Facts, Issues, and Considerations 7 May 2008 Steven Barnett Identity Theft.

Slides:



Advertisements
Similar presentations
Identity Theft and Online Identity Solutions Heidi Inman May 29, 2008.
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
My Name is Todd Davis My Social Security # is
What is Identity Theft, and how can you protect yourself from it?
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
Parachute Neighborhood Watch Presentation February 9, 2010.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
Lesson 8.5 Identity Theft July 2011Copyright © … REMTECH, inc … All Rights Reserved1 Introduction Identity theft occurs when someone steals some.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft. MIS Training Institute, Inc.Section X - Slide 2CS1 053 ©Network Security Services, LLC Outline n Definitions n Methods used n Ways to.
PRIORITIES. AARP Tax-Aide Priorities BudgetsTraining E-Filing Reimbursements Security Accuracy Developing Leaders CertificationDonations Recruitment.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Internet Safety Prevents ID Theft Business Law II Chapter 33.
Chapter 1 Introduction to Security
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Ryan Paulsen Chris Lafferty Nilesh Nipane.  Intruders gained access to credit card information between  ~50 million credit card and debit.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Electronic Transaction Use & Risk of Identity Theft.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
IDENTITY THEFT By: Jessica Rodriguez. Info on Identity Theft Identity theft is the fastest growing crime in the USA. The number of cases nationwide in.
Scams & Schemes Common Sense Media.
Theft at Target Leads Citi to Replace Debit Cards By NATHANIEL POPPER Citibank plans to reissue all customer debit cards involved in the data breach at.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Unethical use of Computers and Networks
Identity Theft Philippa Lawson Canadian Internet Policy and Public Interest Clinic University of Ottawa
Protecting Yourself Against Identity Theft By Sierra Monif Next.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
Identity Theft Project Erin L. Caraway Jacob Locke.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
By: Asfa Khan and Huda Mukhtar
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Identity Theft How it happens and how to avoid it.
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
You. are at risk for the fastest growing crimes crime.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Introduction to Bank Accounts. Questions? Why do some people choose not have a bank account? What are some advantages to having a bank account? What is.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
1 Identity Theft Prevention and the Red Flag Rules.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Breach Products & Services NASPO ValuePoint Master Agreement MA
PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE
Combating Identity Fraud In A Virtual World
Mrs. Esman Computer Special
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Protecting What’s Yours: Your Identity
Document verification and identity management
Jack J. Bensimon Countering Identity Theft and Synthetic Identities:
JP Morgan spends $500 million per year on cyber security
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Millions of T-Mobile customers exposed in Experian breach
Protecting Yourself from Fraud including Identity Theft
Technology Mrs. Huddleston
“Credit score vocabulary”
Credit Card Myths By: Aimee Tripp Hour 2.
Presentation transcript:

Facts, Issues, and Considerations 7 May 2008 Steven Barnett Identity Theft

Identity Theft Facts Victims: 8.4 million Total Loss: $49.3 billion Average Loss: $5,720 Average Resolution Time: 25 hours 2007 Identity Fraud Survey Report Javelin Strategy and Research

Case Study: TJX Largest theft ever of credit card numbers >45 million CC numbers collected over 18-month period, k+ driver’s licenses, SSNs also stolen Potential losses: >$300 million Will take years to discover actual damage The Wall Street Journal May 4, 2007

Case Study: TJX Cause: insecure wireless network in a Marshalls' store in St. Paul, Minn. WEP (Wired Equivalent Privacy) protocol Unencrypted transmissions to banks Missing software patches and firewalls The Wall Street Journal May 4, 2007

ID Theft Laws 1998: Identity Theft and Assumption Deterrence Act 2004: Identity Theft Penalty Enhancement Act 2005: REAL ID Act 1998: H.R.4151 [105th] 2004: H.R.1731 [108th] 2005: H.R.1268 [109th]

REAL ID Analysis Drivers license to have full name, DOB, gender, license number, photo, address, signature, machine-readable technology Database which all other states can access Information includes all of above, plus SSN, driver record H.R.1268 [109th]

REAL ID Analysis Potential ID theft: shared database Multiple access points = multiple vulnerabilities Case in point: TJX

REAL ID Analysis Potential ID theft: extensive info on cards Gives thieves everything they need Machine-readable = easy to steal data RFID

Summary ID theft is still a major problem Technology is a major potential attack vector Government is attempting to minimize ID theft At the same time, introducing laws that might increase it