Download presentation
Presentation is loading. Please wait.
Published byLewis Howard Modified over 9 years ago
1
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL
2
Plan What’s « Identity Theft» ? What’s « Phishing »? Identity Theft Forms How to protect yourself from phishing? Conclusion
3
What’s « Identity Theft»? Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. More than 9 million Americans have their identities stolen each year. In fact, you or someone you know may have experienced some form of identity theft. The crime takes many forms. Identity thieves may rent an apartment, obtain a credit card, or establish a telephone account in your name. You may not find out about the theft until you review your credit report or a credit card statement and notice charges you didn’t make—or until you’re contacted by a debt collector.
4
What’s « Identity Theft» ? Identity theft is serious. While some identity theft victims can resolve their problems quickly, others spend hundreds of dollars and many days repairing damage to their good name and credit record. Some consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing or cars because of negative information on their credit reports. In rare cases, they may even be arrested for crimes they did not commit.
5
What’s « Phishing » ? The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.
6
Identity Theft Forms Credit / Financial Driver’s Licence Social Security Character / Criminal Medical Synthetic
7
How to protect yourself from phishing? What does a phishing scam look like? What does a phishing Web site or link look like? How can I protect myself from phishing scams?
8
How to protect yourself from phishing?
9
The phrases to look for in the phishing e-mail message "Verify your account." "You have won the lottery." "If you don't respond within 48 hours, your account will be closed."
10
How to protect yourself from phishing? The kind of phrase you might see in an e- mail message "Click the link below to gain access to your account.“ Example of a masked Web address
11
How to protect yourself from phishing? The address "www.microsoft.com" could appear instead as: www.micosoft.com www.mircosoft.com www.verify-microsoft.com
12
How to protect yourself from phishing? How can I protect myself from phishing scams? Keep your operating system up to date, and install up-to-date antivirus and antispyware software. Internet Explorer 7 and the Microsoft Phishing Filter
13
Conclusion
14
Thank you for your attention
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.