Your SlideShare is downloading. ×
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
W A2  Group  P P
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

W A2 Group P P


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson, Saray Vilayhane)
  • 2.
    • Introduction
    • Technology as constant source of convenience
    • Modern society is becoming increasingly reliant
    • Errands online = No privacy
    • Personal information becomes compromised and exposed to computer crime
  • 3.
    • Malware
    • Phishing/Pharming
    • Bank Fraud
    • Identity Theft via Medical Records
  • 4. 1. MALWARE
    • Malware defined as
    • programs written with the intent of being disruptive or damaging to (the user of) a computer or other electronic device; viruses, worms, spyware, etc., collectively.
    • Malware types
    • Destructive
    • Annoying viruses
  • 5.
    • Malware be gone!
    • Removal of unwanted viruses
    • Malwarebytes
    • Remove viruses promptly
    • Restore computer easily and
    • efficiently
  • 6.
    • How to detect “Malicious software” and protect computer
    • Scan viruses
    • Protect and secure private information
  • 7. Technet solutions to protect yourself against Malware
    • Keep your computer’s software patched and current.
    • Only download updates from reputable sources.
    • Always think before you install something, weigh the risks and benefits, and be aware of the fine print.
    • Install and use a firewall.
    • Prevention is always better than a cure !
  • 8. 2. Phishing and Pharming
    • Phishing and Pharming are ways that predators gain access to your  
    • personal information, like bank account info and social security
    • numbers, through your email and web browser.
    • Phishing is a method of online identity theft through email.
    • Pharming is a method of identity theft by way of email and web browser.
  • 9. To protect yourself
    • Don’t click on links within emails that ask for your personal information.
    • Never enter your personal information in a pop-up screen.
    • Protect your computer with spam filters, anti-virus and anti-spyware software, and a firewall—remember to keep them up to date.
    • Only open email attachments if you’re expecting them.
    • Phishing isn’t just through email, but can also happen by phone so be wary of unknown callers asking for personal information.
    • If someone contacts you and says you’ve been a victim of fraud, verify the person’s identity before you provide any personal information.
    • Be careful and aware of pharming—when you go to a site and are redirected to a “copy cat site”. This is another way that your personal info is taken.
  • 10. 3. Bank Fraud
    • Online banking versus Traditional Banking – Convenience
    • Banks can save on operating costs.
    • Popularization has caused fraudulent bank activity.
    • Banks have learned how to better safeguard, but with no guarantee.
    • Two-step process: 1) get your info, then 2) use it to move money
  • 11.
    • Popular fraud schemes to obtain personal information
    • "Phishing" scheme: stems from the two words "password" and "fishing." It entails sending email scams and mail supposedly from the consumer's bank as a way to obtain the consumer's personal information, social insurance number, and in this case their online banking username and password.
    • "Trojan Horse" scheme: unfolds when malicious software (malware) embeds to a consumer's computer without the consumer being aware of it.
  • 12.
    • To protect yourself
    • Do not release your account or card numbers when shopping online if there are other payment options available.
    • Examples: Paypal ; SunTrust Bank program Verified by Visa ; ShopSafe by Bank of America
    • Monitor your credit. For example, use Privacy Assist Premier by Bank of America.
    • Never share your passwords or PINs with anyone
  • 13. To Protect Yourself - continued
    • Never leave your computer unattended while using any online banking or investing service
    • Sign off completely when you are finished banking online
    • Use only secure sites (look for the padlock icon usually located at the bottom of the Web page)
    • Keep anti-virus software up to date
  • 14. 4. Identity Theft via Medical Records
    • Medical Records
    • Just as vulnerable as credit card information
    • Medical records hold very sensitive information
      • Social Security
      • Financial Information
      • Insurance information
    • Records aren’t stored traditionally
  • 15.
    • Technology and Systems
    • As technology advances so does storing information
    • Records are now stored in computer systems
    • Patients are able to access records online
    • Medical facilities and doctor’s offices use wireless networks
    • Many don’t realize how vulnerable these systems and networks are
  • 16.
    • Identity Theft through Medical Records
    • Hacking and Phishing
    • Thieves steal data from systems and wireless networks
    • Reasons for medical identity theft
      • Monetary Gain
      • Medical treatment
    • Danger to both parties
  • 17.
    • Prevention and Detection
    • No 100% guarantee of protection
    • Requires constant monitoring and response
    • Patients should keep a copy of medical records
    • Many states are working on ‘patient alert’ legislation
  • 18. Conclusion
    • Malware, phishing and pharming are all serious threats to consumer safety
    • Safeguards put forth are valuable tools
    • Understand the vulnerability of sensitive information in our connected world
    • Be vigilant in the protection of their own sensitive data
    • Consumers need not suffer from identity theft before learning how to protect themselves