/
Identity Theft Identity Theft

Identity Theft - PowerPoint Presentation

pamella-moone
pamella-moone . @pamella-moone
Follow
464 views
Uploaded On 2016-05-10

Identity Theft - PPT Presentation

By Omer Ersen What is it The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that persons name or identity in order to make transactions or purchases ID: 313319

theft identity credit information identity theft information credit obtain obtaining medical fake malware social media protection services emails attackers

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Identity Theft" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Identity Theft

By Omer

ErsenSlide2

What is it

The

crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases.Slide3

What types of Identity Theft are there?

Criminal identity theft

(posing as another person when apprehended for a crime)

Financial identity theft

(using another's identity to obtain credit, goods and services)

Identity cloning

(using another's information to assume his or her identity in daily life)

Medical identity theft

(using another's identity to obtain medical care or drugs)Slide4

More in depth

Criminal identity theft

Giving a false name or fake ID when questioned by the cops.

Victims may not know that their name was given during the incidentSlide5

Financial identity theft

What you are a costumed to when dealing with Identity Theft.

Includes attackers getting credit card numbers, bank account numbers, and other information to obtain goods.

Goods can be physical or can be things like loans, and credit scores to be able to buy somethingSlide6

Identity cloning

Impersonating someone to conceal Identity either to remain hidden or for their

ammusment

.

Ex- Catfishing, illegal immigrants.Slide7

Medical identity theft

Used by people trying to obtain medical care using someone’s else's identity.

Usually for treatment that is too expensive, and for people who don’t have insurance

According to

Ponemon

Institute's “2013 Survey on Medical Identity TheftSlide8

So why do we care

Growing at an unbelievable rate

Use of technology (online banking, online shopping)

If we do not educate people about the problem and teach them how to protect themselves then the numbers will only rise.Slide9

Statistics

Done by the U.S. Department of Justice

For IndividualsSlide10

So how do Attackers obtain information?

Two ways

Physically obtaining your information

Through electronics. The norm nowSlide11

Physically

Some examples of physically obtaining your information are

Dumpster diving

“preapproved”

credit cards from the

mail

Stealing it directly from your possessionObtaining storage devices that still have information on themSlide12

Through electronics

Using malware to obtain information from your electronics. Ex Keystroke Trojans and spyware

Obtaining information from Social Media

Impersonating trusted organizations in

emails

Fake WI-FI spotsSlide13

Fake Wi-Fi

Usually at public places like Hotels, conventions, and bars

The Wi-Fi looks legitimate but it is not

Used to obtain username and passwords

Can obtain bank/ credit information if a user logs in or uses there credit card using the fake Wi-Fi spotSlide14

Impersonating trusted organizations in emails/ Early internet

Infamous 419 scam

Spam mail was sent to potential victims stating that a Nigerian Prince has

a huge fortune coming his way but he needs an upfront deposit first and he is willing to split the fortune with you if you agree to pay some cash

Slide15

Impersonating trusted organizations in emails/ Modern internet

This scam should have never worked but apparently it did

What is used today-

Receive an email from your bank saying there is a security breach and you must change your password. Email looks legit and looks exactly like emails you have received in the pastSlide16

Obtaining information from Social Media

Social Media has exploded over the last couple of years

Attackers use social media to obtain information that can help them break into your accounts

They scan for information that can help them answer the “forgot password” hintSlide17

Malware

Attackers can obtain information through different types of malware

Keylogger

Trojan-tracks what keys you have pressed

Spyware- Software that gathers information from an infected machine without the user knowingSlide18

So what to do if you believe you are a victim

According to the Federal Trade Commission 3 steps

Place an initial Fraud Alert- Place alert for free at 1 of the three National credit reporting companies(

Equifax, Experian, and

TransUnion)

Order your Credit Reports-Get a free credit report from each of the credit reporting companies

Create an Identity theft Report- To help recover from the theftSlide19

Protection

Antivirus Systems on your electronics can help against malware

Proper disposal of documents(where you discard them and how you destroy documents)

Caution against phishing scams

Identity theft protection servicesSlide20

Identity theft protection services

Top Identity theft protection Services of 2013