SOCIAL ENGINEERING.

Slides:



Advertisements
Similar presentations
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Advertisements

By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Presented By Drexel and FMFCU.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Presented By The Plano Police Department Crime Prevention Unit.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Protecting Your Identity. What is IA? Committee on National Security Systems definition: –Measures that protect and defend information and information.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
Be Cautious of Identity Theft By: Sydney Langley.
IDENTITY THEFT OCCURS WHEN A CRIMINAL USES ANOTHER PERSON'S PERSONAL INFORMATION TO TAKE ON THAT PERSON'S IDENTITY. IDENTITY THEFT IS MUCH MORE THAN MISUSE.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
INTERNET: The Good, The Bad and The Ugly
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Presented By Plano Police Department Crime Prevention Unit.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Identity Theft How bad people get good credit. Lindsey Bertugli.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Media education: from passive consumers to active creators
Attention Identity theft Definition
Digital Citizenship Middle School
Social Engineering Charniece Craven COSC 316.
Overview What is a privacy breach? 2. Examples of privacy breaches 3. Consequences of privacy breaches 4. Steps to handling a privacy breach.
Cybersecurity Awareness
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Business Compromise and Cyber Threat
Presented by Elizabeth Kunkel Member Service Trainer
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

SOCIAL ENGINEERING

OVERVIEW What is social engineering How it affects you Things you can do How to avoid it. Consequences

WHAT IS SOCIAL ENGINEERING? tricking other people to tell security information. con game- breaking into a computer network. Gain confidential unauthorized information that compromises security.

How Does It Affect You? Financially. Mentally. Make you more aware of personal things.

Avoid Social Engineering Schemes Be suspicious of unfamiliar phone calls. Do not provide personal information. Do not reveal personal or financial information in email. Pay attention to the URL of a website.

What To Do If Victim? change any passwords you might have revealed. Watch for other signs of identity theft . contact your financial institution immediately . Watch for any charges to your account. Consider reporting the attack to the police, and file a report with the Federal Trade Commission.

Notable social engineers Badir Brothers - set up an phone/computer scheme in Israel in the 1990s, voice impersonation. (2 years , comm. Service, ) California police department - mailed out fake red light camera "tickets" also called "Snitch Tickets“ just for information. justice system is not involved. Not filed in records.

BIOGRAPHY www.Wikipedia.com www.searchsecurity.techtarget.com www.us-cert.gov

CONCLUSION Watch info you put out Check on things Notify the right people fines of up to $250,000 - $500,000 10 years in prison for individuals