SlideShare a Scribd company logo
1 of 10
Download to read offline
Prepared by – Sumit Kumar
Approved by – Ganesh Viswanathan
Document Released – 9-Nov-2017
Digital Identity – Threats and
Prevention
v 1.0
www.Quatrro.com
Agenda
 Background : Digital Identity Theft in News
 Identity : Definition
 What is Digital Identity
 Digital Identity Theft – Drivers
 Digital Identity Theft – Ramifications
 Digital Identity Protection – Guidelines
2Quatrro Confidential
www.Quatrro.com
Background : Digital Identity Theft in News
 Equifax said its system struck had been by a cybersecurity incident that
may have affected about 143 million US consumers.
 As per Norton Cyber Security Insights Report 2016, 49% of India’s online
population, or more than 115 million Indians are affected by cybercrime
at some point in time.
3Quatrro Confidential
www.Quatrro.com
Identity : Definition
 We are unique, irreplaceable individuals, right?
 iden·ti·ty “the condition of being the same with something described or
asserted.” (Merriam-Webster)
 Identity is how one is described either by self-assertions or by assertions
of another.
 Real-world example: buying books
4Quatrro Confidential
www.Quatrro.com
What is Digital Identity (DI)
 Digital Identity - Digital identity is a set of characteristics asserted “by
one digital subject about itself or by another digital subject, in a digital
realm.” (Microsoft)
 How well can we identify someone in real life?
 Identification is never perfect. Authentication: three factors
• Something you are
• Something you have
• Something you know
5Quattro Confidential
www.Quatrro.com
Digital Identity - Characteristics
 Digital Identity is comprised of characteristics, or data attributes, such as
the following:
• Username and password
• Aadhaar Number
• Name, Phone number, Date of Birth, Email Address
• Social Security Number
• Medical history, blood group
• Purchasing history or behavior
• Online search activities, like electronic transactions
• Social media profiles
• Bank Transactions
• IP Address of the device
6Quatrro Confidential
www.Quatrro.com
Digital Identity Theft - Drivers
 In today’s world, its lot more easier to extract, collate
information about any individual or organization and build a
profile. This is due to various sources like :
• Rampant data leakages / theft by various threat vectors like hackers, poor
implementation of security in application, database, not enough security measures
taken to protect website, non-compliant with the standard laws, regulations.
• Huge amount of personal information available on Social Media
• Bulk SMS service providers
• Cookies captures internet / website usage behavior
• Shopping websites which asks you to mark favorites
• Data Analytics is now getting utilized in medical / pharma industry. A parent of new
born baby starts receiving calls from kid schools to register for guaranteed seat for pre-
school admissions.
7Quatrro Confidential
www.Quatrro.com
Digital Identity Theft - Ramifications
 Impersonation , Pretexting – unauthorized usage of ones’ identity by
other for financial or other gains.
 Data Fudging – Health insurance, buying restricted medicines misusing
ones’ prescription.
 Money Laundering – unlawful usage of ID proofs like passport for foreign
exchange transactions
 Compromising income tax declarations
8Quatrro Confidential
www.Quatrro.com
Digital Identity Protection - Guidelines
 Following guidelines can be our savior :
• Do not give away your mobile numbers at your disposal.
• All photocopies of all the documents that are submitted need to be stated with purpose
and countersigned by the individual with the date. The person can also strike the
document by pen to avoid misuse.
• Browse in Incognito / In-Private mode
• Google search without logging in
• Look for Opt-out options in your mobile devices, advertising emails, or while taking new
mobile connections.
• If need be to store important files in cloud storage / email, then password protect all
your files.
• Restrict your social media footprints by restricting who can view , comment on post ,
pictures in your profile.
• Do not click on any email, attachments from unknown sender.
• Do not download from websites having pirated software, music, videos, documents.
9Quatrro Confidential
www.Quatrro.comQuatrro Confidential

More Related Content

Similar to Digital Identity Theft Prevention Guide

Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy ARYAS87
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.PdfSanea
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentationYusuf Qadir
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P Ptawnygsu
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sARYAS87
 

Similar to Digital Identity Theft Prevention Guide (20)

Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy
 
Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
 

More from Quatrro Processing Services (QPS)

Are Merchants Losing The CNP Fraud Battle - A QPS Whitepaper
Are Merchants Losing The CNP Fraud Battle - A QPS WhitepaperAre Merchants Losing The CNP Fraud Battle - A QPS Whitepaper
Are Merchants Losing The CNP Fraud Battle - A QPS WhitepaperQuatrro Processing Services (QPS)
 

More from Quatrro Processing Services (QPS) (12)

BLOG | Team QPS At EXCEL'19 - A NYCUA Meeting & Convention
BLOG | Team QPS At EXCEL'19 - A NYCUA Meeting & Convention BLOG | Team QPS At EXCEL'19 - A NYCUA Meeting & Convention
BLOG | Team QPS At EXCEL'19 - A NYCUA Meeting & Convention
 
