SlideShare a Scribd company logo
1 of 19
Identity Theft &
Prevention
PRESENTATION BY
JAMSHED MASOOD
Identity Theft in the Digital Age!!!
• “46000 New IdentityTheftVictim Every Day in 2017” (Javelin
Strategy & Research’s 2017 IdentityTheft Report for USA)
• More than 17 million victims had more than $ 17 billion stolen over the
year.
What’s Identity Theft?
• Identity fraud is defined as the unauthorized
use of another person’s personal information
to achieve illicit financial gains
• Identity fraud can range from simply using a
stolen payment card account, to making a
fraudulent purchase, to taking control of
existing accounts or opening new accounts.
• It’s a serious crime that can wreak havoc with
• Finances
• Credit history
• Insurance
• And Reputation
ID Theft – the breakdown
Types of ID Theft
• Children with:
• CNIC
• No associated information
• No one to pay attention – for years
• Deceased Individuals with:
• CNICs and accounts to close
• Personal data
• Pre-occupied families
• Synthetic Identities:
• False information mixed with real to
create a new identity
• YOU with your:
– Bank and credit accounts
– Investments
– Insurance
– CNIC and Govt documents
Purposes of ID Theft
• To obtain financial and / or medical services and benefits
• To conceal identity, with multiple motives:
• Creditor and tax evasion
• Avoiding criminal records
• Illegal immigration
• Phishing, whaling
• Funding espionage, terrorism
Financial Identity Theft
• The most common variety, used to:
• Steal money
• Bank and investment account fraud
• Obtain credit
• Credit and debit card fraud
• Loan fraud
• Set up a means to launder money
• International crimes
• Consequences include:
• Loss of savings / investments
• Damaged credit
• Tax Losses
Medical ID Theft
• “How Medical IdentityTheft Can GiveYou
a Decade of Headaches” (Bloomberg.com/tech-
blog 11/8/12)
• “…you have to go provider by provider, hospital
by hospital, office by office and correct each
record….
• “…while you’re… trying to clean up the records,
the identity thief can continue to go around and
get medical services in the victim’s name. Really
there’s no way to effectively shut it down.”
• Medical identity fraud is estimated to cost the healthcare
industry almost $40 billion annually, driving up the cost of
healthcare for everyone.
ID Theft Methods
• Account Hijacking
• The fastest growing form of identity
theft; occurs when a criminal obtains
your personal banking information and
uses it to take over your bank
accounts.
• Dumpster Diving: searching
through garbage for personal
information
• Retrieving personal data from IT equipment
and storage media disposed of carelessly
• Retrieving paper bank and credit card
statements from home trash bins
Camera
More ID Theft Methods
• Hacking
• Taking information from computers
through viruses andTrojan horses
• Infiltrating organizations that store and
process large amounts of particularly
valuable personal information
• Shoulder Surfing
• Eavesdropping or looking over
someone’s shoulder to obtain personal
information
Methods, continued
• Phishing and Social Engineering
• Impersonating a reputable institution to gain trust, and then
asking for information.
– Browsing social
networking websites
for personal details
published by users,
often using this
information to
appear more
credible.
Methods, continued
• Just Plain Stealing
• Pickpocketing, housebreaking, or other theft: physically
stealing bank or credit cards, identification cards, passports,
etc.
• Using public records about individual citizens, published in
official registers
– “Skimming”
information from bank
or credit cards
– Exploiting insider access
and abusing the rights
of privileged IT users
Recent Examples close to home
• Accounts Opened and Operated without Knowledge
• Money Laundering
• Accounts of Deceased Operated withoutVerification
• BISP Calls
• Callers Impersonating as Bank Call Centers Asking for Info
• SIM Issuance on CNIC Copies
• Stolen ATM and Credit Cards
• Use of Stolen SIMs in illegal activities
Easy protections
• Do not give out financial information (account numbers, credit
card numbers or your CNIC number) unless you know the
organization or person requesting this information.
• Notify your bank
or credit card
company of any
suspicious phone
inquiries asking
for account
information.
What can you do?
• Take proper steps to safeguard your personal information:
• Carry as few credit cards as possible and periodically check to make sure
you still have them all. Use an aluminum card case.
• Guard your CNIC and Health insurance cards like money.
• Try Not to carry around your CNIC and try not to write your CNIC
number on anything.
– Guard your banking and credit card
PINs (Personal Identification
Numbers) and passwords carefully.
Don’t write them down.
• Make your PINs and passwords hard
for someone else to guess.
• Never use your birth date or any digits
from your CNIC number.
Computer Precautions
• Install a firewall, anti-virus software, and
anti-spam software on your computer
and make sure these systems are
updated often.
• Be wary of pop-ups. Most are just
legitimate ads, but always close them
from theTask Manager. Clicking the X
could install a virus on your computer.
• Don’t open emails from people you
don’t know.
10 Golden Rules
1. There’s no guaranteed get-rich-quick schemes - sound
to good to be true?
2. Never send money or give out your details when you do
not know / trust the person or company you are giving
them to.
3. Destroy personal information, shred documents, credit
cards etc.
4. Log directly onto a website rather than clicking on the
link provided.
5. Never reply to spam emails, even when you're trying to
stop them.
10 Golden Rules
6. Always remember: scammers are cunning and clever.They
know how to manipulate you to produce the response they
want.
7. Legitimate banks and companies will not ask for your details
via email or phone.
8. Just because a company has a well designed website doesn't
means it is legitimate.
9. Be suspicious. If you are unsure about anything, seek advice
from family or Police.
10. Never get embarrassed by reporting a scam – If you spot a
scam or have been scammed contact
http://www.nr3c.gov.pk/
ThankYou!
Feel free to ask
any questions!

