0
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Re...
<ul><li>Introduction </li></ul><ul><li>Technology as constant source of convenience  </li></ul><ul><li>Modern society is b...
<ul><li>Malware </li></ul><ul><li>Phishing/Pharming </li></ul><ul><li>Bank Fraud </li></ul><ul><li>Identity Theft via Medi...
1. MALWARE <ul><li>Malware defined as  </li></ul><ul><li>programs written with the intent of being disruptive or damaging ...
<ul><li>Malware be gone! </li></ul><ul><li>Removal of unwanted viruses  </li></ul><ul><li>Malwarebytes </li></ul><ul><li>R...
<ul><li>How to detect “Malicious software” and protect computer  </li></ul><ul><li>Scan viruses </li></ul><ul><li>Protect ...
Technet solutions to protect yourself against Malware <ul><li>Keep your computer’s software patched and current.  </li></u...
2. Phishing and Pharming <ul><li>Phishing and Pharming are ways that predators gain access to your   </li></ul><ul><li>per...
To protect yourself <ul><li>Don’t click on links within emails that ask for your personal information.  </li></ul><ul><li>...
3. Bank Fraud <ul><li>Online banking versus Traditional Banking – Convenience  </li></ul><ul><li>Banks can save on operati...
<ul><li>Popular fraud schemes to obtain personal information </li></ul><ul><li>&quot;Phishing&quot;  scheme: stems from th...
<ul><li>To  protect  yourself  </li></ul><ul><li>Do not release your account or card numbers when shopping online if there...
To Protect Yourself - continued <ul><li>Never leave your computer unattended while using any online banking or investing s...
4. Identity Theft via Medical Records  <ul><li>Medical Records </li></ul><ul><li>Just as vulnerable as credit card informa...
<ul><li>Technology and Systems </li></ul><ul><li>As technology advances so does storing information </li></ul><ul><li>Reco...
<ul><li>Identity Theft through Medical Records  </li></ul><ul><li>Hacking and Phishing </li></ul><ul><li>Thieves steal dat...
<ul><li>Prevention and Detection </li></ul><ul><li>No 100% guarantee of protection </li></ul><ul><li>Requires constant mon...
Conclusion <ul><li>Malware, phishing and pharming are all serious threats to consumer safety </li></ul><ul><li>Safeguards ...
Upcoming SlideShare
Loading in...5
×

W A2 Group P P

467

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
467
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "W A2 Group P P"

