SlideShare a Scribd company logo
Credit Card Fraud
Credit card fraud -
situation when an
individual uses another
individual’s credit card
for personal reasons
while the owner is not
aware of this fact
Credit card frauds are committed
in the following ways:
an act of criminal deception by
use of unauthorized account or
personal information
illegal or unauthorized use of
account for personal gain
misrepresentation of account
information
Modus operandi for credit card frauds:
lost or stolen card - 48%
identity theft - 15%
skimming - 14%
counterfeit card - 12%
phishing - 6%
other - 5%
Stolen
most issuers have
24 - hour telephone
numbers
unauthorized
purchases until it
canceled
Identity theft
social security or
driver’s license
numbers
false credentials for
immigration
attributed to the
victim
account takeover
true name theft
Scimming
illegal copying of
information from the
magnetic strip of a
credit card
fake or ‘cloned’ card
with your details on it
borrowing money
and taking out loans
Phishing
massive numbers of
phony e-mails to
consumers
e-mails look legitimate
victims are directed to
a fake web site
The 9 million world-wide
bank robbery
Sergei Tšurikov (Estonia) found a
path of entry into the RBS computer
network
Managed an existing ring of cashiers
Distributed fraudulently obtained
debit card account numbers and PIN
codes
Hacking rings raised the accounts
limits on compromised accounts
44 counterfeit payroll debit cards
Be careful!
Destroy your expired cards
Immediately sign new cards
Don’t keep your PIN in your wallet
Treat credit cards as if they were real money
Lost or stolen cards should be reported immediately
Be cautious when giving information to websites or
unknown individuals
Verify transactions on your statement with your receipts
Keep an eye on the credit card when making
transactions in shops
Don’t sign a blank credit card receipt
Don’t borrow your cards
Guidelines to protect yourself from credit
card fraud:

More Related Content

Similar to AndranikKarapetyanSlides.ppt

Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
- Mark - Fullbright
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
quentinz52
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
quentinz52
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
- Mark - Fullbright
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
jesusamckone
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
herminaprocter
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
- Mark - Fullbright
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
Ron Drew
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
Dixita S
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
nickski51
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-researchJustin Saunders
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
PawanKumarJha7
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
PawanKumarJha7
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
Zev Aidikoff
 
101 Ways Your Identity Can Be Stolen
101 Ways Your Identity Can Be Stolen101 Ways Your Identity Can Be Stolen
101 Ways Your Identity Can Be Stolen
Acuant
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
jagannath ojha
 

Similar to AndranikKarapetyanSlides.ppt (20)

Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
 
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
1CYBER CRIMEChapter 5Objectives· Understand the differen.docx
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
101 Ways Your Identity Can Be Stolen
101 Ways Your Identity Can Be Stolen101 Ways Your Identity Can Be Stolen
101 Ways Your Identity Can Be Stolen
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 

More from Hilsonyusuf

Risk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptxRisk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptx
Hilsonyusuf
 
Introduction to propoal.docx
 Introduction to propoal.docx Introduction to propoal.docx
Introduction to propoal.docx
Hilsonyusuf
 
PPT-6 How to buy and sell shares in Stock Exchange.pptx
PPT-6 How to buy and sell shares in Stock Exchange.pptxPPT-6 How to buy and sell shares in Stock Exchange.pptx
PPT-6 How to buy and sell shares in Stock Exchange.pptx
Hilsonyusuf
 
CASH MANAGEMENT.pptx
CASH MANAGEMENT.pptxCASH MANAGEMENT.pptx
CASH MANAGEMENT.pptx
Hilsonyusuf
 
Assessing The Effect of Financial Technology Innovation.pptx
Assessing The Effect of Financial Technology Innovation.pptxAssessing The Effect of Financial Technology Innovation.pptx
Assessing The Effect of Financial Technology Innovation.pptx
Hilsonyusuf
 
Designing Compliance Strategies for Strengthening AML-CFT Compliance -FITC UP...
Designing Compliance Strategies for Strengthening AML-CFT Compliance -FITC UP...Designing Compliance Strategies for Strengthening AML-CFT Compliance -FITC UP...
Designing Compliance Strategies for Strengthening AML-CFT Compliance -FITC UP...
Hilsonyusuf
 
Bank Reconciliation.ppt
Bank Reconciliation.pptBank Reconciliation.ppt
Bank Reconciliation.ppt
Hilsonyusuf
 
WORK PLACE VIOLENCE PREVENTION IN NIGERIA.ppt
WORK PLACE VIOLENCE PREVENTION IN NIGERIA.pptWORK PLACE VIOLENCE PREVENTION IN NIGERIA.ppt
WORK PLACE VIOLENCE PREVENTION IN NIGERIA.ppt
Hilsonyusuf
 
MLA 7e PPT.ppt
MLA 7e PPT.pptMLA 7e PPT.ppt
MLA 7e PPT.ppt
Hilsonyusuf
 
capital market and human security, Defense college-3.pptx
capital market and human security,  Defense college-3.pptxcapital market and human security,  Defense college-3.pptx
capital market and human security, Defense college-3.pptx
Hilsonyusuf
 

More from Hilsonyusuf (10)

Risk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptxRisk-Analysis-Power-Point (2).pptx
Risk-Analysis-Power-Point (2).pptx
 
Introduction to propoal.docx
 Introduction to propoal.docx Introduction to propoal.docx
Introduction to propoal.docx
 
