Submit Search
Upload
Cscu module 10 social engineering and identity theft
•
1 like
•
45 views
Alireza Ghahrood
Follow
آگاهی رسانی امنیت اطلاعات 2020-1399
Read less
Read more
Services
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 42
Download now
Download to read offline
Recommended
Cscu module 08 securing online transactions
Cscu module 08 securing online transactions
Alireza Ghahrood
How to Save Yourself From SIM Swap Fraud | RBL Bank
How to Save Yourself From SIM Swap Fraud | RBL Bank
rajeevshukhla
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone Phishing
Jacqueline Fick
Awareness of Sim Swap Attack
Awareness of Sim Swap Attack
ijtsrd
Sim swapping
Sim swapping
lalakis2001
E business internet fraud
E business internet fraud
Radiant Minds
Identity theft godwin oyedokun
Identity theft godwin oyedokun
Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE
What is sim swipe fraud
What is sim swipe fraud
CyberSangam
Recommended
Cscu module 08 securing online transactions
Cscu module 08 securing online transactions
Alireza Ghahrood
How to Save Yourself From SIM Swap Fraud | RBL Bank
How to Save Yourself From SIM Swap Fraud | RBL Bank
rajeevshukhla
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone Phishing
Jacqueline Fick
Awareness of Sim Swap Attack
Awareness of Sim Swap Attack
ijtsrd
Sim swapping
Sim swapping
lalakis2001
E business internet fraud
E business internet fraud
Radiant Minds
Identity theft godwin oyedokun
Identity theft godwin oyedokun
Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE
What is sim swipe fraud
What is sim swipe fraud
CyberSangam
Identity as easy as LMNOP
Identity as easy as LMNOP
Eric Sachs
Lloyds Bank fraud guidance
Lloyds Bank fraud guidance
David Atkinson
FNC Personal Protect Workshop
FNC Personal Protect Workshop
forensicsnation
Canadian Consumer Handbook
Canadian Consumer Handbook
- Mark - Fullbright
PhishingandPharming
PhishingandPharming
Dawn Hicks
Internet Fraud
Internet Fraud
Elijah Ezendu
Research Article
Research Article
Tabo Sokhowa
Digital Banking Fraud
Digital Banking Fraud
Victoria Cao
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
Ron Drew
SOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORK
Finance Magnates
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
Siphiwe Msibi
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
Sudeshna07
All about identity_theft
All about identity_theft
Flora Runyenje
All about identity theft
All about identity theft
Mrwilson6
Identity theft power_point
Identity theft power_point
efandeye
Cyber crime
Cyber crime
srishtig993
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014
EMC
Fonreg presentation - official
Fonreg presentation - official
Ayodele Thomas
Understanding identity theft
Understanding identity theft
Page-1-Solutions
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theft
cFirst
Identity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
More Related Content
What's hot
Identity as easy as LMNOP
Identity as easy as LMNOP
Eric Sachs
Lloyds Bank fraud guidance
Lloyds Bank fraud guidance
David Atkinson
FNC Personal Protect Workshop
FNC Personal Protect Workshop
forensicsnation
Canadian Consumer Handbook
Canadian Consumer Handbook
- Mark - Fullbright
PhishingandPharming
PhishingandPharming
Dawn Hicks
Internet Fraud
Internet Fraud
Elijah Ezendu
Research Article
Research Article
Tabo Sokhowa
Digital Banking Fraud
Digital Banking Fraud
Victoria Cao
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
Ron Drew
SOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORK
Finance Magnates
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
Siphiwe Msibi
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
Sudeshna07
All about identity_theft
All about identity_theft
Flora Runyenje
All about identity theft
All about identity theft
Mrwilson6
Identity theft power_point
Identity theft power_point
efandeye
Cyber crime
Cyber crime
srishtig993
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014
EMC
Fonreg presentation - official
Fonreg presentation - official
Ayodele Thomas
What's hot
(19)
Identity as easy as LMNOP
Identity as easy as LMNOP
Lloyds Bank fraud guidance
Lloyds Bank fraud guidance
FNC Personal Protect Workshop
FNC Personal Protect Workshop
Canadian Consumer Handbook
Canadian Consumer Handbook
PhishingandPharming
PhishingandPharming
Internet Fraud
Internet Fraud
Research Article
Research Article
Digital Banking Fraud
Digital Banking Fraud
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
SOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORK
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
All about identity_theft
All about identity_theft
All about identity theft
All about identity theft
Identity theft power_point
Identity theft power_point
Cyber crime
Cyber crime
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014
Fonreg presentation - official
Fonreg presentation - official
Similar to Cscu module 10 social engineering and identity theft
Understanding identity theft
Understanding identity theft
Page-1-Solutions
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theft
cFirst
Identity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
Identity theft godwin oyedokun
Identity theft godwin oyedokun
Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
- Mark - Fullbright
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and Trajectory
TransUnion
Cyber Crime Identity Theft
Cyber Crime Identity Theft
Rahmat Inggi
Identity Theft
Identity Theft
Jonathon Much, ChFC®, AIF®
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
jeelsonani003567
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Quicken Loans Zing Blog
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
Ray Brannon
Identity Theft Prevention
Identity Theft Prevention
Springboard
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
