Presentation is loading. Please wait.

Presentation is loading. Please wait.

Identity Theft By Omer Ersen.

Similar presentations


Presentation on theme: "Identity Theft By Omer Ersen."— Presentation transcript:

1 Identity Theft By Omer Ersen

2 What is it The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases.

3 What types of Identity Theft are there?
Criminal identity theft (posing as another person when apprehended for a crime) Financial identity theft (using another's identity to obtain credit, goods and services) Identity cloning (using another's information to assume his or her identity in daily life) Medical identity theft (using another's identity to obtain medical care or drugs)

4 More in depth Criminal identity theft
Giving a false name or fake ID when questioned by the cops. Victims may not know that their name was given during the incident

5 Financial identity theft
What you are a costumed to when dealing with Identity Theft. Includes attackers getting credit card numbers, bank account numbers, and other information to obtain goods. Goods can be physical or can be things like loans, and credit scores to be able to buy something

6 Identity cloning Impersonating someone to conceal Identity either to remain hidden or for their ammusment. Ex- Catfishing, illegal immigrants.

7 Medical identity theft
Used by people trying to obtain medical care using someone’s else's identity. Usually for treatment that is too expensive, and for people who don’t have insurance According to Ponemon Institute's “2013 Survey on Medical Identity Theft

8 So why do we care Growing at an unbelievable rate
Use of technology (online banking, online shopping) If we do not educate people about the problem and teach them how to protect themselves then the numbers will only rise.

9 Statistics Done by the U.S. Department of Justice For Individuals

10 So how do Attackers obtain information?
Two ways Physically obtaining your information Through electronics. The norm now

11 Physically Some examples of physically obtaining your information are
Dumpster diving “preapproved” credit cards from the mail Stealing it directly from your possession Obtaining storage devices that still have information on them

12 Through electronics Using malware to obtain information from your electronics. Ex Keystroke Trojans and spyware Obtaining information from Social Media Impersonating trusted organizations in s Fake WI-FI spots

13 Fake Wi-Fi Usually at public places like Hotels, conventions, and bars
The Wi-Fi looks legitimate but it is not Used to obtain username and passwords Can obtain bank/ credit information if a user logs in or uses there credit card using the fake Wi-Fi spot

14 Impersonating trusted organizations in emails/ Early internet
Infamous 419 scam Spam mail was sent to potential victims stating that a Nigerian Prince has a huge fortune coming his way but he needs an upfront deposit first and he is willing to split the fortune with you if you agree to pay some cash

15 Impersonating trusted organizations in emails/ Modern internet
This scam should have never worked but apparently it did What is used today- Receive an from your bank saying there is a security breach and you must change your password. looks legit and looks exactly like s you have received in the past

16 Obtaining information from Social Media
Social Media has exploded over the last couple of years Attackers use social media to obtain information that can help them break into your accounts They scan for information that can help them answer the “forgot password” hint

17 Malware Attackers can obtain information through different types of malware Keylogger Trojan-tracks what keys you have pressed Spyware- Software that gathers information from an infected machine without the user knowing

18 So what to do if you believe you are a victim
According to the Federal Trade Commission 3 steps Place an initial Fraud Alert- Place alert for free at 1 of the three National credit reporting companies(Equifax, Experian, and TransUnion) Order your Credit Reports-Get a free credit report from each of the credit reporting companies Create an Identity theft Report- To help recover from the theft

19 Protection Antivirus Systems on your electronics can help against malware Proper disposal of documents(where you discard them and how you destroy documents) Caution against phishing scams Identity theft protection services

20 Identity theft protection services
Top Identity theft protection Services of 2013


Download ppt "Identity Theft By Omer Ersen."

Similar presentations


Ads by Google