More Related Content

What's hot

Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Preventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryPreventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryAsad Hameed
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Kyc (know your customer)
Kyc (know your customer)Kyc (know your customer)
Kyc (know your customer)Kapil Rajput
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering PresentationAudrius Sapola
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primercomplianceonline123
 
Intelligent Banking: AI cases in Retail and Commercial Banking
Intelligent Banking: AI cases in Retail and Commercial BankingIntelligent Banking: AI cases in Retail and Commercial Banking
Intelligent Banking: AI cases in Retail and Commercial BankingDmitry Petukhov
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 

What's hot (20)

Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Preventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryPreventing Bank's Fraud and Forgery
Preventing Bank's Fraud and Forgery
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Kyc (know your customer)
Kyc (know your customer)Kyc (know your customer)
Kyc (know your customer)
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering Presentation
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Intelligent Banking: AI cases in Retail and Commercial Banking
Intelligent Banking: AI cases in Retail and Commercial BankingIntelligent Banking: AI cases in Retail and Commercial Banking
Intelligent Banking: AI cases in Retail and Commercial Banking
 
Aml training
Aml trainingAml training
Aml training
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 

Similar to Identity Theft and How to Prevent Them in the Digital Age

Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Mark Kotzin
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Preventionfmi_igf
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theftnewsusa01
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-researchJustin Saunders
 

Similar to Identity Theft and How to Prevent Them in the Digital Age (20)

Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012Identity Theft Lake Placid 2012
Identity Theft Lake Placid 2012
 
Identity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and PreventionIdentity Theft: Fallout, Investigation, and Prevention
Identity Theft: Fallout, Investigation, and Prevention
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft7 Tips For Preventing Identity Theft
7 Tips For Preventing Identity Theft
 
Not "If" but "When"
Not "If" but "When"Not "If" but "When"
Not "If" but "When"
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 

More from Maven Logix

Transforming Healthcare Through Telemedicine
Transforming Healthcare Through Telemedicine Transforming Healthcare Through Telemedicine
Transforming Healthcare Through Telemedicine Maven Logix
 
Concepts and Rights About Data Privacy and Security
Concepts and Rights About Data Privacy and SecurityConcepts and Rights About Data Privacy and Security
Concepts and Rights About Data Privacy and SecurityMaven Logix
 
How to Response Cyber Data Breaches at Pakistan
How to Response Cyber Data Breaches at PakistanHow to Response Cyber Data Breaches at Pakistan
How to Response Cyber Data Breaches at PakistanMaven Logix
 
Capability Building for Cyber Defense: Software Walk through and Screening
Capability Building for Cyber Defense: Software Walk through and Screening Capability Building for Cyber Defense: Software Walk through and Screening
Capability Building for Cyber Defense: Software Walk through and Screening Maven Logix
 
PostGreSQL Performance Tuning
PostGreSQL Performance TuningPostGreSQL Performance Tuning
PostGreSQL Performance TuningMaven Logix
 
Information Technology in Renewable Energy
Information Technology in Renewable EnergyInformation Technology in Renewable Energy
Information Technology in Renewable EnergyMaven Logix
 