ID Theft
ID Theft
Willhack
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
- Mark - Fullbright
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
- Mark - Fullbright
Social networking and identity theft
Social networking and identity theft
carlgiardina
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
- Mark - Fullbright
Child Identity Theft
Child Identity Theft
- Mark - Fullbright
Similar to Cscu module 10 social engineering and identity theft
(20)
Understanding identity theft
Understanding identity theft
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theft
Identity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Identity theft godwin oyedokun
Identity theft godwin oyedokun
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and Trajectory
Cyber Crime Identity Theft
Cyber Crime Identity Theft
Identity Theft
Identity Theft
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
Identity Theft Prevention
Identity Theft Prevention
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
ID Theft
ID Theft
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
Social networking and identity theft
Social networking and identity theft
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
Child Identity Theft
Child Identity Theft
More from Alireza Ghahrood
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
Alireza Ghahrood
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Alireza Ghahrood
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Alireza Ghahrood
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
Alireza Ghahrood
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
Alireza Ghahrood
ANT Catalog
ANT Catalog
Alireza Ghahrood
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
Alireza Ghahrood
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
Alireza Ghahrood
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
Alireza Ghahrood
Power your businesswith risk informed decisions
Power your businesswith risk informed decisions
Alireza Ghahrood
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Alireza Ghahrood
participatea in the identity management lifecycle
participatea in the identity management lifecycle
Alireza Ghahrood
implement access controls
implement access controls
Alireza Ghahrood
implement authentication mechanisms
implement authentication mechanisms
Alireza Ghahrood
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
Alireza Ghahrood
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
Alireza Ghahrood
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
Alireza Ghahrood
Cscu module 06 internet security
Cscu module 06 internet security
Alireza Ghahrood
Cscu module 07 securing network connections
Cscu module 07 securing network connections
Alireza Ghahrood
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
Alireza Ghahrood
More from Alireza Ghahrood
(20)
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
ANT Catalog
ANT Catalog
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
Power your businesswith risk informed decisions
Power your businesswith risk informed decisions
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
participatea in the identity management lifecycle
participatea in the identity management lifecycle
implement access controls
implement access controls
implement authentication mechanisms
implement authentication mechanisms
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
Cscu module 06 internet security
Cscu module 06 internet security
Cscu module 07 securing network connections
Cscu module 07 securing network connections
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
Recently uploaded
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
apshanarani255
Hyderabad ❣️ Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...
Hyderabad ❣️ Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...
apshanarani255
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
oyomaster143
FARIDABAD CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
FARIDABAD CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
ayushi9330
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
apshanarani255
Thane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book now
Thane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book now
apshanarani255
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
Nitya salvi
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
apshanarani255
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
SivanyaPandeya
Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...
Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...
Monika Rani
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
oyomaster143
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
apshanarani255
Shimla 💋 Call Girl 9748763073 Call Girls in Shimla Escort service book now
Shimla 💋 Call Girl 9748763073 Call Girls in Shimla Escort service book now
apshanarani255
Berhampur Call Girl 97487*63073 Call Girls in Berhampur Escort service book now
Berhampur Call Girl 97487*63073 Call Girls in Berhampur Escort service book now
apshanarani255
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
apshanarani255
Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...
Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...
callgirlsnewdelhi
Silchar Call Girl 97487*63073 Call Girls in Silchar Escort service book now
Silchar Call Girl 97487*63073 Call Girls in Silchar Escort service book now
apshanarani255
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
apshanarani255
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
soniya singh
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
apshanarani255
Recently uploaded
(20)
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Hyderabad ❣️ Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...
