How to Protect your Identity Online PIYUSH HARSH

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
How It Applies In A Virtual World
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
A Student’s Guide to Proper and Safe Web Behavior
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
CCT355H5 F Presentation: Phishing November Jennifer Li.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Identity Theft One of America's fastest growing crimes.
Cybersecurity Test Review Introduction to Digital Technology.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
A Student’s Guide to Proper and Safe Web Behavior
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
Learn how to protect yourself against common attacks
Social Engineering Charniece Craven COSC 316.
Lesson 3 Safe Computing.
Overview 1. Phishing Scams
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
What to be aware of and how to avoid problems.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Scams, Identity Theft, and Viruses Kelly & Caitlin
Information Security Session October 24, 2005
Ethics Tutorial Assignment#2
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety – Social Media
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Presentation transcript:

How to Protect your Identity Online PIYUSH HARSH pharsh@cise.ufl.edu PHISHING How to Protect your Identity Online PIYUSH HARSH pharsh@cise.ufl.edu 9/19/2018 (c) 2005 - Piyush Harsh

WHAT IS PHISHING (fish´ing) (n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. (source:http://www.webopedia.com/TERM/p/phishing.html) 9/19/2018 (c) 2005 - Piyush Harsh

How Identity Thieves Operate? They use bulk spamming – i.e. they send millions of emails to email accounts at random. Even if 0.1% unsuspecting user falls prey, an identity thieve has 1000 valid identities using which he can commit crimes. General Mode of Operation – emails asking for account verification of a very popular banking establishment e.g. Citicorp or Bank One. Social Engineering Spy ware and Ad ware running on an unsuspecting user’s terminal – these pests act as ‘key-logger’ that keeps track of what key-strokes you make and send the information to the bad guy. 1000 of other ways… fastest catching mode of operation is videotaping the key sequences that you punch at the public ATM To learn about other modes of operation get in touch with me some other time 9/19/2018 (c) 2005 - Piyush Harsh

SAMPLE EXAMPLE 9/19/2018 (c) 2005 - Piyush Harsh

EXAMPLE – how to detect 9/19/2018 (c) 2005 - Piyush Harsh

EXAMPLE – The real stuff 9/19/2018 (c) 2005 - Piyush Harsh

PROTECTING IDENTITY ONLINE Keep your system free from spy ware and ad ware Make sure you submit personal details to website only when you initiate the transaction and never ever otherwise Companies don’t ask your details over emails – don’t respond to any emails asking you to divulge your personal information Avoid using public terminal to do online transaction Always hide the pin keypad while typing your pin at public ATM Always close your web browser after making a transaction on a public system if you have to in the first place Other tricks and soft wares to help protect your identity online can be accessed at my personal webpage http://plaza.ufl.edu/piyush82/security.html 9/19/2018 (c) 2005 - Piyush Harsh

SOURCE: www.antiphishing.org SOME STATISTICS SOURCE: www.antiphishing.org 9/19/2018 (c) 2005 - Piyush Harsh

DISTRIBUTION OF HOSTING SITES BY COUNTRY 9/19/2018 (c) 2005 - Piyush Harsh

GOOD ANTI-PHISHING RESOURCES http://www.antiphishing.org http://www.fraudwatchinternational.com Better Business Bureau - http://www.bbb.org/phishing http://www.consumer.gov/idtheft http://www.visa.com/phishing My Security Recommendations at http://plaza.ufl.edu/piyush82/security.html 9/19/2018 (c) 2005 - Piyush Harsh