id theft & phishing2
Post on 19-Oct-2014
699 views
DESCRIPTION
TRANSCRIPT
![Page 1: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/1.jpg)
Id Theft & PhishingBy: Audie, Fae, Jeff, and Julia
![Page 2: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/2.jpg)
ID Theft
• Occurs when an unauthorized party uses your personal information to commit fraud.
![Page 3: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/3.jpg)
Id Theft• 10 million cases• 1 in 20 adults• Fastest Growing
Crime• Victims are often
Arrested
![Page 4: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/4.jpg)
Id Theft (How it Occurs)• Phishing• Old Mail• Dumpster Diving• Hacking• Online Transactions• Lost/Stolen
Purse/Wallet
![Page 5: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/5.jpg)
![Page 6: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/6.jpg)
![Page 7: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/7.jpg)
Preventatives• Credit Protection Service• Run Credit Annually (all 3 agencies)• Shred Old Mail• Keep Mailing Address Up-to-Date• Never Carry Social Security Card• Never Give out Personal Information• Don’t Carry What You Don’t Need
![Page 8: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/8.jpg)
If You Become A Victim• 175 hours, $800• Police Report• Obtain Credit Reports• FTC Report• Get Credit Protection Service• Keep Detailed Notes of Conversations• Make a list of Names and Numbers• Copies of Everything
![Page 9: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/9.jpg)
Phishing
• attempting to acquire sensitive information such as usernames, passwords and credit card information through an electronic communication.
![Page 10: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/10.jpg)
Phishing• AOHell (1996)• Transition to Financial
Institutions (2001)• Social Networking Sites (2006)• Further Development (Present)
![Page 11: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/11.jpg)
Spear Phishing
Targeted versions of phishing
Phishers are able to determine which banks potential victims use, and target bogus e-mails
accordingly.
![Page 12: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/12.jpg)
WhalingSpear Phishing high profile
targets
Phishing directed specifically at senior level executives,
wealthy individuals
![Page 13: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/13.jpg)
![Page 14: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/14.jpg)
![Page 15: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/15.jpg)
![Page 16: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/16.jpg)
![Page 17: Id Theft & Phishing2](https://reader033.vdocuments.us/reader033/viewer/2022061105/5443e945afaf9fa0098b46bd/html5/thumbnails/17.jpg)
More ResourcesID Theft http://www.ftc.gov
Phishing http://www.antiphishing.org/
http://www.onguardonline.gov/topics/phishing.aspx