Your SlideShare is downloading. ×
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Id Theft & Phishing2
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Id Theft & Phishing2

315

Published on

ED451

ED451

Published in: Business, Economy & Finance
1 Comment
0 Likes
Statistics
Notes
  • free free download this latest version 100% working.
    download link- http://gg.gg/hqcf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total Views
315
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
13
Comments
1
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Id Theft & Phishing
    By: Audie, Fae, Jeff, and Julia
  • 2. ID Theft
    Occurs when an unauthorized party uses your personal information to commit fraud.
  • 3. Id Theft
    10 million cases
    1 in 20 adults
    Fastest Growing Crime
    Victims are often Arrested
  • 4. Id Theft (How it Occurs)
    Phishing
    Old Mail
    Dumpster Diving
    Hacking
    Online Transactions
    Lost/Stolen Purse/Wallet
  • 5.
  • 6.
  • 7. Preventatives
    Credit Protection Service
    Run Credit Annually (all 3 agencies)
    Shred Old Mail
    Keep Mailing Address Up-to-Date
    Never Carry Social Security Card
    Never Give out Personal Information
    Don’t Carry What You Don’t Need
  • 8. If You Become AVictim
    175 hours, $800
    Police Report
    Obtain Credit Reports
    FTC Report
    Get Credit Protection Service
    Keep Detailed Notes of Conversations
    Make a list of Names and Numbers
    Copies of Everything
  • 9. Phishing
    attempting to acquire sensitive information such as usernames, passwords and credit card information through an electronic communication.
  • 10. Phishing
    AOHell (1996)
    Transition to Financial Institutions (2001)
    Social Networking Sites (2006)
    Further Development (Present)
  • 11. Spear Phishing
    Targeted versions of phishing
    Phishers are able to determine which banks potential victims use, and target bogus e-mails accordingly.
  • 12. Whaling
    Spear Phishing high profile targets
    Phishing directed specifically at senior level executives, wealthy individuals
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. More Resources
    ID Theft http://www.ftc.gov
    Phishing http://www.antiphishing.org/
    http://www.onguardonline.gov/topics/phishing.aspx

×