Personal Identity Theft in the Web-based Business World Presenter – Rick Weatherspoon Xtreme Computing, LLC.

Slides:



Advertisements
Similar presentations
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Advertisements

BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
PRIORITIES. AARP Tax-Aide Priorities BudgetsTraining E-Filing Reimbursements Security Accuracy Developing Leaders CertificationDonations Recruitment.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Internet Phishing Not the kind of Fishing you are used to.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Cyber X-Force-SMS alert system for threats.
Personal Identity Theft in the Web-based Business World Presenter – Rick Weatherspoon Xtreme Computing, LLC.
Wardriving 7/29/2004 The “Bad Karma Gang”. Agenda Introduction to Wardriving The Tools of Wardriving Wardriving Green Lake.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
How It Applies In A Virtual World
Securing Information Systems
E-commerce Fraud: The New Reality Thomas Chim Raj Nair Chris Geegan Mike Grimsley.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Wire Fraud. Prevention Avoid sending sensitive financial information via . Use encrypted . Educate clients about fraud. Contact the intended.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Kelly Herd Rebecca Hofeling IDENTITY THEFT AND PROTECTION Communication 2500.
CCT355H5 F Presentation: Phishing November Jennifer Li.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing: Trends and Countermeasures Blaine Wilson.
How Phishing Works Prof. Vipul Chudasama.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Identity Theft The Nation’s Fastest Growing Crime.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Identity Theft One of America's fastest growing crimes.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Identity Theft FBI Norfolk (757) SA Mark T. Park.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Identity Theft It’s a crime!
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
IT Security  .
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Information Security Session October 24, 2005
Digital $$ Quiz Test your knowledge.
Computers in Society 12/1/2018.
Computer Security.
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
“Credit score vocabulary”
Security in mobile technologies
Presentation transcript:

Personal Identity Theft in the Web-based Business World Presenter – Rick Weatherspoon Xtreme Computing, LLC

2 June 2006 Agenda Definition of ID Theft ID Theft Statistics Business Losses Types of Web-based ID Theft –Hacking & Attacking –Phishing –WarXing/War Driving ID Theft Reporting Questions

2 June 2006 Identity Theft Definition The Deliberate Assumption of Another Person's Identity, Usually to Gain Access to their Finances, or Frame Them for a Crime

2 June 2006 ID Theft Statistics (National) Fastest Growing Crime in US U.S. Identity Fraud Crimes now total $52.6 Billion Annually * Per-Victim Total of $5,686 Affects Roughly 9.3 Million Individuals in US Yearly * Source – 2005 Study by Javelin Strategy & Research

2 June 2006 ID Theft Statistics (State) 2,909 Complaints Filed in Oregon State (2004) Oregon State Ranks within the Top 10 (9 th ) Complaints Rose 20% More than in 2003

2 June 2006 ID Theft Statistics (County) * Source – Wallowa County Sheriff; May 2006

2 June 2006 Business Losses Due to ID Theft Between May 2004 and May 2005, 1.5 Million Computer Users Lost $929 Million on ONLY Phishing Scams US Businesses Lose an Estimated $2 Billion Per Year on Clients who are Victims Businesses Lose an Average of $4,800 per Victim * *Source – Washington State AGO Identity Theft Advisory Panel; January 2006

2 June 2006 Types of Web-based ID Theft Hacking & Attacking Phishing WarXing/War Driving

2 June 2006 Web-based Hacking & Attacking Authentication Hacking –Browsing –Cookie Theft –Session Hijacking –Network Sniffers –Password Cracking –Dictionary Attacks Google Hacking SQL Injection Directory Traversal

2 June 2006 Phishing Attempts to Fraudulently Acquire Sensitive Consumer Info Via False Web Pages, s, IMs, FAX, VOIP Term Arises from Using Sophisticated Lures to “Fish” for Consumer’s Financial Data & Passwords Recently Targeting Banks, Online Payment Services, IRS Letters Common Tricks Include Misspelled URLs, use of SubDomains, Altering Address Bars, Cross Site Scripting Recent Scam Left Voice Messages to Call Bank with Account & PIN Numbers over a VOIP Network

2 June 2006 Citibank Phishing Example

2 June 2006 Citibank Phishing Web Link

2 June 2006 Citibank Phishing – User Garbled URL

2 June 2006 Citibank Phishing – Invalid Credit Card Number

2 June 2006 Citibank Phishing Source Search with Whois Utility: IP : netname: CHINATELECOM-he descr: CHINANET hebei province network descr: China Telecom descr: No.31,jingrong street descr: Beijing country: CN mnt-by: MAINT-CHINANET changed: source: APNIC

2 June 2006 WarXing/War Driving Searching for Wireless Networks and Access Points by Moving Vehicle/Bike (WLAN, WiFi HotSpots) Captures Information Packets with WiFi-based equipment (Laptop/PDA) Software Freely Available to Monitor, Capture, and Analyze Clear Text and Encrypted Data (NetStumbler, AirSnort, WEPCracker, etc.) Majority of Wireless Networks Use Default Settings (SSIDs, Passwords, Encryption Keys, etc.) Legality of War Driving Not Clearly Defined in the US

2 June 2006 Wireless Network Diagram

2 June 2006 Reporting of ID Theft FBI/Internet Fraud Complaint Center – – Federal Trade Commission – – Internet Crime Complaint Center – Oregon State Department of Justice – Wallowa County Sheriff Department –

Questions?