Computer Fraud, Identity Theft, and Computer Forensics How not to be a victim Presented by Scott R. Ellis Manager, Forensic and Litigation Technologies.

Slides:



Advertisements
Similar presentations
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Advertisements

Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Modules 9.1.  When someone knowingly deceives you for their own personal gain.  They convince you that something is true when it isn’t.  They make.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Phishing on the Internet? Presented by Naveed Farooq Naveed Farooq Admin Nidokidos Network Make Money Online | Join Nidokidos Forum |
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
David Abarca, Instructor Del Mar College Computer Corner Protect Your Identity.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Identity Theft: Protect Yourself By Rachel Gaines.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
Information Security Sharon Welna Information Security Officer.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
By: Asfa Khan and Huda Mukhtar
Identity Theft How it happens and how to avoid it.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Identity Theft: Protect Yourself Ronald J. Leach.
Computer Security Keeping you and your computer safe in the digital world.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Personal spaces.
Protecting Yourself from Fraud including Identity Theft
Internet Safety By: Ayana Shiggs.
Internet Safety By: Ayana Shiggs.
Presentation transcript:

Computer Fraud, Identity Theft, and Computer Forensics How not to be a victim Presented by Scott R. Ellis Manager, Forensic and Litigation Technologies Practice

Computer Fraud and Identity Theft What is Identity Theft Victim v. Opponent What is an Opponent? The Old Tricks You’ve been Hacked What NOT to Do What TO Do Checkmate Contact Info

What is Identity Theft? Your identity Your money Financial loss Loss of standing LOSS is key – Identity Use is another story

Computer Fraud and Identity Theft What is Identity Theft Victim v. Opponent What is an Opponent? The Old Tricks You’ve been Hacked What NOT to Do What TO Do Checkmate Contact Info

Victim v. Opponent Qualities of a victim: – Inexperienced user – Experienced user – Suspecting/unsuspecting Users – Insecure system – Secure system – Access to – Uses online banking or other common services – Any type of person! (except maybe one)

Computer Fraud and Identity Theft What is Identity Theft Victim v. Opponent What is an Opponent? The Old Tricks You’ve been Hacked What NOT to Do What TO Do Checkmate Contact Info

Qualities of an Opponent – Doesn’t want you to know about him. – The bigger the trick and the older the trick the easier it is to pull. There are two reasons this works. – Wants to reassure you, wants you to feel safe. – The more sophisticated the game, the more sophisticated the opponent. – He is generous (seemingly). – When you question it, you will question yourself. YOU can’t be wrong, right?

Computer Fraud and Identity Theft What is Identity Theft Victim v. Opponent What is an Opponent? The Old Tricks You’ve been Hacked What NOT to Do What TO Do Checkmate Contact Info

The Old Tricks The Mole – The Mole Might be Your Mother (or mine!)

The Nigerian How you can get a million dollars for a small investment of $4,000? Bait and Switch Check the URL! Boiler Room (Do they even know the depth of the con?) Cross Site Scripting The power or right clicking on links Power of look-alike pop-ups

Methods of the “Modern” Trick When you are being victimized: – In every con there is a victim and an opponent. – The more control you think you have, the less you have. – You will be fed pieces. (Something free). – You will have likely installed the malware on your computer yourself, knowingly and willingly. – The opponent will have complete control of the environment. – Checkmate. When it comes you will know it.

Method (continued) Your weakness will be located with the following “tricks”: – Searches – Banner ads – Pop-ups – s from people you know -- enough spam to enough people, will trigger a response – Certified letters – (eventually one will compel you)

Computer Fraud and Identity Theft What is Identity Theft Victim v. Opponent What is an Opponent? The Old Tricks You’ve been Hacked What NOT to Do What TO Do Checkmate Contact Info

You’ve been Hacked How do you know? Symptoms: – Erratic Behavior – windows closing, software that won’t start, antivirus stops functioning or won’t update, etc… – Errors at unusual times – Long boot up times Poison Ivy – complete system control, microphone, webcam control, desktop access. Undetectable root kits. Metasploit – allows hackers to generate payloads in many formats. DNS Poisoning: – Used to replace content for a set of victims – Replaces it with the opponents own, malicious web site SQL Injection

Computer Fraud and Identity Theft What is Identity Theft Victim v. Opponent What is an Opponent? The Old Tricks You’ve been Hacked What NOT to Do What TO Do Checkmate Contact Info

What NOT to Do Do not Panic. Stay Calm. Do not continue to use the computer for transactions. In certain situations, do not even reboot. Do not call me (unless you want a forensic investigation of the incident!) If an identity of the opponent is involved, do not attempt to initiate contact. Do not think the problem will go away.

Computer Fraud and Identity Theft What is Identity Theft Victim v. Opponent What is an Opponent? You’ve been Hacked What NOT to Do What TO Do Checkmate Contact Info

What TO Do Call your credit card companies. All of them. Be Honest. “Yes officer, I really did believe I could help this man retrieve his lost fortune and make a nice commission for myself in the process by simply depositing $4000 in his checking account.” EVERY DETAIL HELPS They just might know his MO. Report cybercrime to cybercrime.gov Learn to be safe.

Credit Reporting Agencies (notice “free credit report”.com is not one of them) TransUnion Fraud Victim Assistance Department Phone: Equifax Consumer Fraud Division Phone: or: Experian Experian's National Consumer Assistance Phone:

Computer Fraud and Identity Theft What is Identity Theft Victim v. Opponent What is an Opponent? You’ve been Hacked What NOT to Do What TO Do Checkmate Contact Info

Checkmate Don’t live in fear. Be Safe – Don’t Click on anything. The Hardest Person to Con? The most difficult person to con is an honest one. The honest person believes in working for his reward. Nothing worth having is free. But just because you are honest doesn’t mean you will win at chess!

Contact Info For a copy of this presentation and other articles published by Scott Ellis, please contact him at: