Id Theft & Phishing2

443 views

Published on

ED451

Published in: Business, Economy & Finance
1 Comment
0 Likes
Statistics
Notes
  • free free download this latest version 100% working.
    download link- http://gg.gg/hqcf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
443
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
15
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Id Theft & Phishing2

  1. 1. Id Theft & Phishing<br />By: Audie, Fae, Jeff, and Julia<br />
  2. 2. ID Theft<br />Occurs when an unauthorized party uses your personal information to commit fraud.<br />
  3. 3. Id Theft<br />10 million cases<br />1 in 20 adults<br />Fastest Growing Crime<br />Victims are often Arrested<br />
  4. 4. Id Theft (How it Occurs)<br />Phishing<br />Old Mail<br />Dumpster Diving<br />Hacking<br />Online Transactions<br />Lost/Stolen Purse/Wallet<br />
  5. 5.
  6. 6.
  7. 7. Preventatives<br />Credit Protection Service<br />Run Credit Annually (all 3 agencies)<br />Shred Old Mail<br />Keep Mailing Address Up-to-Date<br />Never Carry Social Security Card<br />Never Give out Personal Information<br />Don’t Carry What You Don’t Need<br />
  8. 8. If You Become AVictim<br />175 hours, $800<br />Police Report<br />Obtain Credit Reports<br />FTC Report<br />Get Credit Protection Service<br />Keep Detailed Notes of Conversations<br />Make a list of Names and Numbers<br />Copies of Everything<br />
  9. 9. Phishing<br />attempting to acquire sensitive information such as usernames, passwords and credit card information through an electronic communication. <br />
  10. 10. Phishing<br />AOHell (1996)<br />Transition to Financial Institutions (2001)<br />Social Networking Sites (2006)<br />Further Development (Present)<br />
  11. 11. Spear Phishing<br />Targeted versions of phishing<br />Phishers are able to determine which banks potential victims use, and target bogus e-mails accordingly.<br />
  12. 12. Whaling<br />Spear Phishing high profile targets<br />Phishing directed specifically at senior level executives, wealthy individuals<br />
  13. 13.
  14. 14.
  15. 15.
  16. 16.
  17. 17. More Resources<br />ID Theft http://www.ftc.gov<br />Phishing http://www.antiphishing.org/<br />http://www.onguardonline.gov/topics/phishing.aspx<br />

×