By Omer Ersen What is it The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that persons name or identity in order to make transactions or purchases ID: 313319
Download Presentation The PPT/PDF document "Identity Theft" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Identity Theft
By Omer
ErsenSlide2
What is it
The
crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases.Slide3
What types of Identity Theft are there?
Criminal identity theft
(posing as another person when apprehended for a crime)
Financial identity theft
(using another's identity to obtain credit, goods and services)
Identity cloning
(using another's information to assume his or her identity in daily life)
Medical identity theft
(using another's identity to obtain medical care or drugs)Slide4
More in depth
Criminal identity theft
Giving a false name or fake ID when questioned by the cops.
Victims may not know that their name was given during the incidentSlide5
Financial identity theft
What you are a costumed to when dealing with Identity Theft.
Includes attackers getting credit card numbers, bank account numbers, and other information to obtain goods.
Goods can be physical or can be things like loans, and credit scores to be able to buy somethingSlide6
Identity cloning
Impersonating someone to conceal Identity either to remain hidden or for their
ammusment
.
Ex- Catfishing, illegal immigrants.Slide7
Medical identity theft
Used by people trying to obtain medical care using someone’s else's identity.
Usually for treatment that is too expensive, and for people who don’t have insurance
According to
Ponemon
Institute's “2013 Survey on Medical Identity TheftSlide8
So why do we care
Growing at an unbelievable rate
Use of technology (online banking, online shopping)
If we do not educate people about the problem and teach them how to protect themselves then the numbers will only rise.Slide9
Statistics
Done by the U.S. Department of Justice
For IndividualsSlide10
So how do Attackers obtain information?
Two ways
Physically obtaining your information
Through electronics. The norm nowSlide11
Physically
Some examples of physically obtaining your information are
Dumpster diving
“preapproved”
credit cards from the
mail
Stealing it directly from your possessionObtaining storage devices that still have information on themSlide12
Through electronics
Using malware to obtain information from your electronics. Ex Keystroke Trojans and spyware
Obtaining information from Social Media
Impersonating trusted organizations in
emails
Fake WI-FI spotsSlide13
Fake Wi-Fi
Usually at public places like Hotels, conventions, and bars
The Wi-Fi looks legitimate but it is not
Used to obtain username and passwords
Can obtain bank/ credit information if a user logs in or uses there credit card using the fake Wi-Fi spotSlide14
Impersonating trusted organizations in emails/ Early internet
Infamous 419 scam
Spam mail was sent to potential victims stating that a Nigerian Prince has
a huge fortune coming his way but he needs an upfront deposit first and he is willing to split the fortune with you if you agree to pay some cash
Slide15
Impersonating trusted organizations in emails/ Modern internet
This scam should have never worked but apparently it did
What is used today-
Receive an email from your bank saying there is a security breach and you must change your password. Email looks legit and looks exactly like emails you have received in the pastSlide16
Obtaining information from Social Media
Social Media has exploded over the last couple of years
Attackers use social media to obtain information that can help them break into your accounts
They scan for information that can help them answer the “forgot password” hintSlide17
Malware
Attackers can obtain information through different types of malware
Keylogger
Trojan-tracks what keys you have pressed
Spyware- Software that gathers information from an infected machine without the user knowingSlide18
So what to do if you believe you are a victim
According to the Federal Trade Commission 3 steps
Place an initial Fraud Alert- Place alert for free at 1 of the three National credit reporting companies(
Equifax, Experian, and
TransUnion)
Order your Credit Reports-Get a free credit report from each of the credit reporting companies
Create an Identity theft Report- To help recover from the theftSlide19
Protection
Antivirus Systems on your electronics can help against malware
Proper disposal of documents(where you discard them and how you destroy documents)
Caution against phishing scams
Identity theft protection servicesSlide20
Identity theft protection services
Top Identity theft protection Services of 2013