CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Identity Theft Ta’Mar Boyd Adam Devin. What is Identity Theft  Identity theft occurs when someone uses your personally identifying information, like.
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Identity Theft The Nation’s Fastest Growing Crime.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Jeff loses his identity! Lesson 8: Identity Theft.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Issues for Computer Users, Electronic Devices, Computer and Safety.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Protecting Your Assets By Preventing Identity Theft
Hotspot Shield Protect Your Online Identity
IT Security  .
Personal spaces.
Protecting Your Identity:
When you get caught for Identity Theft
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Identity Theft Samuel H. Slater.
Presentation transcript:

CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003

Contents  What is Internet Identity Theft?  Technology  How hackers obtains our information  Why Internet ID theft is used?  Recent Talk  Social issues  How to protect yourself  Impact on Society  Conclusion

 Internet Identity Theft: Unauthorized persons wrongfully obtain and use another person's personal data.  The victim does not know!  Greed/desire drives identity theft.  Instant, anonymous, and worldwide reach of the Internet allows identity thieves to thrive and hide more efficiently. What is Internet Identity Theft???  FBI calls internet identity theft one of the fastest growing global crimes of fraud and fastest growing global crimes of fraud and deception! deception!  500,000 to 700,000 Americans become internet identity theft victims each year. internet identity theft victims each year.

Technology  Cookies  Public database access  Multiple users on same machine  Viruses  Software applications  - password crackers - worms  Keyboard loggers  High speed internet

Why is it Used???  New account creation  Obtain credit  Account takeover  accounts/passwords  Transfer money  Apply for loans  Social Security # usage  Especially by college students  Sell personal information  Online purchasing/banking = ECONOMIC GAIN & PERSONAL SATISFACTION FOR THE CRIMINAL

Recent USENET Newsgroup Talk of Internet Identity Theft.....  NY times login and password disputes!  How many people provide correct information?  Creating bogus profile names.  How does one keep track of which names were used for what?  Someone posting highly offensive newsgroup articles using your Internet ID.  Report complaint immediately to FTC! FTC Internet Identity Theft Complaint Form FTC Internet Identity Theft Complaint Form FTC Internet Identity Theft Complaint Form

Social Issues  Loss of reputation  Loss of credit  Major inconvenience Average cost to consumer whose identity is stolen=  Average cost to consumer whose identity is stolen= ~ $6,000+ ~ $6,000+  ~12 months for a victim of identity theft to notice the crime  Major trusting issues -may never establish feeling of privacy again!  Long term affects!  Victims basically need to start all over again.

Some Interesting Stats…..  Internet identity theft is the top complaint filed to the FTC The FTC'S Top 10 Consumer Fraud Complaints

Identity theft= not if but when!!! So protect yourself!!!  Use only one credit card online!  Check Merchant Privacy Policies  Know who/why you are giving information online!  Monitor credit history/reports/bank accounts  Be aware of cookies on computer  Change password regularly  Cautiously receive/send  Be sure to log off after using computers  Clear hard drive when selling/giving away computers  Install computer virus programs/firewalls/spyguard Anti Spyware Software - Detects and eliminates Spy Software

Impact on Society Identity is ones most prized possession  Identity is ones most prized possession  No control over custody of your information!  Banks have no legal responsibility of refunds  Clearing up bad credit reports can cost $500-$1,000  Good cyber security is no longer just self-defense; it helps protect the welfare of us all in our highly connected world. Victims face nightmare of laborious paperwork, lost time, lost money, and stress!

 Technology is advancing, but unfortunately, cyber-crime is advancing right along with it.  Most of us do not know exactly how new technologies actually work= more vulnerability to high-tech thieves.  ID theft protection has become a cold comfort.  Its impact has caused many individuals, businesses, institutions, and organizations problems!  Passing more protection bills and increasing the punishment for committing this crime is a continuous act in progress.  This crime must be contained in the present and stopped in the future!!!!Conclusion

For More Information visit the S&N Inc. site on Internet Identity Theft….. All You Need to Know About Internet Identity Theft

Thanks for your time!!