Hyderabad ❣️ Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
FARIDABAD CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
FARIDABAD CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Thane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book now
Thane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book now
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...
Vip profile Call Girls In Hyderabad 9748763073 For Genuine Sex Service At Jus...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
Shimla 💋 Call Girl 9748763073 Call Girls in Shimla Escort service book now
Shimla 💋 Call Girl 9748763073 Call Girls in Shimla Escort service book now
Berhampur Call Girl 97487*63073 Call Girls in Berhampur Escort service book now
Berhampur Call Girl 97487*63073 Call Girls in Berhampur Escort service book now
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...
Call Girls In Delhi Just Genuine Call ☎ 9311870488✅ Call Girls Vasant kunj Av...
Silchar Call Girl 97487*63073 Call Girls in Silchar Escort service book now
Silchar Call Girl 97487*63073 Call Girls in Silchar Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Kolkata 💋 Call Girl 9748763073 Call Girls in Kolkata Escort service book now
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Call Girls in Saket (delhi) call me [8264348440 ] escort service 24X7
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
Cscu module 10 social engineering and identity theft
1.
1 Copyright ©
by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Social Engineering and SimplifyingSecurity. IdentityTheft Module 10
2.
11:16:54 ,05/16/2011AMPDT 2 C O
P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . Oakland PoliceShut Down BayArea‐Wide Identity TheftOperation OAKLAND ‐‐ Calling it the biggestthey have seen,Oaklandpolice said Monday that an identity theft operation that manufacturedphony checks,IDs and credit cardshas been shutdown. Officials said there arepotentially thousandsof victims all over the BayArea and in other statesand the possibilityof an untold amount of monetary loss. Police ChiefAnthony Batts said breaking up the operation is particularly important to law enforcementbecauseidentity theft "puts fearin everyone," includinghimself. Theoperation, which Officer Holly Joshicalled a "one‐stop shop" for identity theft,was run out of a Haywardapartment in the 21000 block of Foothill Boulevard,where residentMishel Caviness‐Williams, 40,was arrested last week as she left the apartment.She had $4,000in cash on her,police said. http://www.mercurynews.com
3.
May 23,2011 Suffolk police
areseekingassistancelocating a woman who allegedlytook an elderly man’sdebit card and used it on several occasions. Police have five felony warrantson file forLavonda“Goosie”Moore, 37,for credit cardtheft,credit cardfraud, criminally receivingmoney,third offense petit larcenyand identity theft. Police say Moore took a debit cardfrom the victim on Hill Street on May 15 and used it on multiple occasions at anATM andat retail stores.Therealso is a warranton file for Moore for third offense petit larceny in an unrelatedcase. Moore’s last known address is the 600 block of BrookAvenue.Anyone who has information on Moore’s location is askedto call CrimeLineat 1‐888‐LOCK‐U‐UP.Callers to Crime Lineneverhave to give their names or appear in court,and may be eligible for a rewardof up to$.1,000 http://www.suffolknewsherald.com 3 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . WomanSoughtin Theft
4.
IDENTITY THEFT STATISTICS 2011 %75 11.1 Million 54$billion %13 %4.8 TheTotalFraudAmount Adults Victimsof IdentityTheft FraudAttackson
Existing Credit cardAccounts Percent of Population Victimized by Identity Fraud Victim WhoKnew Crimes WereCommitted http://www.spendonlife.com 4 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
5.
ConsumerComplaint SCENARIO SocialSecurityNumber number of years.A
person got arrestedand producedmy SSN on his arrestsheet. http://www.networkworld.com
6.
MODULE IOBJECT VW Ehat t So
d 6 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
7.
Identity Theft W ha
t to Do if Identity Is Stole n Victim of Ident ity Theft Reporting Identity Theft Prot ection from Identity The ft U L E F How to FLind if You Are a O W Soc ia l Engine ering 7 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
8.
Criminal charges Legal issues It leads to
denial employment, heal carefacilities,mo bank accountsand cards,etc. of th rtgage, credit Financial losses Identity TheftEffects crime offender wrongfullyobtains the intended victim's personalidentifyinginformation,such as date of birth, Social Security WHAT IS IDENTITY THEFT? 8 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
9.