More from Maven Logix (6)

Transforming Healthcare Through Telemedicine
Transforming Healthcare Through Telemedicine Transforming Healthcare Through Telemedicine
Transforming Healthcare Through Telemedicine
 
Concepts and Rights About Data Privacy and Security
Concepts and Rights About Data Privacy and SecurityConcepts and Rights About Data Privacy and Security
Concepts and Rights About Data Privacy and Security
 
How to Response Cyber Data Breaches at Pakistan
How to Response Cyber Data Breaches at PakistanHow to Response Cyber Data Breaches at Pakistan
How to Response Cyber Data Breaches at Pakistan
 
Capability Building for Cyber Defense: Software Walk through and Screening
Capability Building for Cyber Defense: Software Walk through and Screening Capability Building for Cyber Defense: Software Walk through and Screening
Capability Building for Cyber Defense: Software Walk through and Screening
 
PostGreSQL Performance Tuning
PostGreSQL Performance TuningPostGreSQL Performance Tuning
PostGreSQL Performance Tuning
 
Information Technology in Renewable Energy
Information Technology in Renewable EnergyInformation Technology in Renewable Energy
Information Technology in Renewable Energy
 

Recently uploaded

why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 

Recently uploaded (20)

why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 

Identity Theft and How to Prevent Them in the Digital Age

  • 2. Identity Theft in the Digital Age!!! • “46000 New IdentityTheftVictim Every Day in 2017” (Javelin Strategy & Research’s 2017 IdentityTheft Report for USA) • More than 17 million victims had more than $ 17 billion stolen over the year.
  • 3. What’s Identity Theft? • Identity fraud is defined as the unauthorized use of another person’s personal information to achieve illicit financial gains • Identity fraud can range from simply using a stolen payment card account, to making a fraudulent purchase, to taking control of existing accounts or opening new accounts. • It’s a serious crime that can wreak havoc with • Finances • Credit history • Insurance • And Reputation
  • 4. ID Theft – the breakdown
  • 5. Types of ID Theft • Children with: • CNIC • No associated information • No one to pay attention – for years • Deceased Individuals with: • CNICs and accounts to close • Personal data • Pre-occupied families • Synthetic Identities: • False information mixed with real to create a new identity • YOU with your: – Bank and credit accounts – Investments – Insurance – CNIC and Govt documents
  • 6. Purposes of ID Theft • To obtain financial and / or medical services and benefits • To conceal identity, with multiple motives: • Creditor and tax evasion • Avoiding criminal records • Illegal immigration • Phishing, whaling • Funding espionage, terrorism
  • 7. Financial Identity Theft • The most common variety, used to: • Steal money • Bank and investment account fraud • Obtain credit • Credit and debit card fraud • Loan fraud • Set up a means to launder money • International crimes • Consequences include: • Loss of savings / investments • Damaged credit • Tax Losses
  • 8. Medical ID Theft • “How Medical IdentityTheft Can GiveYou a Decade of Headaches” (Bloomberg.com/tech- blog 11/8/12) • “…you have to go provider by provider, hospital by hospital, office by office and correct each record…. • “…while you’re… trying to clean up the records, the identity thief can continue to go around and get medical services in the victim’s name. Really there’s no way to effectively shut it down.” • Medical identity fraud is estimated to cost the healthcare industry almost $40 billion annually, driving up the cost of healthcare for everyone.
  • 9. ID Theft Methods • Account Hijacking • The fastest growing form of identity theft; occurs when a criminal obtains your personal banking information and uses it to take over your bank accounts. • Dumpster Diving: searching through garbage for personal information • Retrieving personal data from IT equipment and storage media disposed of carelessly • Retrieving paper bank and credit card statements from home trash bins Camera
  • 10. More ID Theft Methods • Hacking • Taking information from computers through viruses andTrojan horses • Infiltrating organizations that store and process large amounts of particularly valuable personal information • Shoulder Surfing • Eavesdropping or looking over someone’s shoulder to obtain personal information
  • 11. Methods, continued • Phishing and Social Engineering • Impersonating a reputable institution to gain trust, and then asking for information. – Browsing social networking websites for personal details published by users, often using this information to appear more credible.
  • 12. Methods, continued • Just Plain Stealing • Pickpocketing, housebreaking, or other theft: physically stealing bank or credit cards, identification cards, passports, etc. • Using public records about individual citizens, published in official registers – “Skimming” information from bank or credit cards – Exploiting insider access and abusing the rights of privileged IT users
  • 13. Recent Examples close to home • Accounts Opened and Operated without Knowledge • Money Laundering • Accounts of Deceased Operated withoutVerification • BISP Calls • Callers Impersonating as Bank Call Centers Asking for Info • SIM Issuance on CNIC Copies • Stolen ATM and Credit Cards • Use of Stolen SIMs in illegal activities
  • 14. Easy protections • Do not give out financial information (account numbers, credit card numbers or your CNIC number) unless you know the organization or person requesting this information. • Notify your bank or credit card company of any suspicious phone inquiries asking for account information.
  • 15. What can you do? • Take proper steps to safeguard your personal information: • Carry as few credit cards as possible and periodically check to make sure you still have them all. Use an aluminum card case. • Guard your CNIC and Health insurance cards like money. • Try Not to carry around your CNIC and try not to write your CNIC number on anything. – Guard your banking and credit card PINs (Personal Identification Numbers) and passwords carefully. Don’t write them down. • Make your PINs and passwords hard for someone else to guess. • Never use your birth date or any digits from your CNIC number.
  • 16. Computer Precautions • Install a firewall, anti-virus software, and anti-spam software on your computer and make sure these systems are updated often. • Be wary of pop-ups. Most are just legitimate ads, but always close them from theTask Manager. Clicking the X could install a virus on your computer. • Don’t open emails from people you don’t know.
  • 17. 10 Golden Rules 1. There’s no guaranteed get-rich-quick schemes - sound to good to be true? 2. Never send money or give out your details when you do not know / trust the person or company you are giving them to. 3. Destroy personal information, shred documents, credit cards etc. 4. Log directly onto a website rather than clicking on the link provided. 5. Never reply to spam emails, even when you're trying to stop them.
  • 18. 10 Golden Rules 6. Always remember: scammers are cunning and clever.They know how to manipulate you to produce the response they want. 7. Legitimate banks and companies will not ask for your details via email or phone. 8. Just because a company has a well designed website doesn't means it is legitimate. 9. Be suspicious. If you are unsure about anything, seek advice from family or Police. 10. Never get embarrassed by reporting a scam – If you spot a scam or have been scammed contact http://www.nr3c.gov.pk/
  • 19. ThankYou! Feel free to ask any questions!

