Presented to Temple Baptist Academy, April 21, 2009.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Victoria ISD Common Sense Media Grade 6: Scams and schemes
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
 Identity theft is the taking of one’s personal information and using it for yourself. Usually for illegal reasons. Though its all illegal if you even.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Internet Security Passwords.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Identity theft By: Blake D uncan.
Cyber Crimes.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
How can you protect yourself from online identity theft?
Scams & Schemes Common Sense Media.
Identity theft: Real or Virtual? By: Alex Metzler.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Be Cautious of Identity Theft By: Sydney Langley.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
INTERNET: The Good, The Bad and The Ugly
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
By Austin Kellogg DeterDetectDefend 1.RealReal 2.VirtualVirtual 3.FTCFTC.
By: Asfa Khan and Huda Mukhtar
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Jeff loses his identity! Lesson 8: Identity Theft.
You. are at risk for the fastest growing crimes crime.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Identity Theft How bad people get good credit. Lindsey Bertugli.
When you get caught for Identity Theft
Protecting Your Identity:
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Yourself from Fraud including Identity Theft
Company Name | Phone Number | Website | Address
Presentation transcript:

Presented to Temple Baptist Academy, April 21, 2009

Agenda Identity theft in general, and how it applies to minors Identity theft as applied to cell phones, and social networks (MySpace/Facebook) Some basic tips regarding home PC security

Identity theft in general, and how it applies to minors

Types of Identity Theft Financial identity theft - using another's identity to obtain goods and services Business/commercial identity theft - using another's business name to obtain credit Criminal identity theft -posing as another when apprehended for a crime Identity cloning - using another's information to assume his or her identity in daily life Medical identity theft -using another's information to obtain medical care or drugs For purposes of this presentation, will be focusing on financial identity theft, criminal identity theft, and identity cloning. » Source:

Why should you care? Children and teens are especially susceptible to having their identity stolen due to a typically longer period of time between the initial theft and discovery. –Criminals often steal children’s identities to escape law enforcement authorities –Because children and teens have no credit, their identities are often cloned by those with severely damaged credit to maintain their financial activities. –Due to the economic downturn, identity theft is expected to continue to increase, especially in this area. Source: Identity Theft Resource Center

Financial Identity Theft Some underlying flaws in the credit reporting system that enable identity theft: –Credit issuers may not have a way to verify the age of an applicant (especially if the application for credit is online or over the phone). –Credit reporting agencies often do not share information about the age of an applicant. Age is often determined by what is stated on the first application for credit. Because age is not systematically verified by credit issuers or double-checked by credit reporting agencies, very easy for an imposter to use a teen’s identity to obtain credit. Source: Identity Theft Resource Center

Criminal identity theft Typically occurs when a person “borrows” the information of a minor to get a driver’s license/passport or uses the child’s identity when caught in a criminal act. –Information is often sold on the black market to illegal immigrants trying to obtain identity documentation. As NM is a border state, this is an issue. Source: Identity Theft Resource Center

Identity Cloning Happens when someone assumes your identity for financial, criminal, and/or government purposes –Other people (i.e. felons) that are trying to restart their lives/avoid arrest. –Terrorists Source: Identity Theft Resource Center

How would you know if this happened to you? (the hard way) Unfortunately, most of the time, this is discovered the hard way –Denied credit, car loan, or financial aid for college –Unable to open bank/checking account –When obtaining a driver’s license, learn there is already a license for your name/SSN. There may even be tickets/citations/bench warrants in your name.

How would you know if this happened to you? (the easy way) Obtain a free credit report –Will show accounts opened in your name Request a copy of your records from DMV (if there are any, this will show it) –Confidential release form included in handout packet.

Identity theft as applied to cell phones, MySpace and Facebook

Cell phones SENSITIVE DATA ON MOBILES Personal 16% - Bank account details 24% - Pin numbers/passwords 11% - Social security/tax details 10% - Store credit card information Business 77% - Work-related names/addresses 30% - Use mobile as a work diary 17% - Work-related documents 23% - Customers' information 40% of users do not use any security features(password or pass-phrase protect, encryption) at all Source: Credant Technologies

Why should I care? “But I don’t have a business, I don’t have a credit card, why should I care?” – , passwords, birthdays, personal diary, documents, pictures, names of family members, pets normally stored on cell phones. –This information can easily enable someone to pose as you and set up accounts, or worse yet, pose as you in sending messages to friends and family members.

What to do With the advent of 3G phones that easily surf the internet, cell phones are carrying increasingly personal information, and have the same capabilities as a personal computer Treat a smartphone the same as a personal computer when it comes to security –Password or pass-phrase protect –Use antivirus applications –Encrypt data on your phone if that option is available to you –Report if lost or stolen ASAP

Social networks - some cautions Taken from a message I sent to a friend that recently joined Facebook: –1. do not display your birth year –2. absolutely do not store credit card information –3. no personal info (address, etc) –4.do not mention where you WILL BE going, etc, no physical whereabouts. –5. set your profile so only your friends can see your profile, your friends, or anything that can identify you.

Social networks EVERYTHING YOU POST IS PUBLIC AND PERMANENT

Ooooooooops Brooklyn police officer Vaughn Etienne –Posted what he called “trash talk” on MySpace using the mood “devious”. –His posts were subpoenaed into a Brooklyn court to discredit him. –Because of the nature and tone of his comments, reasonable doubt was established and a convict out on parole for a burglary charge had a felony gun possession charge dropped. Source: The New York Times 3/11/09

Home PC security Roger Grimes, security advisor, wrote the following for InfoWorld, states that: –25-50% of home computers are infected in a year –Normal causes of malware being found on home PCs are: User tricked into installing malware 95% Unpatched software that leaves a security hole open 4% Zero day hole 1%

What to do Instead of focusing on specific software or techniques to keep your PC safe, the following philosophy is recommended: 1. never install anything that you are not sure is 100% legitimate (nothing from pop-up windows, etc.) 2. keep your software patched and up to date (operating system updates, etc) 3. do not use a user profile with administrator rights to your computer (admin rights can normally install programs, make changes to programs, etc).

Resources/references Identity Theft Resource Center “Mobile users at risk of ID theft”. BBC News.3/18/09. “Study: Mobile Phones Contain Treasure Trove of Unprotected Data”. Wilson, Tim. DarkReading. 3/18/09. “The Officer Who Posted Too Much on MySpace”. Dwyer, Jim. The New York Times. 3/11/ Excellent reference for home PC security “The Only Two things you need to know about home computing security” Grimes, Roger. InfoWorld. 12/25/08. ly_two_th.html ly_two_th.html