Personal Information that
Can be Stolen Names Address Mother’s maidenname Telephone numbers Passportnumbers Birthcertificates Creditcard/Bank account numbers Drivinglicense numbers Socialsecurity numbers Date ofbirth 9 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
10.
STEAL IDENTITY? Hacking Theft
of PersonalStuff So HOW DO eAerinTg TACKERPShishin Fraudsterpretend to be a financial institutionand send spam/pop‐up messages to trick theuser to reveal personal information Fraudsters may steal wallets and purses, mails including bank and credit card statements, pre‐ approved credit offers,and new checks or tax information Attackers may hackthe computer systems to steal confidential personalinformation It is an act ofmanipulating people trust toperform certain actions or divulging private information, without using technicalcracking methods 10 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
11.
11 Copyright ©
by EC-Council erved. Reproduction is StrictlyProhibited.AllRights Res Whatdo Attackers do with Stolen Identity? Cre dit Card Fraud Phone or Utilit ies Fraud Ot her Fraud They may open a new phone or wirelessaccount in the user’sname, or run up charges on his/her existing account They may use user’sname to get utility services such as electricity,heating, or cable TV They may get a jobusing legitimate user ’sSocial Security number They may give legitimate user ’sinformation topolice during an arrest and ifthey do not turn up for their court date, a warrant for arrest is issued on legitimate user’sname They may open new credit card accounts in the name of the userand do not pay thebills
12.
12 Copyright ©
by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Whatdo Attackers do with Stolen Identity? Bank/Finance Fraud Government DocumentsFraud They may createcounterfeit checks using victim’sname or accountnumber They may open a bank account in victim’sname and issue the checks They may clone an ATM ordebit card and make electronic withdrawals on victim’sname They may takea loan on victims’name They may get a driving license or official ID card issued onlegitimate user’sname but with their photo They may use victim’snameand Social Security number to get government benefits They may file a fraudulent taxreturn using legitimate userinformation
13.
13 Copyright ©
by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Same Name: TRENTCHARLESARSENAUL Original IdentityTheft IDENTITY THEFT EXAMPLE
14.
Identity Theft W ha
t to Do if Identity Is Stole n Victim of Ident ity Theft Soc ia l Engine ering Reporting Identity Theft Prot ection from Identity The ft U L E F How to FLind if You Are a O W 14 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
15.
Soc ia l Engineering Type
s of Social Engine ering Social Engine ers At tempt to Gather SOCIAL ENGINEERING Sensitive information such as credit card details, socialsecurity number,etc. Passwords Otherpersonal information Human basedsocial engineering Computer based socialengineering Social engineering isthe art of convincingpeople to revealconfidential information It is the trick used to gain sensitive information by exploiting the basic human nature 15 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
16.
SOCIAL ENGINEERING EXAMPLE Hi, we are
fromCONSESCO Software. We are hiring new people for our softwaredevelopment team. We got your contactnumber from popular job portals. Please provide details of your jobprofile, current project information, social security number,and your residentialaddress. 16 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
17.
CRIMINAL AS PHONE BANKER Hi,
I am Mike callingfrom CITI Bank Due to increasing threatperception,we areupdating our systems with new security features.Can you provide me your personaldetailsto verifythatyou arerealStella. ThanksMike, Herearemydetails. Doyou need anythingelse? 17 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
18.
AUTHORITY SUPPORT EXAMPLE Hi, I am
JohnBrown. I'm with the external auditorsArthur Sanderson. We've been told by corporate to do asurprise inspection of your disaster recovery procedures. Yourdepartment has 10minutes to show me how you would recover froma website crash. 18 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
19.
TECHNICAL SUPPORT EXAMPLE A man calls
a company’s help desk and s he has forgotten his password. He add that if he misses the deadline on a big advertising project, his boss might firehim. Thehelp desk worker feels sorry forhim and quickly resets the password, unwittingly giving the attacker clear entrance into thecorporate network 19 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
20.
Human-Based Social Engineering Eavesdropping
Shouldersurfing Dumpster diving Eavesdropping is unauthorized listening of conversations or reading of messages It is interception of any form of communication such as audio, video, or written Shoulder surfing is the procedure where the attackerslook over the user ’sshoulder to gain critical information such as passwords, personal identification number, account numbers, credit card information, etc. Attackermay also watch the user from a distance using binoculars in order to get the pieces of information 20 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . Dumpster divingincludes searching for sensitive information at the target company’strash bins, printer trash bins, user desk for sticky notes,etc. It involves collection of phone bills, contact information, financial information, operations related information,etc.
