SlideShare a Scribd company logo
1 of 15
SEMINAR(102040404)
CYBER CRIME
IDENTITY THEFT
12002040701065
HINAL PRAJAPATI
COMPUTER ENGINEERING
Content
 What is identity theft?
 How Identity Theft Occurs
 Types of Identity Theft
 How to Protect Yourself from Identity Theft
 How to Prevent Identity Theft
 Fighting Identity Theft
 Conclusion
 References
What is identity theft?
 The definition of identity theft is the unauthorized use of
someone’s personal data or documents (usually social
security card or credit cards) to obtain merchandise,
services or credit.
 Identity theft has increasingly become an online
problem.
 The Identity Theft Resource Center (ITRC), which began
collecting data in 2005, lists the primary sources of
online breaches into five major categories.
How Identity Theft Occurs
 Stealing — Beware of leaving your wallet or unopened mail around the house or
in your car. Grab-and-go can happen in a heartbeat.
 Dumpster Diving — Some thieves go through garbage cans to find information,
such as unopened pre-approved credit cards.
 Change Of Address — Thieves can fill out change-of-address request forms.
Once your mail is sent to them, they can access your personal information.
 Cloning Credit Card Information — An employee of, say, a restaurant, gas station
or retail store, can swipe your credit card through a device that copies the
magnetic strip information. It can be transferred to a counterfeit credit card, which
can make purchases.
Types of Identity Theft
 Social ID Theft
 Criminal Identity Theft
 Financial Identity Theft
 Medical ID Theft
 Child ID Theft
 Employment Identity Theft
Financial Identity Theft
 In financial identity theft, someone uses another
person's identity or information to obtain credit,
goods, services, or benefits. This is the most
common form of identity theft.
 What you can do : Check your bills, accounts
and statements regularly. Some criminals may
start by making small credit or debit charges in
hopes you don't notice them, so review the
statements carefully. If you see a charge you
don’t recognize, contact your bank or credit
card company.
Criminal Identity Theft
 In criminal identity theft: a criminal poses as another
person during an arrest to try to avoid a summons,
prevent the discovery of a warrant issued in their real
name, or avoid an arrest or conviction record.
 What you can do : Consider limiting the amount of
personal information you share on social media, as you
never know who might access it. If you are a victim of
criminal identity theft, contact law enforcement
immediately. The Identity Theft Resource Center has
some other information about criminal identity theft.
Child ID Theft
 In child identity theft, someone uses a child's identity for various
forms of personal gain. This is common, as children typically do not
have information associated with them that could pose obstacles for
the perpetrator.
 The fraudster may use the child's name and Social Security number
to obtain a residence, find employment, obtain loans, or avoid arrest
on outstanding warrants. Often, the victim is a family member, the
child of a friend, or someone else close to the perpetrator. Some
people even steal the personal information of deceased loves ones.
How to Protect Yourself from Identity
Theft
 Check Your Credit Report
 Update Virus Software
 Shred
 Old Technology Disposal
 Unsolicited Requests
How to Prevent Identity Theft
 Education
 Coalition on Online Identity Theft
 Padlock your credit file
 Check your credit report annually
 Share personal information only with people and companies you trust
 Make online purchases only with companies having secure connections
 Never give out your personal information over the phone unless you initiated the
call.
 Never have your Social Security number printed on your checks
Fighting Identity Theft
 According to the Indian Law, identity theft is considered to be punishable under
two legislations, namely, the Indian Penal Code (IPC), 1860. and Information
Technology Act (IT Act), 2000. As an offense, identity theft was recognized after
the amendment of the Indian Penal Code by the Information Technology Act,
2000.
 Federal Trade Commission
 Internet Fraud Complaint Center
 U.S. Department of Justice
 Identity Theft Resource Center (ITRC)
 Operation E-con
Conclusion
 In understanding the scope of the identity theft crisis facing society today,
we understand that it arises out of our need to be connected to the Internet.
Side by side, trends in Internet popularity match trends in rising numbers of
identity theft instances. This is due to the huge availability of consumer
information stored in online databases and the relatively easy access others
have to that information.
References
 https://www.identitytheft.gov/
 https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud
 https://oag.ca.gov/idtheft/facts/victim-checklist
THANK
YOU