Are Merchants Losing The CNP Fraud Battle - A QPS Whitepaper
Are Merchants Losing The CNP Fraud Battle - A QPS WhitepaperAre Merchants Losing The CNP Fraud Battle - A QPS Whitepaper
Are Merchants Losing The CNP Fraud Battle - A QPS Whitepaper
 
QPS @ NYCUA EXCEL19 In New York | June 13 - 16
QPS @ NYCUA EXCEL19 In New York | June 13 - 16QPS @ NYCUA EXCEL19 In New York | June 13 - 16
QPS @ NYCUA EXCEL19 In New York | June 13 - 16
 
Team QPS at CUNA GAC 2019
Team QPS at CUNA GAC 2019Team QPS at CUNA GAC 2019
Team QPS at CUNA GAC 2019
 
Rising Menace of Phishing Attacks | Info Graphic | QPS
Rising Menace of Phishing Attacks | Info Graphic | QPSRising Menace of Phishing Attacks | Info Graphic | QPS
Rising Menace of Phishing Attacks | Info Graphic | QPS
 
FBI Warns Rising ATM Cash Out Scam - Fraud Alert!
FBI Warns Rising ATM Cash Out Scam - Fraud Alert!FBI Warns Rising ATM Cash Out Scam - Fraud Alert!
FBI Warns Rising ATM Cash Out Scam - Fraud Alert!
 
Midwest Acquirers Association | MWAA 2018 Conference | QPS
Midwest Acquirers Association | MWAA 2018 Conference | QPSMidwest Acquirers Association | MWAA 2018 Conference | QPS
Midwest Acquirers Association | MWAA 2018 Conference | QPS
 
cyber-monday-holiday-season-fraud-2017-infographic
cyber-monday-holiday-season-fraud-2017-infographiccyber-monday-holiday-season-fraud-2017-infographic
cyber-monday-holiday-season-fraud-2017-infographic
 
Money 2020 | Payments Innovation | FinTech Event
Money 2020 | Payments Innovation | FinTech EventMoney 2020 | Payments Innovation | FinTech Event
Money 2020 | Payments Innovation | FinTech Event
 
Steer Through The Rising Tide of Data Breach
Steer Through The Rising Tide of Data BreachSteer Through The Rising Tide of Data Breach
Steer Through The Rising Tide of Data Breach
 
Lafferty Cards & Payments Conference: September- 2017
Lafferty Cards & Payments Conference: September- 2017Lafferty Cards & Payments Conference: September- 2017
Lafferty Cards & Payments Conference: September- 2017
 
Same Day ACH: The Face of Faster Payment
Same Day ACH: The Face of Faster PaymentSame Day ACH: The Face of Faster Payment
Same Day ACH: The Face of Faster Payment
 

Recently uploaded

Branding strategies of new company .pptx
Branding strategies of new company .pptxBranding strategies of new company .pptx
Branding strategies of new company .pptxVikasTiwari846641
 
Forecast of Content Marketing through AI
Forecast of Content Marketing through AIForecast of Content Marketing through AI
Forecast of Content Marketing through AIRinky
 
VIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceVIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceSapana Sha
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?Juan Pineda
 
SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?Searchable Design
 
Omnichannel Marketing: Defining Omnichannel Marketing
Omnichannel Marketing: Defining Omnichannel MarketingOmnichannel Marketing: Defining Omnichannel Marketing
Omnichannel Marketing: Defining Omnichannel MarketingDove Soft Ltd
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxarsathsahil
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx216310017
 
9654467111 Call Girls In Mahipalpur Women Seeking Men
9654467111 Call Girls In Mahipalpur Women Seeking Men9654467111 Call Girls In Mahipalpur Women Seeking Men
9654467111 Call Girls In Mahipalpur Women Seeking MenSapana Sha
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garsiderobwhite630290
 
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfTOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfasiyahanif9977
 
TAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto SectorTAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto SectorSocial Samosa
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service NagpurRussian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service NagpurCall girls in Ahmedabad High profile
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies bruguardarib
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!dstvtechnician
 
DGTLmart : Digital Solutions for 4X Growth
DGTLmart  : Digital Solutions for 4X GrowthDGTLmart  : Digital Solutions for 4X Growth
DGTLmart : Digital Solutions for 4X Growthcsear2019
 
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...Benjamin Szturmaj
 

Recently uploaded (20)

Branding strategies of new company .pptx
Branding strategies of new company .pptxBranding strategies of new company .pptx
Branding strategies of new company .pptx
 
Forecast of Content Marketing through AI
Forecast of Content Marketing through AIForecast of Content Marketing through AI
Forecast of Content Marketing through AI
 
VIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceVIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts Service
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?
 
SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?SORA AI: Will It Be the Future of Video Creation?
SORA AI: Will It Be the Future of Video Creation?
 
Omnichannel Marketing: Defining Omnichannel Marketing
Omnichannel Marketing: Defining Omnichannel MarketingOmnichannel Marketing: Defining Omnichannel Marketing
Omnichannel Marketing: Defining Omnichannel Marketing
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptx
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx
 
9654467111 Call Girls In Mahipalpur Women Seeking Men
9654467111 Call Girls In Mahipalpur Women Seeking Men9654467111 Call Girls In Mahipalpur Women Seeking Men
9654467111 Call Girls In Mahipalpur Women Seeking Men
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
 
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfTOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
 
TAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto SectorTAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service NagpurRussian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
Russian Call Girls Nagpur Swara 8617697112 Independent Escort Service Nagpur
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdf
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies
 
Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!
 
DGTLmart : Digital Solutions for 4X Growth
DGTLmart  : Digital Solutions for 4X GrowthDGTLmart  : Digital Solutions for 4X Growth
DGTLmart : Digital Solutions for 4X Growth
 
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
 

Digital Identity Theft Prevention Guide

  • 1. Prepared by – Sumit Kumar Approved by – Ganesh Viswanathan Document Released – 9-Nov-2017 Digital Identity – Threats and Prevention v 1.0
  • 2. www.Quatrro.com Agenda  Background : Digital Identity Theft in News  Identity : Definition  What is Digital Identity  Digital Identity Theft – Drivers  Digital Identity Theft – Ramifications  Digital Identity Protection – Guidelines 2Quatrro Confidential
  • 3. www.Quatrro.com Background : Digital Identity Theft in News  Equifax said its system struck had been by a cybersecurity incident that may have affected about 143 million US consumers.  As per Norton Cyber Security Insights Report 2016, 49% of India’s online population, or more than 115 million Indians are affected by cybercrime at some point in time. 3Quatrro Confidential
  • 4. www.Quatrro.com Identity : Definition  We are unique, irreplaceable individuals, right?  iden·ti·ty “the condition of being the same with something described or asserted.” (Merriam-Webster)  Identity is how one is described either by self-assertions or by assertions of another.  Real-world example: buying books 4Quatrro Confidential
  • 5. www.Quatrro.com What is Digital Identity (DI)  Digital Identity - Digital identity is a set of characteristics asserted “by one digital subject about itself or by another digital subject, in a digital realm.” (Microsoft)  How well can we identify someone in real life?  Identification is never perfect. Authentication: three factors • Something you are • Something you have • Something you know 5Quattro Confidential
  • 6. www.Quatrro.com Digital Identity - Characteristics  Digital Identity is comprised of characteristics, or data attributes, such as the following: • Username and password • Aadhaar Number • Name, Phone number, Date of Birth, Email Address • Social Security Number • Medical history, blood group • Purchasing history or behavior • Online search activities, like electronic transactions • Social media profiles • Bank Transactions • IP Address of the device 6Quatrro Confidential
  • 7. www.Quatrro.com Digital Identity Theft - Drivers  In today’s world, its lot more easier to extract, collate information about any individual or organization and build a profile. This is due to various sources like : • Rampant data leakages / theft by various threat vectors like hackers, poor implementation of security in application, database, not enough security measures taken to protect website, non-compliant with the standard laws, regulations. • Huge amount of personal information available on Social Media • Bulk SMS service providers • Cookies captures internet / website usage behavior • Shopping websites which asks you to mark favorites • Data Analytics is now getting utilized in medical / pharma industry. A parent of new born baby starts receiving calls from kid schools to register for guaranteed seat for pre- school admissions. 7Quatrro Confidential
  • 8. www.Quatrro.com Digital Identity Theft - Ramifications  Impersonation , Pretexting – unauthorized usage of ones’ identity by other for financial or other gains.  Data Fudging – Health insurance, buying restricted medicines misusing ones’ prescription.  Money Laundering – unlawful usage of ID proofs like passport for foreign exchange transactions  Compromising income tax declarations 8Quatrro Confidential
  • 9. www.Quatrro.com Digital Identity Protection - Guidelines  Following guidelines can be our savior : • Do not give away your mobile numbers at your disposal. • All photocopies of all the documents that are submitted need to be stated with purpose and countersigned by the individual with the date. The person can also strike the document by pen to avoid misuse. • Browse in Incognito / In-Private mode • Google search without logging in • Look for Opt-out options in your mobile devices, advertising emails, or while taking new mobile connections. • If need be to store important files in cloud storage / email, then password protect all your files. • Restrict your social media footprints by restricting who can view , comment on post , pictures in your profile. • Do not click on any email, attachments from unknown sender. • Do not download from websites having pirated software, music, videos, documents. 9Quatrro Confidential