IDENTITY THEFT- HOW ITS LINKED TO           COMPUTERS     An informational power point by Kailey French
WHAT IS IDENTITY THEFT?DEFINITION : The crime of obtaining the personal or financialinformation of another person for the ...
Whose affectedO 1 in 8 people have been affected in the last 5   years by identity theft.O About 10 million people every y...
How its linked to the computer• You may not know it, but your computer collects all  kinds of information about you and st...
HOW THEY GET THISINFORMATION  This information can be consumed 2 different ways threw the                           comput...
Anyone can stealsomeones identity, sonever trust anyone withpersonal information suchas security cards, creditcards, and o...
The best way to protect yourself online or at home.Never keep your Social Security Number in your purse or walletCheck ban...
WORK CITED•   http://identitytheft.lifetips.com/faq/133477/0/how-many-people-are-victims-of-identity-theft-    each-year/i...
Upcoming SlideShare
Loading in …5
×

Identity theft how its linked to computers

738 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
738
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Identity theft how its linked to computers

  1. 1. IDENTITY THEFT- HOW ITS LINKED TO COMPUTERS An informational power point by Kailey French
  2. 2. WHAT IS IDENTITY THEFT?DEFINITION : The crime of obtaining the personal or financialinformation of another person for the sole purpose ofassuming that persons name or identity in order to maketransactions or purchases.
  3. 3. Whose affectedO 1 in 8 people have been affected in the last 5 years by identity theft.O About 10 million people every year are affectedO That’s 19 new victims every minuteThe trends Not Slowing!Between 2001 and 2002 the reported incidenceof identity theft rose 20 percent, and between2002 and 2003 it increased a whopping 80percent.
  4. 4. How its linked to the computer• You may not know it, but your computer collects all kinds of information about you and stores it in files hidden deep on your hard drive.• Files like browser history and other temporary Internet files can be used to reconstruct your online habits.• These files store information like logins and passwords, names addresses, and even credit card numbers.
  5. 5. HOW THEY GET THISINFORMATION This information can be consumed 2 different ways threw the computer.Either it can be grabbed when it is being sent over an unsecuredtransmission, orSoftware can be installed on your computer (like spyware) threw avirus that will collect everything needed to steal your identity andit automatically send it back to the person through e-mail, or somekind of account. Other ways of obtaining this information could be by phishing where you create a key log that requires the person to re-enter there password and or username, then the information is sent back to creator of the key log’s email.
  6. 6. Anyone can stealsomeones identity, sonever trust anyone withpersonal information suchas security cards, creditcards, and other things thatcould be used to steal youridentity. What can beWith stolen identity you can done withdo almostanything, purchase items your infoonline or off a shoppingchannel, carshouses, paraphernalia fromstores, and in extremecases even houses or cars.
  7. 7. The best way to protect yourself online or at home.Never keep your Social Security Number in your purse or walletCheck bank account balances weeklyRequest credit reports from the major credit card companies annuallyNever leave personal information in your vehiclePlace passwords on credit cards, bank and phone accounts, as well as on computers. Keep thepassword in a safe spot do Not save it in a file on your computer, it can be retrieved bysomeone trying to steal you identity.Keep all your personal information in locked files, and review how you carry, send, and storepersonal files safelyShred all your trash that contains personal information, such as your name, address, andphone number. Install and regularly update firewalls and anti-viruses on your computer toprotect it from hackers and Internet virusesUnless you have instigated the communication, do not give out any personal informationonline, over the phone, or through the mailNever use unsecured mailboxes, but deposit all of your outgoing mail in locked boxes, at thepost office, or in local collection boxes.check your mailbox regularly for incoming mail and removing it promptly.
  8. 8. WORK CITED• http://identitytheft.lifetips.com/faq/133477/0/how-many-people-are-victims-of-identity-theft- each-year/index.html• http://articles.winferno.com/computer-fraud/internet-identity-theft/• http://lifelockprotection.wordpress.com/top-10-best-ways-to-protect-yourself-from-identity- theft/• http://www.google.com/search?tbm=isch&hl=en&source=hp&biw=1280&bih=929&q=shad ow+of+computer&gbv=2&oq=shadow+of+computer&aq=f&aqi=&aql=&gs_l=img.3...502.44 14.0.4502.18.11.0.0.0.0.0.0..0.0...0.0.Iod9511K4Ug#hl=en&safe=strict&gbv=2&tbm=isch& sa=1&q=shopping+bags&oq=shopping+bags&aq=f&aqi=&aql=&gs_l=img.3...138620.1419 09.0.142115.15.13.1.0.0.0.177.616.3j3.6.0...0.0.ljUguWaW8Og&bav=on.2,or.r_gc.r_pw.,cf .osb&fp=2eabc3fc941d8678&biw=1280&bih=929http://www.google.com/search?tbm=isch&hl=en&source=hp&biw=1280&bih=929&q=shadow+of+computer&gbv=2&oq=shadow+of+computer&aq=f&aqi=&aql=&gs_l=img.3...502.4414.0.4502.18.11.0.0.0.0.0.0..0.0...0.0.Iod9511K4Ug

×