Identity Theft and Online Identity Solutions Heidi Inman May 29, 2008.

Slides:



Advertisements
Similar presentations
The Hidden Costs of Identity Theft on American Business.
Advertisements

Report: ID theft claims 27 million victims over last 5 years WASHINGTON - More than 27 million people have been victims of identity theft in the last five.
By Andy Scott, Michael Murray and Adam Kanopa
CYBER CAFÉ VISITOR TRACKING SYSTEM A Comprehensive Portal for Tracking Cyber Café Visitors.
Introduction and Overview of Digital Crime and Digital Terrorism
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Identity Theft By: Caroline Branton, Laura Hunter, Sinead McFarlane.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Security, Privacy, and Ethics Online Computer Crimes.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Your Identity While Attending College.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
Jeopardy Depository Institutions Smart Goals Identity Theft Basics of Taxes Savings Tools Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Unethical use of Computers and Networks
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT OCCURS WHEN A CRIMINAL USES ANOTHER PERSON'S PERSONAL INFORMATION TO TAKE ON THAT PERSON'S IDENTITY. IDENTITY THEFT IS MUCH MORE THAN MISUSE.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Kelly Herd Rebecca Hofeling IDENTITY THEFT AND PROTECTION Communication 2500.
Identity Theft:“Taking on another person’s persona for illegal purposes. Usually includes the use of Social Security.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
By: Asfa Khan and Huda Mukhtar
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Computer crimes.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
INTRODUCTION & QUESTIONS.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Issues for Computer Users, Electronic Devices, Computer and Safety.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
IRS Resources for Payroll Professionals & IRS Combats ID Theft with the Help of Payroll Professionals June 16, 2016 Nora Huffman.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Identity Theft It’s a crime!
Identity Theft Chelsea Weser.
Add video notes to lecture
Antisocial use of ICT and Computer Fraud
IT Security  .
Own Your Identity.
Own Your Identity.
“Credit score vocabulary”
Identity Theft By Omer Ersen.
Presentation transcript:

Identity Theft and Online Identity Solutions Heidi Inman May 29, 2008

Identity Theft Defined Fraud that involves stealing money or getting other benefits by pretending to be someone else. Fraud that involves stealing money or getting other benefits by pretending to be someone else. The term is relatively new and is actually a misnomer, since it is not possible to steal an identity, only to use it. The term is relatively new and is actually a misnomer, since it is not possible to steal an identity, only to use it.

Types of Identity Theft Financial Identity Theft – using anothers identity to obtain goods/services Financial Identity Theft – using anothers identity to obtain goods/services Criminal Identity Theft – posing as another when apprehended for a crime Criminal Identity Theft – posing as another when apprehended for a crime Identity Cloning – using anothers information to assume his or her identity in daily life Identity Cloning – using anothers information to assume his or her identity in daily life Business/Commercial Identity Theft – using anothers business name to obtain credit Business/Commercial Identity Theft – using anothers business name to obtain credit

Techniques for Obtaining Personal Information Researching about the victim in government registers, internet search engines, or public record search services Researching about the victim in government registers, internet search engines, or public record search services Stealing personal information in computer databases (Trojan horses, hacking) Stealing personal information in computer databases (Trojan horses, hacking) Phishing - Impersonating a trusted company/institution/organization in an electronic communication to promote revealing of personal information Phishing - Impersonating a trusted company/institution/organization in an electronic communication to promote revealing of personal information

Techniques for Obtaining Personal Information Cont. Browsing social net sites such as MySpace and Facebook for personal details that have been posted by users Browsing social net sites such as MySpace and Facebook for personal details that have been posted by users Remotely reading information from an RFID chip on a smart card, RFID-enabled credit card, or passport Remotely reading information from an RFID chip on a smart card, RFID-enabled credit card, or passportRFID

Actions taken by the United States Identity Theft and Assumption Deterrence Act Identity Theft and Assumption Deterrence Act Makes the possession of any means of identification to knowingly transfer, possess, or use without lawful authority a federal crime. Makes the possession of any means of identification to knowingly transfer, possess, or use without lawful authority a federal crime. Punishment can be up to 5, 15, 20, or 30 years in federal prison, plus fines, depending on the exact crime. Punishment can be up to 5, 15, 20, or 30 years in federal prison, plus fines, depending on the exact crime. Gives the Federal Trade Commission authority to track the number of incidents and the dollar value of losses. Gives the Federal Trade Commission authority to track the number of incidents and the dollar value of losses.

FTC Stats ID Theft is fastest growing crime in America ID Theft is fastest growing crime in America 2003 estimate was that identity theft accounted for $52.6 billion of losses in the preceding year alone 2003 estimate was that identity theft accounted for $52.6 billion of losses in the preceding year alone Affected more than 9.91 million Americans Affected more than 9.91 million Americans Average fraud per person rose from $5,249 in 2003 to $6,383 in 2006 Average fraud per person rose from $5,249 in 2003 to $6,383 in 2006 Average amount of time spent by victims resolving the problem is about 40 hours Average amount of time spent by victims resolving the problem is about 40 hours

Fighting Identity Theft Single Sign-On (SSO) – a method of access control that enables a user to authenticate once and gain access to the resources of multiple software systems. Single Sign-On (SSO) – a method of access control that enables a user to authenticate once and gain access to the resources of multiple software systems. Single Sign-Off – the reverse process whereby a single action of signing out terminates access to multiple software systems. Single Sign-Off – the reverse process whereby a single action of signing out terminates access to multiple software systems.

Implementations of Single Sign-On Windows Live (Originally.NET Passport) – developed and provided by Microsoft Windows Live (Originally.NET Passport) – developed and provided by Microsoft Allows users to log in to many websites using one account Allows users to log in to many websites using one account Hotmail Hotmail SAML (Security Assertion Markup Language) – used for Google Applications SAML (Security Assertion Markup Language) – used for Google Applications Gmail Gmail

Challenges and Advantages to Single Sign-On Biggest challenge is getting long-time users whove customized their own links and methods for accessing online services to change. Biggest challenge is getting long-time users whove customized their own links and methods for accessing online services to change. Advantages include reducing the amount of internal fraud by malicious employee contact, convenience of password access, security on all levels of entry/exit/access to systems, and centralized reporting for compliance adherence. Advantages include reducing the amount of internal fraud by malicious employee contact, convenience of password access, security on all levels of entry/exit/access to systems, and centralized reporting for compliance adherence.

Real ID Act Real ID Act National ID Cards – electronically readable, federally approved ID cards for Americans. National ID Cards – electronically readable, federally approved ID cards for Americans. If you live or work in the United States, youll need a federally approved ID card to travel on an airplane, open a bank account, collect Social Security payments, or take advantage or nearly any government service. If you live or work in the United States, youll need a federally approved ID card to travel on an airplane, open a bank account, collect Social Security payments, or take advantage or nearly any government service.

National ID Card What will be stored on this card? What will be stored on this card? Name Name Birth Date Birth Date Sex Sex ID Number ID Number Digital Photograph Digital Photograph Address Address Common Machine-Readable Technology Common Machine-Readable Technology

National ID Card cont. Positives Positives Reduce Fraud Reduce Fraud Combat Terrorism Combat Terrorism Improve Airline Security Improve Airline Security Negatives Negatives Potential to be misused by thieves with RFID readers Potential to be misused by thieves with RFID readers Could promote irresponsible national behavior Could promote irresponsible national behavior

Open ID Open ID Better way to identify a person/organization on the internet. Better way to identify a person/organization on the internet. A shared identity service. A shared identity service. Allows Internet users to log on to many different web sites using a single digital identity. Allows Internet users to log on to many different web sites using a single digital identity. Eliminates the need for a different user name and password for each site. Eliminates the need for a different user name and password for each site. Lets users control the amount of personal information they provide. Lets users control the amount of personal information they provide.

Sources "SAML Single Sign-On (SSO) Service for Google Apps". 5/28/2008. "SAML Single Sign-On (SSO) Service for Google Apps". 5/28/2008. "Windows Live ID". 5/28/2008. "Windows Live ID". 5/28/2008. "Single Sign-On". 5/23/08. "Single Sign-On". 5/23/08. Christopher, Dawson. "Single signon portal makes sense for university". ZDNet Education. 5/23/08. Christopher, Dawson. "Single signon portal makes sense for university". ZDNet Education. 5/23/08. "Identity Theft". 5/23/08. "Identity Theft". 5/23/08. "REAL ID Act". 5/28/08. "REAL ID Act". 5/28/08. Jon, Oltsik. "An easier identity solution". CNET News.com. 5/27/08. Jon, Oltsik. "An easier identity solution". CNET News.com. 5/27/08. Declan, McCullagh. "FAQ: How Real ID will affect you". CNET News.com. 5/27/08. Declan, McCullagh. "FAQ: How Real ID will affect you". CNET News.com. 5/27/08. Declan, McCullagh. "National ID cards on the way?". CNET News.com. 5/27/08. Declan, McCullagh. "National ID cards on the way?". CNET News.com. 5/27/08. "OpenID". 5/28/08. "OpenID". 5/28/08.