Editor's Notes

  1. There are no guaranteed get rich schemes. These schemes are designed to pull people in and scam them out of a lot of money. You should always be suspicious of offers that say “you can win a load of money by clicking on the link or get rich quick by going to this website” If it sound too good to be true its will be.   Never send money or give your details out to any one you haven’t met or do not know or trust. As seen before scammers will develop your trust with the use of online relationships and sob stories.   The same also applies to companies; do not send money or give your details to companies you do not know or trust – Always carry out checks on companies such as addresses and contact information, even searching the address on things like google maps will give you an idea if they are genuine – Banks & legitimate businesses will never ask for you details and information over the phone or by email so do not hand it over.   Destroy any documents, credit/debit cards and anything else with your personal details on. If criminals get hold of your personal information they can carry out criminal activities online with your money and information.   Never be embarrassed to report a scam these scammers are very clever and devious so there is no shame in being deceived. However if you spot a scam or have been scammed yourself you can contact action fraud or alternatively if you know the suspect or their location contact the police immediately.
  2. There are no guaranteed get rich schemes. These schemes are designed to pull people in and scam them out of a lot of money. You should always be suspicious of offers that say “you can win a load of money by clicking on the link or get rich quick by going to this website” If it sound too good to be true its will be.   Never send money or give your details out to any one you haven’t met or do not know or trust. As seen before scammers will develop your trust with the use of online relationships and sob stories.   The same also applies to companies; do not send money or give your details to companies you do not know or trust – Always carry out checks on companies such as addresses and contact information, even searching the address on things like google maps will give you an idea if they are genuine – Banks & legitimate businesses will never ask for you details and information over the phone or by email so do not hand it over.   Destroy any documents, credit/debit cards and anything else with your personal details on. If criminals get hold of your personal information they can carry out criminal activities online with your money and information.   Never be embarrassed to report a scam these scammers are very clever and devious so there is no shame in being deceived. However if you spot a scam or have been scammed yourself you can contact action fraud or alternatively if you know the suspect or their location contact the police immediately.
  3. The audience will now ask questions in relation to Cyber Crime and the Presentation.