Protecting Your Identity. What is IA? Committee on National Security Systems definition: –Measures that protect and defend information and information.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Internet Safety Dr. Steve Broskoske Misericordia University.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity theft: Real or Virtual? By: Alex Metzler.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
7.3.1.G1 According to The federal Trade Commission, Identity theft Affects Approximately 12.6Million People Every year.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Phishing: Trends and Countermeasures Blaine Wilson.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Fraud: Identity Theft G.1 List and explain consumer protection laws, including credit reporting, debt collection, and privacy. G.2 Define common, unfair.
Beware! Identity Theft. Imagine getting a letter from the Internal Revenue Service (IRS) demanding that you pay $5,700 in back taxes. That’s what happened.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
IDENTITY THEFT.
Identity Theft It’s a crime!
Protecting Your Identity:
#1 Consumer Fraud Complaint – 5th straight year!
When you get caught for Identity Theft
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Identity Theft Essentials
Presentation transcript:

Protecting Your Identity

What is IA? Committee on National Security Systems definition: –Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. CIA model –Confidentiality: prevent disclosure from unauthorized individuals or systems –Integrity: Information cannot be modified without authorization –Availability: Information must be accessible when needed –Authentication: establishing information as authentic –Non-repudiation: ensuring that a party cannot refute that information is genuine.

What is Identity Theft? Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes The FTC estimates that as many as 9 million Americans have their identities stolen each Typical Identity theft crimes –Rent an apartment –Obtain a credit card or other types of debt –Establish a telephone account –Get various types of identifications in the victim’s name –Steal financial assets

What is Identity Theft? Costs of Identity Theft –Legal fees –Exorbitant amount of time –Lost job opportunities –Denial of all types of financial resources –False accusations, and potential arrests for crimes not committed

How Does it Occur? In most cases attackers need personally identifiable information (PII) or personal documents in order to impersonate the victim. Name, Address, DOB, Birthplace, License Number, Credit Card Number, SSN Where could an attacker find this information? Could you be an easy target?

Generation Stereotype Millennial Generation (Us) –Users of instant communication technology Myspace, Twitter, Facebook, Text, IM, –Tech savvy Video Games (PC, Xbox, Playstation) MMOs (Second Life, WOW, Lineage, Maple Story) P2P file sharing 90 percent own a computer in US Spend more time online than watching TV How much information about you is stored on somebody else’s servers? What methods of protection are in place?

Contemporary High Risk Areas On-line shopping Malware Credit Card Applications –Online incentives –in person incentives –mail applications Physical Assets –Laptops, cellphones, ipods... –Wallet, purse, checkbook... Social Networking Online Gaming File sharing

Social Engineering The process of using social skills to convince people to reveal access credentials or other valuable information Common Social Engineering Techniques –Confidence Trick –Pretexting –Baiting –Quid Pro Quo –Phishing Spear Phishing Whaling Phone Phishing

Phishing An attempt to obtain personal or financial information by using fraudulent means, usually by posing as a legitimate entity. Targets –PII Methods –Bank Account Credentials – Login Credentials –Social Networking Login Credentials Why?

Phishing Example

Phishing Logon Example

Phishing Phishing can take many forms: – s from websites or services you use frequently –Bogus job offers –They might appear to be from a friend or someone you know (Spear Phishing) –They might ask you to call a number (Phone Phishing) –They usually contain official looking logos –They usually links to phony websites that ask for personal information –Physical Mail

Red Flags “ Verify your account” “Click the link for account access” “If you don’t respond, your account will be suspended” “Suspicious activity alert” Pop ups Deceptive URLs – – – Masked URLs

Identity Theft What are other method’s of stealing someone’s identity? –Non Technical Dumpster Diving (Storage Media and Documents) Skimming Pickpocketing/Theft Shoulder surfing Changing Mailing Address –Technical Hacking Malware Password Cracking Packet sniffing

Prevention Shred all your important information \ Don’t access personal info in public places Use privacy screens when necessary Have your checks delivered to your bank Properly destroy storage media (hard drives,flash drives, cds...)

Prevention Drop off payment checks at the post office Note when new credit cards are to be received Cancel old credit cards Use strong passwords Don’t post personally identifiable info on the internet. Install proper anti-malware software

Prevention Carry only necessary information with you Do not give out personal information unless necessary Monitor your accounts Order your credit report at least twice a year Know the site you are visiting (pay attention to URLs) Ensure PII info is encrypted (SSL, TLS)

Annual Credit Report Request your Credit Report Online – To Request your Credit Report by Phone –Call To Request your Credit Report by Mail –Annual Credit Report Request Service P.O. Box Atlanta, GA

Recovering From Identity Theft What are the steps I should take if I'm a victim of identity theft? –Place a fraud alert on your credit reports, and review your credit reports –Close the accounts that you know, or believe, have been tampered with or opened fraudulently –File a complaint with the Federal Trade Commission –File a report with your local police or the police in the community where the identity theft took place

Anti-Phishing Phil

Questions