  1. 1. Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson, Saray Vilayhane)
  2. 2. <ul><li>Introduction </li></ul><ul><li>Technology as constant source of convenience </li></ul><ul><li>Modern society is becoming increasingly reliant </li></ul><ul><li>Errands online = No privacy </li></ul><ul><li>Personal information becomes compromised and exposed to computer crime </li></ul>
  3. 3. <ul><li>Malware </li></ul><ul><li>Phishing/Pharming </li></ul><ul><li>Bank Fraud </li></ul><ul><li>Identity Theft via Medical Records </li></ul>
  4. 4. 1. MALWARE <ul><li>Malware defined as </li></ul><ul><li>programs written with the intent of being disruptive or damaging to (the user of) a computer or other electronic device; viruses, worms, spyware, etc., collectively. </li></ul><ul><li>Malware types </li></ul><ul><li>Destructive </li></ul><ul><li>Annoying viruses </li></ul>
  5. 5. <ul><li>Malware be gone! </li></ul><ul><li>Removal of unwanted viruses </li></ul><ul><li>Malwarebytes </li></ul><ul><li>Remove viruses promptly </li></ul><ul><li>Restore computer easily and </li></ul><ul><li>efficiently </li></ul>
  6. 6. <ul><li>How to detect “Malicious software” and protect computer </li></ul><ul><li>Scan viruses </li></ul><ul><li>Protect and secure private information </li></ul>
  7. 7. Technet solutions to protect yourself against Malware <ul><li>Keep your computer’s software patched and current. </li></ul><ul><li>Only download updates from reputable sources. </li></ul><ul><li>Always think before you install something, weigh the risks and benefits, and be aware of the fine print. </li></ul><ul><li>Install and use a firewall. </li></ul><ul><li>Prevention is always better than a cure ! </li></ul>
  8. 8. 2. Phishing and Pharming <ul><li>Phishing and Pharming are ways that predators gain access to your   </li></ul><ul><li>personal information, like bank account info and social security </li></ul><ul><li>numbers, through your email and web browser. </li></ul><ul><li>Phishing is a method of online identity theft through email. </li></ul><ul><li>Pharming is a method of identity theft by way of email and web browser. </li></ul><ul><li>  </li></ul><ul><li>  </li></ul>
  9. 9. To protect yourself <ul><li>Don’t click on links within emails that ask for your personal information. </li></ul><ul><li>Never enter your personal information in a pop-up screen. </li></ul><ul><li>Protect your computer with spam filters, anti-virus and anti-spyware software, and a firewall—remember to keep them up to date. </li></ul><ul><li>Only open email attachments if you’re expecting them. </li></ul><ul><li>Phishing isn’t just through email, but can also happen by phone so be wary of unknown callers asking for personal information. </li></ul><ul><li>If someone contacts you and says you’ve been a victim of fraud, verify the person’s identity before you provide any personal information. </li></ul><ul><li>Be careful and aware of pharming—when you go to a site and are redirected to a “copy cat site”. This is another way that your personal info is taken. </li></ul>
  10. 10. 3. Bank Fraud <ul><li>Online banking versus Traditional Banking – Convenience </li></ul><ul><li>Banks can save on operating costs. </li></ul><ul><li>Popularization has caused fraudulent bank activity. </li></ul><ul><li>Banks have learned how to better safeguard, but with no guarantee. </li></ul><ul><li>Two-step process: 1) get your info, then 2) use it to move money </li></ul>
  11. 11. <ul><li>Popular fraud schemes to obtain personal information </li></ul><ul><li>&quot;Phishing&quot; scheme: stems from the two words &quot;password&quot; and &quot;fishing.&quot; It entails sending email scams and mail supposedly from the consumer's bank as a way to obtain the consumer's personal information, social insurance number, and in this case their online banking username and password. </li></ul><ul><li>&quot;Trojan Horse&quot; scheme: unfolds when malicious software (malware) embeds to a consumer's computer without the consumer being aware of it. </li></ul>
  12. 12. <ul><li>To protect yourself </li></ul><ul><li>Do not release your account or card numbers when shopping online if there are other payment options available. </li></ul><ul><li>Examples: Paypal ; SunTrust Bank program Verified by Visa ; ShopSafe by Bank of America </li></ul><ul><li>Monitor your credit. For example, use Privacy Assist Premier by Bank of America. </li></ul><ul><li>Never share your passwords or PINs with anyone </li></ul>
  13. 13. To Protect Yourself - continued <ul><li>Never leave your computer unattended while using any online banking or investing service </li></ul><ul><li>Sign off completely when you are finished banking online </li></ul><ul><li>Use only secure sites (look for the padlock icon usually located at the bottom of the Web page) </li></ul><ul><li>Keep anti-virus software up to date </li></ul>
  14. 14. 4. Identity Theft via Medical Records <ul><li>Medical Records </li></ul><ul><li>Just as vulnerable as credit card information </li></ul><ul><li>Medical records hold very sensitive information </li></ul><ul><ul><li>Social Security </li></ul></ul><ul><ul><li>Financial Information </li></ul></ul><ul><ul><li>Insurance information </li></ul></ul><ul><li>Records aren’t stored traditionally </li></ul>
  15. 15. <ul><li>Technology and Systems </li></ul><ul><li>As technology advances so does storing information </li></ul><ul><li>Records are now stored in computer systems </li></ul><ul><li>Patients are able to access records online </li></ul><ul><li>Medical facilities and doctor’s offices use wireless networks </li></ul><ul><li>Many don’t realize how vulnerable these systems and networks are </li></ul>
  16. 16. <ul><li>Identity Theft through Medical Records </li></ul><ul><li>Hacking and Phishing </li></ul><ul><li>Thieves steal data from systems and wireless networks </li></ul><ul><li>Reasons for medical identity theft </li></ul><ul><ul><li>Monetary Gain </li></ul></ul><ul><ul><li>Medical treatment </li></ul></ul><ul><li>Danger to both parties </li></ul>
  17. 17. <ul><li>Prevention and Detection </li></ul><ul><li>No 100% guarantee of protection </li></ul><ul><li>Requires constant monitoring and response </li></ul><ul><li>Patients should keep a copy of medical records </li></ul><ul><li>Many states are working on ‘patient alert’ legislation </li></ul>
  18. 18. Conclusion <ul><li>Malware, phishing and pharming are all serious threats to consumer safety </li></ul><ul><li>Safeguards put forth are valuable tools </li></ul><ul><li>Understand the vulnerability of sensitive information in our connected world </li></ul><ul><li>Be vigilant in the protection of their own sensitive data </li></ul><ul><li>Consumers need not suffer from identity theft before learning how to protect themselves </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×