9.4M online U.S. adults were victimized by identity theft in year ending April 2004 –Losses amounted to $11.7 billion Online theft is escalating The solution.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

The ABCs of Credit Card Finance Essential Facts for Students 2007 Carol A. Carolan, Ph.D.
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Banking. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Let’s Get Financially Focused! Objectives Students will be able to: 1. Define credit. 2. Explain the negative impact that counterfeiting, forgery, fraud,
Payments in E-Commerce Presentation to Conference on Entrepreneurship and E-Commerce Oklahoma City, OK by Richard J. Sullivan Payments System Research.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Consumer Authentication in e-Banking & Part 748 – Appendix B Response Program Catherine Yao Information Systems Officer NCUA.
Oklahoma’s Personal Financial Literacy Passport © Oklahoma State Department of Education. All rights reserved. 1 Teacher Presentation Series 9 Standard.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
FDIC Money Smart for Young Adults
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Electronic Transaction Use & Risk of Identity Theft.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
April 25, 2014 Entry task: What does APR stand for? What does it mean? Target: Select a credit card based on terms and conditions.
The ABCs of Credit Card Finance Essential Facts for Students 2010 Carol A. Carolan, Ph.D.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
7.3 Protect your Identity Objective: Understand the importance of managing and protecting your personal credit….
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Identity Theft How it happens and how to avoid it.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Langara College PCI Awareness Training
November 20, 2015 Entry task: List two do’s and two don’ts for credit card use. Target: Identify how to use credit cards properly to establish good credit.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft Project By: Timmy Townsend And Eric Fields.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
By: Micah Stevens Identity Theft in the World Today.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Protecting Your Assets By Preventing Identity Theft
Banking.
April 17, 2015 Entry task: What does APR stand for? What does it mean?
Who Uses Encryption? Module 7 Section 3.
Protecting Your Identity
“Credit score vocabulary”
Tip of the Day!.
2019 AFP Payments Fraud & Control Survey
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

9.4M online U.S. adults were victimized by identity theft in year ending April 2004 –Losses amounted to $11.7 billion Online theft is escalating The solution revolution: –ISPs will provide automated desktop protection tools –Holistic back-end fraud detection systems will roll out to U.S. FIs –By YE 2006, more than 2 million U.S. consumers will use strong two-factor authentication to access their accounts at leading Web sites (0.6 probability). The Escalation of Online Fraud Will Lead to a Solution Revolution

Source: U.S. Attorney's Office, Philadelphia Drug Lords Turn to Identity Theft and Exploit Insiders Identity Theft Crime Ring Manufacturer Concierge Insider (e.g., teller) Crack addicts

More-technically sophisticated hackers More account takeovers More electronic data = bigger thefts Checking account fraud increasing –successful credit card fraud decreasing New-account fraud attacks shifting to smaller lenders –thieves opening small business accounts More consumer awareness: Some consumers claim ID theft rather than pay debt Troublesome Trends

Consumers typically discover Fraud on their own Fraud Top ways consumers discovered fraud New-account fraud Denied credit, Saw charge on credit card statement Check forgery Saw charge on check account statement Unauthorized DDA transfers Saw charge on check account statement Credit card purchases Saw charge on credit card statement Credit card cash advances Card company called Saw charge on credit card statement

Strategic Planning Assumption Credit issuers will misclassify more than 60 percent of identity theft as credit loss in 2006 (0.6 probability).

What Worried Consumers Want From Service Providers for Added Security Not at all Desirable Extremely Ask me questions online that only I can answer when logging in Authenticate themselves to me; for example, with shared secret message Use separate device, such as cell phone or card for online account access 3.6 Give me program to download that prevents hacker from intercepting 2.6 Base: 5,000 online U.S. consumers; those who are very worried about security (April 2004) What would you like your online service provider to do to improve the security of your information? Make service provider legally responsible for strict security measures

Strategic Planning Assumption If phishing antidotes are not implemented, consumer trust will erode and annual U.S. e-commerce growth will slow to 10 percent or less by 2007 (0.6 probability).