Information Security and You: Identity Theft and Credit Card Encryption
Who am I?
The Big Ideas Survey Results Identity Theft and You Gaming Hacked Credit Card and Online/Mobile Payment Encryption
Survey Results
Survey Results
Identity Theft and You What happens when your identity is stolen?
Identity Theft and You Why should you care? Because you are the most vulnerable!
Identity Theft and You Adam Brackin 14 years old Social Security Number compromised Axton Betz 13 years old Unable to apply for college, car loans, or apartments for almost two decades
Identity Theft and You Social Security Number
Identity Theft and You How can criminal hackers get ahold of your information? Lack of multiple strong passwords Sharing too much on social media Use various forms of social engineering to trick YOU into revealing YOUR INFO to them
Identity Theft and You What kinds of malware are there?
Identity Theft and You What kinds of social engineering are there?
Identity Theft and You Your turn! If you were an identity thief, how could you try to steal my personal information in public?
Gaming Hacked Sony’s PlayStation Network Data Breach
Gaming Hacked Minecraft Data Breach
How to Protect Your Account Your turn! Use long and complex passwords Use two-factor authentication Keep your accounts extra safe with your email or phone number Do not share your usernames or passwords Do not use public wi-fi
Credit Card and Online/Mobile Payment Encryption
Credit Card and Online/Mobile Payment Encryption Overall Online Payment System How do credit cards work? A magnetic strip on the back of the credit card containing the information on the face of the card is swiped and read by the PoS system EMV Credit Cards Payment Gateway Payment Processor Payment Provider Payment System Merchant Account
Credit Card and Online/Mobile Payment Encryption Target and Neiman Marcus https://www.bing.com/images/search?view=detailV2&ccid=pURgW0Rk&id=620286F031608CE19384D0018260521F9660207B&thid=OIP.pURgW0Rk9GH06lRpS2dsyAHaF7&mediaurl=http%3a%2f%2fwww.waronidtheft.org%2fwp-content%2fuploads%2f2016%2f07%2fchild-id-theft.png&exph=554&expw=692&q=child+identity+theft&simid=608039209994947322&selectedIndex=0 19
Credit Card and Online/Mobile Payment Encryption Credit Card Encryption Demonstration What is encryption? https://www.youtube.com/watch?v=Xw0oR66MqaU
Credit Card and Online/Mobile Payment Encryption Credit Card Encryption Demonstration What is tokenization? https://www.youtube.com/watch?v=iVeenkfa-0s&t=9s
Summary What can YOU do to help protect your identity and data online? https://www.bing.com/images/search?view=detailV2&ccid=lJTR50ot&id=A566E6E2AE7E3F0B73577A1EFF1EF1EEEC3636C8&thid=OIP.lJTR50otqO-40gqqiHxcwQHaFj&mediaurl=https%3a%2f%2fi.ytimg.com%2fvi%2fUc6KIXKMmW4%2fhqdefault.jpg&exph=360&expw=480&q=mincraft+hacks&simid=608033016604200542&selectedIndex=2 Knowledge is power! Keep your computer up-to- date! Use strong passwords 22
Any questions?
Resources https://searchsecurity.techtarget.com/magazineContent/Secure-online-payment-system-requires-end-to-end-encryption https://en.wikipedia.org/wiki/Payment_card#Credit_card https://www.wthr.com/article/targeting-children-the-young-victims-of-identity-theft https://www.lifelock.com/learn-identity-theft-resources-teens-risk-identity-theft.html https://www.businessinsider.com/playstation-network-allegedly-hacked-ourmine-2017-8 https://www.wildapricot.com/articles/online-payment-services https://www.theguardian.com/technology/2011/apr/26/playstation-network-hackers-data https://www.dailymail.co.uk/sciencetech/article-2920222/Minecraft-hacked-Cyber-criminals-leak- hundreds-login-details-pocket-expert-warns.html https://www.usatoday.com/story/news/nation/2014/01/09/encrypted-chips-help-fight-credit-card- fraud/4400347/ https://www.youtube.com/watch?v=iVeenkfa-0s https://www.kiplinger.com/article/credit/T048-C011-S001-6-ways-you-invite-hackers-to-steal-your- personal-i.html https://fossbytes.com/what-is-social-engineering-types-techniques/ https://www.csoonline.com/article/3155397/security/esea-hacked-1-5-million-records-leaked-after- alleged-failed-extortion-attempt.html https://www.pciblog.org/credit-card-processing-explained/ https://www.securityweek.com/target-confirms-point-sale-malware-was-used-attack