Download presentation
Presentation is loading. Please wait.
1
Identity Theft Jourdan Hoapili Taylor Cullen Justin Enos
2
The Risk of Credit Cards Definitions of Important Terms Definitions of Important Terms Interest. Interest is the amount Interest. Interest is the amount you pay for using credit. This automatically makes the you pay for using credit. This automatically makes the item more expensive than if you had just paid for it with item more expensive than if you had just paid for it with cash. cash. Revolving Credit. Revolving credit is a type of credit that does not have a fixed number of payments and the customer pays a commitment fee. This can be a very bad type of credit. Revolving Credit. Revolving credit is a type of credit that does not have a fixed number of payments and the customer pays a commitment fee. This can be a very bad type of credit. Overspending. People often use credit to live beyond Overspending. People often use credit to live beyond their means—buying items they simply can’t afford. As their means—buying items they simply can’t afford. As time goes on and the amount they owe grows, it gets time goes on and the amount they owe grows, it gets harder and harder to pay down the balance. harder and harder to pay down the balance. Debt. The amounts you borrow add up to what is called Debt. The amounts you borrow add up to what is called your debt, or the entire amount of money you owe to your debt, or the entire amount of money you owe to lenders. These lenders have legal claims against your lenders. These lenders have legal claims against your future income should you not be able to repay a debt. future income should you not be able to repay a debt. And if you take on too much debt, it can completely And if you take on too much debt, it can completely derail your financial plan—and your future. derail your financial plan—and your future. Identity Theft. Identity theft occurs when someone Identity Theft. Identity theft occurs when someone uses your personal information without your permission uses your personal information without your permission to commit fraud or other crimes. Each time you give out to commit fraud or other crimes. Each time you give out your credit card or Social Security number, you’re at risk your credit card or Social Security number, you’re at risk for someone stealing that information to run up debts in for someone stealing that information to run up debts in your name. your name. The first digit in your credit-card number signifies the system: 3 - travel/entertainment cards (such as American Express and Diners Club) 4 - Visa 5 - MasterCard 6 - Discover Card
3
Important Term Identity Theft Identity theft is when someone uses your social security number, your bank credit card number, your driver's license number or any other form of identity without your knowledge or permission. Identity theft is when someone uses your social security number, your bank credit card number, your driver's license number or any other form of identity without your knowledge or permission.
4
Your Identity Can Be Compromised at the Check Out Stand If you are a consumer, the chances of your credit card number being intercepted as it travels over the Internet is very small. It is actually at a higher risk when you use it in a real life store, as the merchant not only has all of your credit card details, but also a copy of your signature. If you are a consumer, the chances of your credit card number being intercepted as it travels over the Internet is very small. It is actually at a higher risk when you use it in a real life store, as the merchant not only has all of your credit card details, but also a copy of your signature.
5
Statistics The number of US adult victims of identity fraud decreased from 10.1 million in 2003 and 9.3 million in 2005 to 8.9 million in 2006. The number of US adult victims of identity fraud decreased from 10.1 million in 2003 and 9.3 million in 2005 to 8.9 million in 2006. Total one year fraud amount rose from $53.2 billion in 2003 and $54.4 billion in 2005 to $56.6 billion in 2006. Total one year fraud amount rose from $53.2 billion in 2003 and $54.4 billion in 2005 to $56.6 billion in 2006. The mean fraud amount per fraud victim rose from $5,316 in 2003 and $5,993 in 2005 to $6,278 in 2006. The mean fraud amount per fraud victim rose from $5,316 in 2003 and $5,993 in 2005 to $6,278 in 2006. The mean resolution time is at a high of 40 hours per victim in 2006 compared to 28 hours in 2005 and 33 hours in 2003. The mean resolution time is at a high of 40 hours per victim in 2006 compared to 28 hours in 2005 and 33 hours in 2003.