More Related Content

Similar to 12002040701065 SEMINAR this is ppt in pd

Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention- Mark - Fullbright
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Identity Advocate
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 

Similar to 12002040701065 SEMINAR this is ppt in pd (18)

Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 

Recently uploaded

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

12002040701065 SEMINAR this is ppt in pd

  • 2. Content  What is identity theft?  How Identity Theft Occurs  Types of Identity Theft  How to Protect Yourself from Identity Theft  How to Prevent Identity Theft  Fighting Identity Theft  Conclusion  References
  • 3. What is identity theft?  The definition of identity theft is the unauthorized use of someone’s personal data or documents (usually social security card or credit cards) to obtain merchandise, services or credit.  Identity theft has increasingly become an online problem.  The Identity Theft Resource Center (ITRC), which began collecting data in 2005, lists the primary sources of online breaches into five major categories.
  • 4. How Identity Theft Occurs  Stealing — Beware of leaving your wallet or unopened mail around the house or in your car. Grab-and-go can happen in a heartbeat.  Dumpster Diving — Some thieves go through garbage cans to find information, such as unopened pre-approved credit cards.  Change Of Address — Thieves can fill out change-of-address request forms. Once your mail is sent to them, they can access your personal information.  Cloning Credit Card Information — An employee of, say, a restaurant, gas station or retail store, can swipe your credit card through a device that copies the magnetic strip information. It can be transferred to a counterfeit credit card, which can make purchases.
  • 5. Types of Identity Theft  Social ID Theft  Criminal Identity Theft  Financial Identity Theft  Medical ID Theft  Child ID Theft  Employment Identity Theft
  • 6. Financial Identity Theft  In financial identity theft, someone uses another person's identity or information to obtain credit, goods, services, or benefits. This is the most common form of identity theft.  What you can do : Check your bills, accounts and statements regularly. Some criminals may start by making small credit or debit charges in hopes you don't notice them, so review the statements carefully. If you see a charge you don’t recognize, contact your bank or credit card company.
  • 7.
  • 8. Criminal Identity Theft  In criminal identity theft: a criminal poses as another person during an arrest to try to avoid a summons, prevent the discovery of a warrant issued in their real name, or avoid an arrest or conviction record.  What you can do : Consider limiting the amount of personal information you share on social media, as you never know who might access it. If you are a victim of criminal identity theft, contact law enforcement immediately. The Identity Theft Resource Center has some other information about criminal identity theft.
  • 9. Child ID Theft  In child identity theft, someone uses a child's identity for various forms of personal gain. This is common, as children typically do not have information associated with them that could pose obstacles for the perpetrator.  The fraudster may use the child's name and Social Security number to obtain a residence, find employment, obtain loans, or avoid arrest on outstanding warrants. Often, the victim is a family member, the child of a friend, or someone else close to the perpetrator. Some people even steal the personal information of deceased loves ones.
  • 10. How to Protect Yourself from Identity Theft  Check Your Credit Report  Update Virus Software  Shred  Old Technology Disposal  Unsolicited Requests
  • 11. How to Prevent Identity Theft  Education  Coalition on Online Identity Theft  Padlock your credit file  Check your credit report annually  Share personal information only with people and companies you trust  Make online purchases only with companies having secure connections  Never give out your personal information over the phone unless you initiated the call.  Never have your Social Security number printed on your checks
  • 12. Fighting Identity Theft  According to the Indian Law, identity theft is considered to be punishable under two legislations, namely, the Indian Penal Code (IPC), 1860. and Information Technology Act (IT Act), 2000. As an offense, identity theft was recognized after the amendment of the Indian Penal Code by the Information Technology Act, 2000.  Federal Trade Commission  Internet Fraud Complaint Center  U.S. Department of Justice  Identity Theft Resource Center (ITRC)  Operation E-con
  • 13. Conclusion  In understanding the scope of the identity theft crisis facing society today, we understand that it arises out of our need to be connected to the Internet. Side by side, trends in Internet popularity match trends in rising numbers of identity theft instances. This is due to the huge availability of consumer information stored in online databases and the relatively easy access others have to that information.