Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.

Slides:



Advertisements
Similar presentations
Part I: Making Good Online Choices
Advertisements

1 If You Are Me, Then Who Am I? Beating Identity Theft Office of the California Attorney General.
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
What is Identity Theft, and how can you protect yourself from it?
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Cyber Security—What you should know before it’s too late! T Jay Humphries and Trevor O’Donnal.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
ONLINE INFORMATION SAFETY & SECURITY Place yourself to be VICTIM while online?
How can you protect yourself from online identity theft?
Scams & Schemes Common Sense Media.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Identity Theft One of America's fastest growing crimes.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Topic 4: E-safety, Health and Safety
Identity Theft It’s a crime!
Combating Identity Fraud In A Virtual World
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Policy Development Milan Adams.
Scams & Schemes Common Sense Media.
Hotspot Shield Protect Your Online Identity
Social Engineering Charniece Craven COSC 316.
Protecting What’s Yours: Your Identity
Information Security.
Protecting Your Identity:
Report Phishing Forward phishing s to
Cyber Security Awareness Workshop
cybercrime Presented to you by : NAMES MATRIC NO
Chapter 11 crime and security in the networked economy
Protecting our institutional and your personal data
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Sissy r. osteen, ph.d., cfp® Oklahoma State University
Year 10 ICT ECDL/ICDL IT Security.
Lesson 2- Protecting Yourself Online
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Report Phishing Forward phishing s to
Faculty of Science IT Department By Raz Dara MA.
Ethical Hacking.
Las Positas College Flex Day
Lesson 2- Protecting Yourself Online
“Credit score vocabulary”
Security in mobile technologies
Company Name | Phone Number | Website | Address
A Secret Service Perspective on Credit Card Fraud
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Information Security and You: Identity Theft and Credit Card Encryption

Who am I?

The Big Ideas Survey Results Identity Theft and You Gaming Hacked Credit Card and Online/Mobile Payment Encryption

Survey Results

Survey Results

Identity Theft and You What happens when your identity is stolen?

Identity Theft and You Why should you care? Because you are the most vulnerable!

Identity Theft and You Adam Brackin 14 years old Social Security Number compromised Axton Betz 13 years old Unable to apply for college, car loans, or apartments for almost two decades

Identity Theft and You Social Security Number

Identity Theft and You How can criminal hackers get ahold of your information? Lack of multiple strong passwords Sharing too much on social media Use various forms of social engineering to trick YOU into revealing YOUR INFO to them

Identity Theft and You What kinds of malware are there?

Identity Theft and You What kinds of social engineering are there?

Identity Theft and You Your turn! If you were an identity thief, how could you try to steal my personal information in public?

Gaming Hacked Sony’s PlayStation Network Data Breach

Gaming Hacked Minecraft Data Breach

How to Protect Your Account Your turn! Use long and complex passwords Use two-factor authentication Keep your accounts extra safe with your email or phone number Do not share your usernames or passwords Do not use public wi-fi

Credit Card and Online/Mobile Payment Encryption

Credit Card and Online/Mobile Payment Encryption Overall Online Payment System How do credit cards work? A magnetic strip on the back of the credit card containing the information on the face of the card is swiped and read by the PoS system EMV Credit Cards Payment Gateway Payment Processor Payment Provider Payment System Merchant Account

Credit Card and Online/Mobile Payment Encryption Target and Neiman Marcus https://www.bing.com/images/search?view=detailV2&ccid=pURgW0Rk&id=620286F031608CE19384D0018260521F9660207B&thid=OIP.pURgW0Rk9GH06lRpS2dsyAHaF7&mediaurl=http%3a%2f%2fwww.waronidtheft.org%2fwp-content%2fuploads%2f2016%2f07%2fchild-id-theft.png&exph=554&expw=692&q=child+identity+theft&simid=608039209994947322&selectedIndex=0 19

Credit Card and Online/Mobile Payment Encryption Credit Card Encryption Demonstration What is encryption? https://www.youtube.com/watch?v=Xw0oR66MqaU

Credit Card and Online/Mobile Payment Encryption Credit Card Encryption Demonstration What is tokenization? https://www.youtube.com/watch?v=iVeenkfa-0s&t=9s

Summary What can YOU do to help protect your identity and data online? https://www.bing.com/images/search?view=detailV2&ccid=lJTR50ot&id=A566E6E2AE7E3F0B73577A1EFF1EF1EEEC3636C8&thid=OIP.lJTR50otqO-40gqqiHxcwQHaFj&mediaurl=https%3a%2f%2fi.ytimg.com%2fvi%2fUc6KIXKMmW4%2fhqdefault.jpg&exph=360&expw=480&q=mincraft+hacks&simid=608033016604200542&selectedIndex=2 Knowledge is power! Keep your computer up-to- date! Use strong passwords 22

Any questions?

Resources https://searchsecurity.techtarget.com/magazineContent/Secure-online-payment-system-requires-end-to-end-encryption https://en.wikipedia.org/wiki/Payment_card#Credit_card https://www.wthr.com/article/targeting-children-the-young-victims-of-identity-theft https://www.lifelock.com/learn-identity-theft-resources-teens-risk-identity-theft.html https://www.businessinsider.com/playstation-network-allegedly-hacked-ourmine-2017-8 https://www.wildapricot.com/articles/online-payment-services https://www.theguardian.com/technology/2011/apr/26/playstation-network-hackers-data https://www.dailymail.co.uk/sciencetech/article-2920222/Minecraft-hacked-Cyber-criminals-leak- hundreds-login-details-pocket-expert-warns.html https://www.usatoday.com/story/news/nation/2014/01/09/encrypted-chips-help-fight-credit-card- fraud/4400347/ https://www.youtube.com/watch?v=iVeenkfa-0s https://www.kiplinger.com/article/credit/T048-C011-S001-6-ways-you-invite-hackers-to-steal-your- personal-i.html https://fossbytes.com/what-is-social-engineering-types-techniques/ https://www.csoonline.com/article/3155397/security/esea-hacked-1-5-million-records-leaked-after- alleged-failed-extortion-attempt.html https://www.pciblog.org/credit-card-processing-explained/ https://www.securityweek.com/target-confirms-point-sale-malware-was-used-attack