21.
Spam Email Instant Chat Messenger Chain Letters Hoax Letters Pop‐up Windows Windows that suddenly
popup while surfing the Internet and ask for users’information to login or sign‐in Hoax lettersare emails thatissue warnings to the user on new viruses, Trojans,or worms that may harm the user’ssystem Chain letters are emails that offer freegifts such as money and software on the condition that the user has to forwardthe mail to the said number ofpersons Gathering personal information by chatting with a selectedonline user to get information such as birth dates and maidennames Irrelevant, unwanted,and unsolicited email to collectthe financial information, social security numbers, andnetwork information Computer-Based Social Engineering 22 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
22.
2 COMPUTER-BASED SOCIAL An illegitimateemail cElaimNing
tGo beINromEa leEiti RateIsiNeattGemp: iretheuser’s personal or accountinformation Phishing emails orpop‐upsredirectuPserHs to fIakSewHebpIagNesofGmimicking trustworthysites that ask themtosubmit theirpersonalinformation FakeBankWebpage 2 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
23.
23 Copyright ©
by EC-Coun All Rights Reserved. Reproduction is Strictly Prohibit PHONY SECURITY ALERTS Phony SecurityAlerts are the emails or pop‐up windows that seem to befrom a reputed hardware or software manufacturers like Microsoft, Dell,etc., It warns/alerts the user that the system is infected and thus will provide with an attachmentor a link in order to patch thesystem Scammers suggest the user to download and installthose patches The trap is that the file contains maliciousprograms thatmay infect the user system cil ed.
24.
24 Copyright ©
by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Computer-Based Social Engineering through Social NetworkingWebsites social networking websites exploitusers’personalinformation
25.
25 Copyright ©
by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Identity Theft W ha t to Do if Identity Is Stole n Victim of Ident ity Theft Reporting Identity Theft Prot ection from Identity The ft U L E F How to FLind if You Are a O W Soc ia l Engine ering
26.
26 Copyright ©
by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. How toFind if Youare aVictim ofIdentity Theft? Billcollectionagenciescontactyou for overduedebtsyou neverincurred Youreceivebills,invoices, or receiptsaddressedto you for goods or services you haven’t askedfor Youno longer receiveyour credit card or bankstatements Younotice that some of your mailseems to be missing Yourrequestfor mortgage or anyother loanis rejectedcitingyour badcredit history despiteyou havinga good creditrecord
27.
27 Copyright ©
by EC-Council erved. Reproduction is StrictlyProhibited.AllRights Res How toFind if Youare aVictim ofIdentity Theft? Yougetsomething in the mail about an apartment you never rented,a house you neverbought, or ajob you neverheld Youlose important documentssuchas your passport or drivinglicense Youidentify irregularitiesin your creditcard and bank statements Youaredeniedfor social benefits citing that youare alreadyclaiming Youreceive creditcard statementwith newaccount
28.
Identity Theft W ha
t to Do if Identity Is Stole n Victim of Ident ity Theft Reporting Identity Theft Prot ection from Identity The ft U L E F How to FLind if You Are a O W Soc ia l Engine ering 28 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
29.
WHAT TO DO
IF IDENTITY IS STOLEN? Contactthecreditreportingagencies http://www.experian.com http://wwwc.equifax.com http://www.transunion.com Request fora creditreport Immediately inform credit bureaus and establish fraudalerts Review the credit reports and alert the creditagencies 29 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . Freezethe credit reports with credit reporting agencies Contactall of your creditorsand notify them of the fraudulentactivity Change all the passwords ofonline accounts Close the accounts that you know or believe have been tampered with or opened fraudulently
30.
30 Copyright ©
by EC-Council erved. Reproduction is StrictlyProhibited.AllRights Res D WHAT TO DO IF I ENTITY I SSTOLEN? Fileareport with the local police or thepolice in the communitywhere the identity theft took place Filea complaintwith identity theft and cybercrimereporting agencies such as the FTC Takeadvice frompolice and reportingagencies about how to protect yourself from further identitycompromise Ask the creditcard company aboutnew accountnumbers Tellthe debtcollectors that you are avictimof fraud and are not responsible forthe unpaidbill Ask the bank to report the fraudto a consumer reporting agency such as ChexSystemsthatcompiles reports on checking accounts
31.
