Identity Theft By Omer Ersen.

Slides:



Advertisements
Similar presentations
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
Advertisements

What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Identity Theft:“Taking on another person’s persona for illegal purposes. Usually includes the use of Social Security.
Identity Theft How it happens and how to avoid it.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Identity Theft One of America's fastest growing crimes.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Cybersecurity Test Review Introduction to Digital Technology.
Identity Theft!!! Bill Ketjen Matt Grodhaus Two forms of crime IDENTITY THEFT  Using personal information for deception IDENTITY FRAUD  Using personal.
IDENTITY THEFT. WHAT IS IDENTITY THEFT? Identity theft refers to stealing someone else’s personal information in order to obtain credit or other benefits.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Protecting Your Identity From Fraud Clarissa Goins, VP Compliance Karen Osterhoudt, VP Operations.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Identity Thefts: Opinion of the Lithuanian Population Dr. Zita Čeponytė 1.
Protecting Your Assets By Preventing Identity Theft
IDENTITY THEFT.
Identity Theft It’s a crime!
Identity Theft Chelsea Weser.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Scams & Schemes Common Sense Media.
Learn how to protect yourself against common attacks
Attention Identity theft Definition
IT Security  .
Digital Citizenship Middle School
Social Engineering Charniece Craven COSC 316.
Protecting Your Identity:
Lesson 3 Safe Computing.
How to Protect Yourself from ID Theft and Social Engineering
Information Security 101 Richard Davis, Rob Laltrello.
IDENTITY Theft Financial Literacy Identity Theft.
Lesson 2- Protecting Yourself Online
When you get caught for Identity Theft
Protecting Your Personal Information
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Cybersecurity and Personal Finance
Bethesda Cybersecurity Club
Lesson 2- Protecting Yourself Online
“Credit score vocabulary”
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Identity Theft and Credit Safety
Presentation transcript:

Identity Theft By Omer Ersen

What is it The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases.

What types of Identity Theft are there? Criminal identity theft (posing as another person when apprehended for a crime) Financial identity theft (using another's identity to obtain credit, goods and services) Identity cloning (using another's information to assume his or her identity in daily life) Medical identity theft (using another's identity to obtain medical care or drugs)

More in depth Criminal identity theft Giving a false name or fake ID when questioned by the cops. Victims may not know that their name was given during the incident

Financial identity theft What you are a costumed to when dealing with Identity Theft. Includes attackers getting credit card numbers, bank account numbers, and other information to obtain goods. Goods can be physical or can be things like loans, and credit scores to be able to buy something

Identity cloning Impersonating someone to conceal Identity either to remain hidden or for their ammusment. Ex- Catfishing, illegal immigrants.

Medical identity theft Used by people trying to obtain medical care using someone’s else's identity. Usually for treatment that is too expensive, and for people who don’t have insurance According to Ponemon Institute's “2013 Survey on Medical Identity Theft

So why do we care Growing at an unbelievable rate Use of technology (online banking, online shopping) If we do not educate people about the problem and teach them how to protect themselves then the numbers will only rise.

Statistics Done by the U.S. Department of Justice For Individuals

So how do Attackers obtain information? Two ways Physically obtaining your information Through electronics. The norm now

Physically Some examples of physically obtaining your information are Dumpster diving “preapproved” credit cards from the mail Stealing it directly from your possession Obtaining storage devices that still have information on them

Through electronics Using malware to obtain information from your electronics. Ex Keystroke Trojans and spyware Obtaining information from Social Media Impersonating trusted organizations in emails Fake WI-FI spots

Fake Wi-Fi Usually at public places like Hotels, conventions, and bars The Wi-Fi looks legitimate but it is not Used to obtain username and passwords Can obtain bank/ credit information if a user logs in or uses there credit card using the fake Wi-Fi spot

Impersonating trusted organizations in emails/ Early internet Infamous 419 scam Spam mail was sent to potential victims stating that a Nigerian Prince has a huge fortune coming his way but he needs an upfront deposit first and he is willing to split the fortune with you if you agree to pay some cash

Impersonating trusted organizations in emails/ Modern internet This scam should have never worked but apparently it did What is used today- Receive an email from your bank saying there is a security breach and you must change your password. Email looks legit and looks exactly like emails you have received in the past

Obtaining information from Social Media Social Media has exploded over the last couple of years Attackers use social media to obtain information that can help them break into your accounts They scan for information that can help them answer the “forgot password” hint

Malware Attackers can obtain information through different types of malware Keylogger Trojan-tracks what keys you have pressed Spyware- Software that gathers information from an infected machine without the user knowing

So what to do if you believe you are a victim According to the Federal Trade Commission 3 steps Place an initial Fraud Alert- Place alert for free at 1 of the three National credit reporting companies(Equifax, Experian, and TransUnion) Order your Credit Reports-Get a free credit report from each of the credit reporting companies Create an Identity theft Report- To help recover from the theft

Protection Antivirus Systems on your electronics can help against malware Proper disposal of documents(where you discard them and how you destroy documents) Caution against phishing scams Identity theft protection services

Identity theft protection services Top Identity theft protection Services of 2013