IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
SECURITY CHECK Protecting Your System and Yourself Source:
Protecting Your Identity: What to Know, What to Do.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
Consumer Issues Chapter 28.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Ethical Hacking by Shivam.
Identity Theft Both Offline And Online It’s Not New Just Easier…
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Opening a bank account.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
IDENTITY THEFT By: Jessica Rodriguez. Info on Identity Theft Identity theft is the fastest growing crime in the USA. The number of cases nationwide in.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Consumer Protection Shop Safely and Guard Your Financial Information.
By: Asfa Khan and Huda Mukhtar
Identity Theft How it happens and how to avoid it.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
Society & Computers PowerPoint
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Identity Theft!!! Bill Ketjen Matt Grodhaus Two forms of crime IDENTITY THEFT  Using personal information for deception IDENTITY FRAUD  Using personal.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
Computer Security Keeping you and your computer safe in the digital world.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Lesson 10A: The Three D’s of Identify Theft
Done by… Hanoof Al-Khaldi Information Assurance
Mr. Roeshink – Financial Operations
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Your Identity
Identity Theft Samuel H. Slater.
Presentation transcript:

IDENTITY THEFT By Deshano Dottery

FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year Resulting in 50 billion dollars a year in losses and damages Resulting in 50 billion dollars a year in losses and damages 16.6 million victims in 2012 alone 16.6 million victims in 2012 alone

PLACES OF VULNERABILITY Gas station pumps Gas station pumps Atm Machines Atm Machines Credit card Scanners Credit card Scanners

TARGETED DEVICES Computers Computers Mobile smart phones Mobile smart phones Both of which store personal information that are susceptible to viruses that still information Both of which store personal information that are susceptible to viruses that still information

OTHER RISK FACTORS Opening up suspicious s Opening up suspicious s Looking at certain websites Looking at certain websites Giving out Social Security number Giving out Social Security number Shopping online on unsecure websites or sharing personal info on social media sites Shopping online on unsecure websites or sharing personal info on social media sites Discarding bills in the trash with personal information vs shredding them Discarding bills in the trash with personal information vs shredding them

KEEPING SAFE Only give social security info when absolutely necessary Only give social security info when absolutely necessary Use cash vs plastic when able to Use cash vs plastic when able to Protect your pc and mobile device with antivirus software Protect your pc and mobile device with antivirus software Never open up suspicious links Never open up suspicious links Be careful not to share to much personal info on social networking sites Be careful not to share to much personal info on social networking sites

CONCLUSION Identity theft is a problem that will only get worse as technology continues to advance and our society continues to become increasingly digital Identity theft is a problem that will only get worse as technology continues to advance and our society continues to become increasingly digital Its important to make sure that people take the proper precautions to protect their identity, and the lively hood that they work hard for everyday, and not fall victim to cowardly predators who aim to steal it away. Its important to make sure that people take the proper precautions to protect their identity, and the lively hood that they work hard for everyday, and not fall victim to cowardly predators who aim to steal it away.