Your SlideShare is downloading. ×
W A2  Group  P P
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

W A2 Group P P


Published on

Published in: Technology

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson, Saray Vilayhane)
  • 2.
    • Introduction
    • Technology as constant source of convenience
    • Modern society is becoming increasingly reliant
    • Errands online = No privacy
    • Personal information becomes compromised and exposed to computer crime
  • 3.
    • Malware
    • Phishing/Pharming
    • Bank Fraud
    • Identity Theft via Medical Records
  • 4. 1. MALWARE
    • Malware defined as
    • programs written with the intent of being disruptive or damaging to (the user of) a computer or other electronic device; viruses, worms, spyware, etc., collectively.
    • Malware types
    • Destructive
    • Annoying viruses
  • 5.
    • Malware be gone!
    • Removal of unwanted viruses
    • Malwarebytes
    • Remove viruses promptly
    • Restore computer easily and
    • efficiently
  • 6.
    • How to detect “Malicious software” and protect computer
    • Scan viruses
    • Protect and secure private information
  • 7. Technet solutions to protect yourself against Malware
    • Keep your computer’s software patched and current.
    • Only download updates from reputable sources.
    • Always think before you install something, weigh the risks and benefits, and be aware of the fine print.
    • Install and use a firewall.
    • Prevention is always better than a cure !
  • 8. 2. Phishing and Pharming
    • Phishing and Pharming are ways that predators gain access to your  
    • personal information, like bank account info and social security
    • numbers, through your email and web browser.
    • Phishing is a method of online identity theft through email.
    • Pharming is a method of identity theft by way of email and web browser.
  • 9. To protect yourself
    • Don’t click on links within emails that ask for your personal information.
    • Never enter your personal information in a pop-up screen.
    • Protect your computer with spam filters, anti-virus and anti-spyware software, and a firewall—remember to keep them up to date.
    • Only open email attachments if you’re expecting them.
    • Phishing isn’t just through email, but can also happen by phone so be wary of unknown callers asking for personal information.
    • If someone contacts you and says you’ve been a victim of fraud, verify the person’s identity before you provide any personal information.
    • Be careful and aware of pharming—when you go to a site and are redirected to a “copy cat site”. This is another way that your personal info is taken.
  • 10. 3. Bank Fraud
    • Online banking versus Traditional Banking – Convenience
    • Banks can save on operating costs.
    • Popularization has caused fraudulent bank activity.
    • Banks have learned how to better safeguard, but with no guarantee.
    • Two-step process: 1) get your info, then 2) use it to move money
  • 11.
    • Popular fraud schemes to obtain personal information
    • "Phishing" scheme: stems from the two words "password" and "fishing." It entails sending email scams and mail supposedly from the consumer's bank as a way to obtain the consumer's personal information, social insurance number, and in this case their online banking username and password.
    • "Trojan Horse" scheme: unfolds when malicious software (malware) embeds to a consumer's computer without the consumer being aware of it.
  • 12.
    • To protect yourself
    • Do not release your account or card numbers when shopping online if there are other payment options available.
    • Examples: Paypal ; SunTrust Bank program Verified by Visa ; ShopSafe by Bank of America
    • Monitor your credit. For example, use Privacy Assist Premier by Bank of America.
    • Never share your passwords or PINs with anyone
  • 13. To Protect Yourself - continued
    • Never leave your computer unattended while using any online banking or investing service
    • Sign off completely when you are finished banking online
    • Use only secure sites (look for the padlock icon usually located at the bottom of the Web page)
    • Keep anti-virus software up to date
  • 14. 4. Identity Theft via Medical Records
    • Medical Records
    • Just as vulnerable as credit card information
    • Medical records hold very sensitive information
      • Social Security
      • Financial Information
      • Insurance information
    • Records aren’t stored traditionally
  • 15.
    • Technology and Systems
    • As technology advances so does storing information
    • Records are now stored in computer systems
    • Patients are able to access records online
    • Medical facilities and doctor’s offices use wireless networks
    • Many don’t realize how vulnerable these systems and networks are
  • 16.
    • Identity Theft through Medical Records
    • Hacking and Phishing
    • Thieves steal data from systems and wireless networks
    • Reasons for medical identity theft
      • Monetary Gain
      • Medical treatment
    • Danger to both parties
  • 17.
    • Prevention and Detection
    • No 100% guarantee of protection
    • Requires constant monitoring and response
    • Patients should keep a copy of medical records
    • Many states are working on ‘patient alert’ legislation
  • 18. Conclusion
    • Malware, phishing and pharming are all serious threats to consumer safety
    • Safeguards put forth are valuable tools
    • Understand the vulnerability of sensitive information in our connected world
    • Be vigilant in the protection of their own sensitive data
    • Consumers need not suffer from identity theft before learning how to protect themselves