PPT-6 How to buy and sell shares in Stock Exchange.pptx
PPT-6 How to buy and sell shares in Stock Exchange.pptxPPT-6 How to buy and sell shares in Stock Exchange.pptx
PPT-6 How to buy and sell shares in Stock Exchange.pptx
 
CASH MANAGEMENT.pptx
CASH MANAGEMENT.pptxCASH MANAGEMENT.pptx
CASH MANAGEMENT.pptx
 
Assessing The Effect of Financial Technology Innovation.pptx
Assessing The Effect of Financial Technology Innovation.pptxAssessing The Effect of Financial Technology Innovation.pptx
Assessing The Effect of Financial Technology Innovation.pptx
 
Designing Compliance Strategies for Strengthening AML-CFT Compliance -FITC UP...
Designing Compliance Strategies for Strengthening AML-CFT Compliance -FITC UP...Designing Compliance Strategies for Strengthening AML-CFT Compliance -FITC UP...
Designing Compliance Strategies for Strengthening AML-CFT Compliance -FITC UP...
 
Bank Reconciliation.ppt
Bank Reconciliation.pptBank Reconciliation.ppt
Bank Reconciliation.ppt
 
WORK PLACE VIOLENCE PREVENTION IN NIGERIA.ppt
WORK PLACE VIOLENCE PREVENTION IN NIGERIA.pptWORK PLACE VIOLENCE PREVENTION IN NIGERIA.ppt
WORK PLACE VIOLENCE PREVENTION IN NIGERIA.ppt
 
MLA 7e PPT.ppt
MLA 7e PPT.pptMLA 7e PPT.ppt
MLA 7e PPT.ppt
 
capital market and human security, Defense college-3.pptx
capital market and human security,  Defense college-3.pptxcapital market and human security,  Defense college-3.pptx
capital market and human security, Defense college-3.pptx
 

Recently uploaded

Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdfPensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Henry Tapper
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
marketing367770
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
mikemetalprod
 
An Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault worksAn Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault works
Colin R. Turner
 
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
nexop1
 
Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
Colin R. Turner
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
DOT TECH
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
一比一原版(UCSB毕业证)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB毕业证)圣芭芭拉分校毕业证如何办理一比一原版(UCSB毕业证)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB毕业证)圣芭芭拉分校毕业证如何办理
bbeucd
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Kezex (KZX)
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
Seminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership NetworksSeminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership Networks
GRAPE
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
conose1
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
egoetzinger
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
GRAPE
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
University of Calabria
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
muslimdavidovich670
 
How Does CRISIL Evaluate Lenders in India for Credit Ratings
How Does CRISIL Evaluate Lenders in India for Credit RatingsHow Does CRISIL Evaluate Lenders in India for Credit Ratings
How Does CRISIL Evaluate Lenders in India for Credit Ratings
Shaheen Kumar
 

Recently uploaded (20)

Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdfPensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
 
An Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault worksAn Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault works
 
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
 
Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
 
一比一原版(UCSB毕业证)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB毕业证)圣芭芭拉分校毕业证如何办理一比一原版(UCSB毕业证)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB毕业证)圣芭芭拉分校毕业证如何办理
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
Seminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership NetworksSeminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership Networks
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
 
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...Eco-Innovations and Firm Heterogeneity.Evidence from Italian Family and Nonf...
Eco-Innovations and Firm Heterogeneity. Evidence from Italian Family and Nonf...
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
 
How Does CRISIL Evaluate Lenders in India for Credit Ratings
How Does CRISIL Evaluate Lenders in India for Credit RatingsHow Does CRISIL Evaluate Lenders in India for Credit Ratings
How Does CRISIL Evaluate Lenders in India for Credit Ratings
 

AndranikKarapetyanSlides.ppt

  • 2. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not aware of this fact
  • 3. Credit card frauds are committed in the following ways: an act of criminal deception by use of unauthorized account or personal information illegal or unauthorized use of account for personal gain misrepresentation of account information
  • 4. Modus operandi for credit card frauds: lost or stolen card - 48% identity theft - 15% skimming - 14% counterfeit card - 12% phishing - 6% other - 5%
  • 5. Stolen most issuers have 24 - hour telephone numbers unauthorized purchases until it canceled
  • 6. Identity theft social security or driver’s license numbers false credentials for immigration attributed to the victim account takeover true name theft
  • 7. Scimming illegal copying of information from the magnetic strip of a credit card fake or ‘cloned’ card with your details on it borrowing money and taking out loans
  • 8. Phishing massive numbers of phony e-mails to consumers e-mails look legitimate victims are directed to a fake web site
  • 9. The 9 million world-wide bank robbery
  • 10. Sergei Tšurikov (Estonia) found a path of entry into the RBS computer network Managed an existing ring of cashiers Distributed fraudulently obtained debit card account numbers and PIN codes Hacking rings raised the accounts limits on compromised accounts 44 counterfeit payroll debit cards
  • 12. Destroy your expired cards Immediately sign new cards Don’t keep your PIN in your wallet Treat credit cards as if they were real money Lost or stolen cards should be reported immediately Be cautious when giving information to websites or unknown individuals Verify transactions on your statement with your receipts Keep an eye on the credit card when making transactions in shops Don’t sign a blank credit card receipt Don’t borrow your cards Guidelines to protect yourself from credit card fraud: