Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
There are different threats and impacts that affect an organisation. Threats are things that the organisation will get attacked by so for example viruses.
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protecting Your Identity: What to Know, What to Do.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Chapter 10 Crimes Against Property. How has our society developed techniques or habits that have lowered the number of property related crimes?
1 Credit card operation and the recent CardSystems incident HONG KONG MONETARY AUTHORITY 4 July 2005.
1Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used with permission. Propaganda Graphic Design & Illustration.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Chapter 11 Security and Privacy: Computers and the Internet.
General Awareness Training
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
Unethical use of Computers and Networks
By: Tina Hill.  This is the unwritten rules of the different media sites on the internet.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Identity Theft.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Topic 5: Basic Security.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
By: Asfa Khan and Huda Mukhtar
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Issues for Computer Users, Electronic Devices, Computer and Safety.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Identity:
Five Unethical Uses of Computers
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White

Agenda Violation of Privacy Identity Theft Storage of Inaccurate Information Propaganda Credit Card Fraud

Violation of Privacy

Definition Privacy in Information Technology refers to the right of individuals to determine what information is stored about them and how that information should be used. Violation of Privacy is to breach the boundaries and content of information that is considered private to an individual or group.

Breach of Information Organizations such as businesses and government bodies, hold private information on individuals, which are given to them for specific purposes. Information given is often times personal &/ sensitive, such as a person’s religion, political affiliation or personal activities. Breach of such information can cause: Defamation of character Identity theft Discrimination Personal embarrassment Damage to one’s professional reputation

Identity theft  It is a crime used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits.  The person whose identity is used can suffer various consequences when he or she is held responsible for the perpetrator's actions.

 Identity theft can happen : when a criminal uses stolen or fake documents to open an account in someone else's name. when a criminal tries to take over another person's bank or credit card account, first by gathering information about the intended victim, then contacting their card issuer masquerading as the genuine cardholder

Storage of Inaccurate Information

Due to the increase of computers, expansion of the internet and World Wide Web applications it is extremely important that information be stored accurately. Data Integrity concerns the accuracy of data. Data is said to be accurate when it enters a system and does not become inaccurate after processing.

Corruption of Data  Stored Data becomes corrupted when it is changed, deleted or substituted without authorization. Data becomes inaccurate when it is compromised in the following ways: 1.Through human error 2.Natural Disasters 3.Worms and Viruses 4.Hardware malfunctions 5.Fraud 6.Malicious deletion or changing of data

PROPAGANDA

Propaganda Propaganda is the dissemination of information aimed at influencing the opinions or behaviors of people. As opposed to impartially providing information, propaganda in its most basic sense, often presents information primarily in order to influence its audience.

Types of Propaganda  Assertion  Bandwagon  Card Stacking  Glittering Generalities  Lesser of Two Evils  Pinpointing the enemy  Plain Folks  Simplification (Stereotyping)  Testimonials  Transfer  Name Calling

Credit Card Fraud

Credit card fraud  It is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction.  The purpose may be to obtain goods without paying.  It is only after the billing cycle of the relevant credit card is completed, that the legitimate cardholder may become aware of the unauthorised transaction.

 There are various means by which these numbers can be obtained:  From a credit card generator site on the Internet  From an unscrupulous retail merchant who retains credit card numbers processed through a retail outlet and uses them unlawfully  From offenders who utilise skimming machines to record multiple credit card numbers via retail outlets  From sourcing discarded copies of credit card vouchers via waste receptacles  From hacking into computes where credit card numbers are stored