6
Advice - How to minimize your risk of identity theft Never make one-sided assumptions or take things for granted where your identity is concerned. Never make one-sided assumptions or take things for granted where your identity is concerned. Do not throw credit card statements, old credit cards or bank statements, etc. in the trash. Shred them. Do not throw credit card statements, old credit cards or bank statements, etc. in the trash. Shred them. Sign the back of your card as "Check ID". If a store clerk asks to see your card, he or she will check the signature on the back and compare it with some other form of ID you have. Sign the back of your card as "Check ID". If a store clerk asks to see your card, he or she will check the signature on the back and compare it with some other form of ID you have. Create good passwords to minimize your chances of your identity being stolen Create good passwords to minimize your chances of your identity being stolen
7
Stolen wallets, What to do if your credit card is stolen. Make copies of all your credit cards, ID cards and licenses -- everything in your wallet. Make copies of all your credit cards, ID cards and licenses -- everything in your wallet. The second thing to do is call the companies that issued your credit cards to report the theft. The second thing to do is call the companies that issued your credit cards to report the theft. Next, call the three national credit-reporting agencies to report the theft, and ask them to attach a 'fraud alert' to all your credit cards. Next, call the three national credit-reporting agencies to report the theft, and ask them to attach a 'fraud alert' to all your credit cards. Call the police in the jurisdiction where your credit card(s) was stolen to report the theft. Call the police in the jurisdiction where your credit card(s) was stolen to report the theft.
8
Phishing
9
What is phishing? Phishing is the act of using a website to get personal information Phishing is the act of using a website to get personal information It can be very deadly It can be very deadly You won’t know it happened until too late You won’t know it happened until too late Sometimes it’s impossible to detect Sometimes it’s impossible to detect
10
How to prevent phishing Be cautious Be cautious Use a firewall/antivirus Use a firewall/antivirus Avoid online transactions Avoid online transactions
11
If you have been phished: Cancel your credit card Cancel your credit card Call a private investigator to help you track down the phisherman Call a private investigator to help you track down the phisherman There is no guarantee to getting your identity safe once again or even catching the person who your identity There is no guarantee to getting your identity safe once again or even catching the person who your identity The best way to avoid the situation is to be very cautious The best way to avoid the situation is to be very cautious
12
Why be concerned The computer is almost always connected to the internet The computer is almost always connected to the internet Even while not surfing your computer can be automated to do certain things through the use of trojan viruses, like send credit card numbers and passwords to an anonymous email account Even while not surfing your computer can be automated to do certain things through the use of trojan viruses, like send credit card numbers and passwords to an anonymous email account Hackers could target anyone Hackers could target anyone
13
Other things to be concerned about Keyloggers, worms, backdoors, exploits Keyloggers, worms, backdoors, exploits Said objects can ruin you Said objects can ruin you Keyloggers/worms found in trojans Keyloggers/worms found in trojans Backdoors/exploits typically found in new software Backdoors/exploits typically found in new software
14
Mac users: The only reason macs are ‘safer’ than windows at this pint in time is because no hacker cares about them, as the mass consumer product is windows at this moment in time. A british hacker gained full access to a ‘secured’ mac in under an hour, using exploits he found on the spot. He was then awarded $10,000 for exposing the exploit to apple. The only reason macs are ‘safer’ than windows at this pint in time is because no hacker cares about them, as the mass consumer product is windows at this moment in time. A british hacker gained full access to a ‘secured’ mac in under an hour, using exploits he found on the spot. He was then awarded $10,000 for exposing the exploit to apple.
15
PII? Personal Identifiable Information Personal Identifiable Information Individuals name or first Individuals name or first Social security number, access code or password Social security number, access code or password
16
Protection Do not collect and retain PII unless needed Do not collect and retain PII unless needed Keep PII documents in shred bins when no longer needed Keep PII documents in shred bins when no longer needed Encrypt PII on zip drives, etc. Encrypt PII on zip drives, etc.
17
Security Breach of PII Likely to happen if electronic files containing PII are shared Likely to happen if electronic files containing PII are shared Loss of Files with PII Loss of Files with PII Inadvertant disclosure of PII to unauthorized parties Inadvertant disclosure of PII to unauthorized parties
18
Preventing Scams Avoid sites that require information and looksomewhat weird Avoid sites that require information and looksomewhat weird Avoid leaving and inserting your name and PII etc. and keeping your info to yourself Avoid leaving and inserting your name and PII etc. and keeping your info to yourself Keep all information locked. To avoid Trojans etc. Keep all information locked. To avoid Trojans etc.
