what is called “phishing” or “spoofing” They send false advertisements that trick you in to putting in your information They have hacker sites that look like real sites and when you click on the link, it automatically takes you to their site They can hack in to your Facebook or Myspace They use what is called “phishing” or “spoofing” They send false advertisements that trick you in to putting in your information They have hacker sites that look like real sites and when you click on the link, it automatically takes you to their site They can hack in to your Facebook or Myspace

How We Are Trying to Stop Identity Theft Anti- Identity Theft – Program that protects information Kills adware Removes cookies LifeLock- Offers complete identity theft protection Ordering fraud alerts on credit reports Stop junkmail Notify customers Identity Theft 911- Provides personal identity coverage $25,000 in coverage No deductible Programs offer guarantees. They will pay for lawyers

Stopping Identity Theft Contd… News and Media Time Magazine The New York Times Both reported about the increases in identity theft and how we could decrease this by taking action. CNN Paula Zahn reported that nearly 10,000 social security cards were stolen from Stanford University computers

The Future? Do you think this will increase or decrease? What kinds of cybercrime could be next? What does this tell you about the world today?