Identity Theft W ha
t to Do if Identity Is Stole n Victim of Ident ity Theft Reporting Identity Theft Prot ection from Identity The ft U L E F How to FLind if You Are a O W Soc ia l Engine ering 31 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
32.
FEDERALTRADE COMMISSIONon, the nation's
consumer pro ectionagency ,business practices,and identitytheft http://www.ftc.gov 32 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
33.
econsumer.gov 33 C O P
YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . http://www.econsumer.gov econsumer.gov is a portal foryou as a consumer to report complaints about online and related transactions with foreigncompanies
34.
INTERNET CRIME CO CE MPLAINT NTER http://www.ic3.gov The Internet
CrimeComplaint Center ’s(IC3) mission is to serve asa vehicle to receive,develop, andrefer criminal complaints regarding the rapidly expanding arena of cyber crime The Internet Crime ComplaintCenter (IC3) is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of JusticeAssistance (BJA) 34 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
35.
PROSECUTING DI TYENTI THEFBegin the
process by contacting thebureaus, banks, or any other organizations who may be involved File a formalcomplaint with the organization and with the police department Regularly update yourselfregarding the investigation process to ensure that the case is being dealt with properly Obtain a copy of theTpolice complaintto prove to the organizations that you have filed an identity theft complaint File a complaintwith the FederalTrade Commission and complete affidavits to prove your innocence on the claims of identity theft and fraudulent activity Contact the District Attorney's officefor further prosecuting the individuals who may be involved in the identity theft 35 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
36.
Identity Theft W ha
t to Do if Identity Is Stole n Victim of Ident ity Theft Reporting Identity Theft I P H iding Tools U L E F How to FLind if You Are a O W Soc ia l Engine ering 36 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
37.
HIDING IP ADDRESS USING
QUICK HIDE IP TOOL http://www.quick‐hide‐ip.com hides yourinternetidentity you can surfth hiding you realIP location It redirects the Internet traffic through anonymousproxies 37 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
38.
http://www.ultrareach.com IP ADDRESS 38 C O
P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . HIDINGTOOHLideSIP http://www.iphider.org http://www.torproject.org http://www.giantmatrix.com http://www.anonymizer.com
39.
MODULE SUMMARY 39 C O P
YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . Identity theft is the process of using someone else’s personal information for the personal gain of theoffender Criminals look through trash for bills or other paper with personal information on it Criminals callthe victim impersonating a government official or other legitimate business people and request personal information sona Do not reply to unsolicitedemail that asks for Use strong passwords for allfinancialaccounts Review bank/credit card statements/credit reports regularly
40.
40 Copyright ©
by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Nevergive awaysocial security information or private contactinforma tion Ensurethat your nameis not presentin the marketers’hit lists Shred papers with personal information instead of throwing themaway Confirm who you are dealing with, i.e.,a legitimate representative or a legitimate organization over thephone Carry only necessary creditcards Cancelcardsseldom used Review credit reports regularly IDENTITYTHEFT PROTECTION on the phone – unless YOUinitiated theCphHonEecCallKLIST Keep your Social Securitycard,passport, license, and other valuable personal information hidden and locked up
41.
41 Copyright ©
by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Do not carry your Social Securitycardin yourwallet Do not reply to unsolicited email requests forpersonalinformation Do not give personal information over thephone Review bank/credit cardstatements regularly Shred credit cardoffersand “conveniencechecks”that arenot useful Do not storeany financial information on the system and use strong passwords forall financialaccounts Check the telephone and cell phone bills forcalls you did notmake Read beforeyou click, stop pre‐approved credit offers,and readwebsite privacypolicies IDENTITYTHEFT PROTECTION CHECKLIST
42.
42 Copyright ©
by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Computer Based Identity Theft Protection Checklist Keepthecomputeroperatingsystemand otherapplicationsup to date Install antivirussoftwareandscanthesystemregularly Enable firewallprotection Checkforwebsite policies before you enter Becarefulwhileopeningemailattachments Clearthebrowserhistory,logs, and recentlyopenedfileseverytime Checkforsecuredwebsiteswhiletransmittingsensitiveinformation
Download now