SlideShare a Scribd company logo
DATA THEFT Laura Lopez Alpizar
What is data theft? Data theft happens when someone tries to get your personal information illegally through the internet. These people are often known as hackers, and their main goal is to damage or destroy your information or place it on the internet for everyone to use. Hackers use several methods to steal your information, for instance, enter your social network account, place virus on certain websites, through spam E-mail, and the list goes on.
Why steal this information? Your information is valuable to hackers as it is for you for they can have access to important privileges as accessing your bank account. Others just steal your information to sell it to other sites.
Is it a common thing to commit identity theft? Yes, I believe identity theft is the most common way to steal other’s confidential information, for normal users are not aware that they also need to protect what is inside their computers.
What can people do to protect themselves against data theft? Create passwords at least twelve digits long. Make sure it is an alphanumeric (numbers and characters) password to make it hard to decode. Replace password every two or three months if necessary.  Never leave your email accounts or bank account information open in public areas while away from the computer. Never check your bank balances from a public place.
Other ways to prevent identity theft. Use antivirus with firewall. Scan your computer at least once a month. Delete temporary files and cookies from the browser after using the internet or after each session.
What are some other interesting facts about data theft? Identity theft happens even without you noticing. Always try block your computer when leaving the workstation. When checking banking information, check the address bar and make sure it is the correct site. Don't use birthdates, license plate numbers or pet names as passwords.

More Related Content

What's hot

Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
English Online Inc.
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit18
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
Jeetendra Khilnani
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
Jagan Mohan
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
Angela Lawson
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Phishing
PhishingPhishing
Phishing
anjalika sinha
 
Identity theft
Identity theftIdentity theft
Identity theft
Ashley Arkfeld
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Phishing
PhishingPhishing
Phishing
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 

Viewers also liked

Ice climbing
Ice climbingIce climbing
Ice climbing
Laura
 
Hardware theft
Hardware theftHardware theft
Hardware theft
chrispaul8676
 
Memory unit
Memory unitMemory unit
Memory unit
Sajal Sirohi
 
Scsi(small computer system interface)nik
Scsi(small computer system interface)nikScsi(small computer system interface)nik
Scsi(small computer system interface)nik
Nikhil Joshi
 
Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
Invasion of Privacy
Invasion of PrivacyInvasion of Privacy
Invasion of Privacy
StudentPressLawCenter
 
SCSI Protocol
SCSI ProtocolSCSI Protocol
SCSI Protocol
Rakesh T
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Upekha Vandebona
 
Control unit
Control unitControl unit
Control unit
Piyush Rochwani
 
Types of elasticity of demand
Types of elasticity of demandTypes of elasticity of demand
Types of elasticity of demand
Nikhil Soares
 
Arithmetic Logic Unit (ALU)
Arithmetic Logic Unit (ALU)Arithmetic Logic Unit (ALU)
Arithmetic Logic Unit (ALU)
Student
 
Computer crime
 Computer crime Computer crime
Computer crime
Anika Rahman Orin
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
Input Output Organization
Input Output OrganizationInput Output Organization
Input Output Organization
Kamal Acharya
 
Elasticity Of Demand
Elasticity Of DemandElasticity Of Demand
Elasticity Of Demand
bhawnabhatnagar
 

Viewers also liked (15)

Ice climbing
Ice climbingIce climbing
Ice climbing
 
Hardware theft
Hardware theftHardware theft
Hardware theft
 
Memory unit
Memory unitMemory unit
Memory unit
 
Scsi(small computer system interface)nik
Scsi(small computer system interface)nikScsi(small computer system interface)nik
Scsi(small computer system interface)nik
 
Data encryption
Data encryptionData encryption
Data encryption
 
Invasion of Privacy
Invasion of PrivacyInvasion of Privacy
Invasion of Privacy
 
SCSI Protocol
SCSI ProtocolSCSI Protocol
SCSI Protocol
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Control unit
Control unitControl unit
Control unit
 