19
What not to do with your information Store info on a public computer Store info on a public computer Email PII Email PII Scratch paper Scratch paper
20
Sources http://www.privacyrights.org/ar/idtheftsurveys.htm http://www.privacyrights.org/ar/idtheftsurveys.htm http://www.privacyrights.org/ar/idtheftsurveys.htm http://209.85.173.104/search?q=cache:m0O0- VN4GiMJ:www.scambusters.org/creditcard.html+Wha t+to+do+if+your+credit+card+is+stolen.&hl=en&ct =clnk&cd=3&gl=us http://209.85.173.104/search?q=cache:m0O0- VN4GiMJ:www.scambusters.org/creditcard.html+Wha t+to+do+if+your+credit+card+is+stolen.&hl=en&ct =clnk&cd=3&gl=us http://209.85.173.104/search?q=cache:m0O0- VN4GiMJ:www.scambusters.org/creditcard.html+Wha t+to+do+if+your+credit+card+is+stolen.&hl=en&ct =clnk&cd=3&gl=us http://209.85.173.104/search?q=cache:m0O0- VN4GiMJ:www.scambusters.org/creditcard.html+Wha t+to+do+if+your+credit+card+is+stolen.&hl=en&ct =clnk&cd=3&gl=us http://www.justice-explained.com/identity-theft- protection.asp http://www.justice-explained.com/identity-theft- protection.asp http://www.justice-explained.com/identity-theft- protection.asp http://www.justice-explained.com/identity-theft- protection.asp http://www.phahealth.us/identity-theft.html http://www.phahealth.us/identity-theft.html http://www.phahealth.us/identity-theft.html http://www.ccrod.org/identity/identity_theft_contacts.html http://www.ccrod.org/identity/identity_theft_contacts.html http://www.ccrod.org/identity/identity_theft_contacts.html http://www.ccrod.org/identity/identity_theft_contacts.html
21
More sources Http://www.zdnet.com/au/news/security/soa/Mac- OS-X-hacked-under-30- minutes/0,130061744,139241748,00.htm Http://www.zdnet.com/au/news/security/soa/Mac- OS-X-hacked-under-30- minutes/0,130061744,139241748,00.htm Http://www.zdnet.com/au/news/security/soa/Mac- OS-X-hacked-under-30- minutes/0,130061744,139241748,00.htm Http://www.zdnet.com/au/news/security/soa/Mac- OS-X-hacked-under-30- minutes/0,130061744,139241748,00.htm Http://www.webopedia.com/term/p/phishing/htm Http://www.webopedia.com/term/p/phishing/htm Http://www.webopedia.com/term/p/phishing/htm Http://webopedia.internet.com/DidYouKnow/Intern et/2004/virus.asp Http://webopedia.internet.com/DidYouKnow/Intern et/2004/virus.asp Http://webopedia.internet.com/DidYouKnow/Intern et/2004/virus.asp Http://webopedia.internet.com/DidYouKnow/Intern et/2004/virus.asp http://en.wikipedia.org/wiki/phishing http://en.wikipedia.org/wiki/phishing http://en.wikipedia.org/wiki/phishing http://www.microsoft.com/protect/yourself/phishing /identify.mspx http://www.microsoft.com/protect/yourself/phishing /identify.mspx http://www.microsoft.com/protect/yourself/phishing /identify.mspx http://www.microsoft.com/protect/yourself/phishing /identify.mspx
22
More sources Protection of personally identifiable information (Pii) – Mr. Mills Protection of personally identifiable information (Pii) – Mr. Mills http://www.idtheftcenter.org/ http://www.idtheftcenter.org/ http://www.idtheftcenter.org/ http://www.idtheftcenter.org/artman2/publish /c_tips/Fact_Sheet_117_IDENTITY_THEFT _AND_THE_DECEASED_- _PREVENTION_AND_VICTIM_TIPS.shtml http://www.idtheftcenter.org/artman2/publish /c_tips/Fact_Sheet_117_IDENTITY_THEFT _AND_THE_DECEASED_- _PREVENTION_AND_VICTIM_TIPS.shtml http://www.idtheftcenter.org/artman2/publish /c_tips/Fact_Sheet_117_IDENTITY_THEFT _AND_THE_DECEASED_- _PREVENTION_AND_VICTIM_TIPS.shtml http://www.idtheftcenter.org/artman2/publish /c_tips/Fact_Sheet_117_IDENTITY_THEFT _AND_THE_DECEASED_- _PREVENTION_AND_VICTIM_TIPS.shtml http://www.identitytheft.org.uk http://www.identitytheft.org.uk http://www.identitytheft.org.uk http://www.imdb.com/title/tt0430211/ http://www.imdb.com/title/tt0430211/ http://www.imdb.com/title/tt0430211/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.