Identity Theft Jody Nadeau. Project Description What is Identity theft What is Identity theft Types of identity theft Types of identity theft Fraud Fraud.

Slides:



Advertisements
Similar presentations
I.T Voluntary Blog Week 3 Self assessment. I am looking at my plans (fishbone, mindmap) to make sure that I am on track= 0 I never really look back at.
Advertisements

1 If You Are Me, Then Who Am I? Beating Identity Theft Office of the California Attorney General.
Don’t Be Tricked Beware of Zombies. Malicious zombie code infects computer Internet.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
SNOWFLAKE By: Caralynne Daigle COS /14/06. Project Description My project was to originally have the user be able to create their own snowflake.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Hacker Zombie Computer Reflectors Target.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Mrs. Jefferson Business Information Management I.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
What is Digital Citizenship?. Digital Citizenship Digital Citizenship is knowing and understanding the proper use of technology. The following are some.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Trojan Horse Viruses By: Amanda Mohammed Nov. 22, 2012.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
1. Archawin Tirugsapun M.2/6 No.5 2. Pavarit Nimitpunya M.2/6 No.7 3. Chutiwat Fukphunpai M.2/6 No Kittiphat Temtavornkul M.2/6 No.25(Jillza)
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Return to the PC Security web page Lesson 5: Dealing with Malware.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Host and Application Security Lesson 17: Botnets.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Safety and Security issues of using ICT Alys brooks.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Cyber security. Malicious Code Social Engineering Detect and prevent.
Done by… Hanoof Al-Khaldi Information Assurance
MALWARE Autumn Mattis.
Personal spaces.
Instructor Materials Chapter 7 Network Security
Network security threats
Identity Theft Jody Nadeau.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Identity Theft Jody Nadeau

Project Description What is Identity theft What is Identity theft Types of identity theft Types of identity theft Fraud Fraud Internet/Computer Fraud Internet/Computer Fraud Telemarketing Fraud Telemarketing Fraud Cell Phone Fraud Cell Phone Fraud Viruses Viruses Spyware Spyware Adware Adware

Project Description Continued Wireless Security Wireless Security Computer Theft Computer Theft Back ups Back ups

Outcomes There were more types of identity theft than had originally thought There were more types of identity theft than had originally thought I learned more about Identity theft and ways that I can prevent this from happening to me I learned more about Identity theft and ways that I can prevent this from happening to me I can also tell from any signs if my Identity has been compromised I can also tell from any signs if my Identity has been compromised

Lessons Learned Do not take everything for granted Do not take everything for granted Anything that you can do prevent from being a victim is very simple Anything that you can do prevent from being a victim is very simple The prevention is a lot simpler that had anticipated The prevention is a lot simpler that had anticipated Detection is the key to prevention Detection is the key to prevention

Demonstration Make sure that you have Make sure that you have anit-virus software upgrade and definitions anit-virus software upgrade and definitions Operating system upgrades and patches Operating system upgrades and patches Firewalls set up to block unwanted traffic Firewalls set up to block unwanted traffic