Types of elasticity of demand
Types of elasticity of demandTypes of elasticity of demand
Types of elasticity of demand
 
Arithmetic Logic Unit (ALU)
Arithmetic Logic Unit (ALU)Arithmetic Logic Unit (ALU)
Arithmetic Logic Unit (ALU)
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Input Output Organization
Input Output OrganizationInput Output Organization
Input Output Organization
 
Elasticity Of Demand
Elasticity Of DemandElasticity Of Demand
Elasticity Of Demand
 

Similar to Data theft

Cyber crime
Cyber crimeCyber crime
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
Internet Security
Internet SecurityInternet Security
Internet Security
Avnish Jain
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
STO STRATEGY
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
Carson City Library
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
NorthCoastHDI
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
aaberra
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
DigitalLifeAdvisor.com
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Nazish Jamali
 
Hacking
HackingHacking
Hacking
vkradhika
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
JIJO CLEETUS
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
selcukca84
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
NehaRohtagi1
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
Mustafa Kuğu
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HemantSharma134028
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 

Similar to Data theft (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Hacking
HackingHacking
Hacking
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Internet security
Internet securityInternet security
Internet security
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 

More from Laura

Advertising
AdvertisingAdvertising
Advertising
Laura
 
Disney World
Disney WorldDisney World
Disney World
Laura
 
C arne o pollo
C arne o polloC arne o pollo
C arne o pollo
Laura
 
Presentación de Comunicación
Presentación de ComunicaciónPresentación de Comunicación
Presentación de Comunicación
Laura
 
Presentación Comunicación
Presentación ComunicaciónPresentación Comunicación
Presentación Comunicación
Laura
 
Violoncello
VioloncelloVioloncello
Violoncello
Laura
 
Violoncello
VioloncelloVioloncello
Violoncello
Laura
 

More from Laura (7)

Advertising
AdvertisingAdvertising
Advertising
 
Disney World
Disney WorldDisney World
Disney World
 
C arne o pollo
C arne o polloC arne o pollo
C arne o pollo
 
Presentación de Comunicación
Presentación de ComunicaciónPresentación de Comunicación
Presentación de Comunicación
 
Presentación Comunicación
Presentación ComunicaciónPresentación Comunicación
Presentación Comunicación
 
Violoncello
VioloncelloVioloncello
Violoncello
 
Violoncello
VioloncelloVioloncello
Violoncello
 

Data theft

  • 1. DATA THEFT Laura Lopez Alpizar
  • 2. What is data theft? Data theft happens when someone tries to get your personal information illegally through the internet. These people are often known as hackers, and their main goal is to damage or destroy your information or place it on the internet for everyone to use. Hackers use several methods to steal your information, for instance, enter your social network account, place virus on certain websites, through spam E-mail, and the list goes on.
  • 3. Why steal this information? Your information is valuable to hackers as it is for you for they can have access to important privileges as accessing your bank account. Others just steal your information to sell it to other sites.
  • 4. Is it a common thing to commit identity theft? Yes, I believe identity theft is the most common way to steal other’s confidential information, for normal users are not aware that they also need to protect what is inside their computers.
  • 5. What can people do to protect themselves against data theft? Create passwords at least twelve digits long. Make sure it is an alphanumeric (numbers and characters) password to make it hard to decode. Replace password every two or three months if necessary.  Never leave your email accounts or bank account information open in public areas while away from the computer. Never check your bank balances from a public place.
  • 6. Other ways to prevent identity theft. Use antivirus with firewall. Scan your computer at least once a month. Delete temporary files and cookies from the browser after using the internet or after each session.
  • 7. What are some other interesting facts about data theft? Identity theft happens even without you noticing. Always try block your computer when leaving the workstation. When checking banking information, check the address bar and make sure it is the correct site. Don't use birthdates, license plate numbers or pet names as passwords.