SlideShare a Scribd company logo
Id Theft & Phishing By: Audie, Fae, Jeff, and Julia
ID Theft Occurs when an unauthorized party uses your personal information to commit fraud.
Id Theft 10 million cases 1 in 20 adults Fastest Growing Crime Victims are often Arrested
Id Theft (How it Occurs) Phishing Old Mail Dumpster Diving Hacking Online Transactions Lost/Stolen Purse/Wallet
Preventatives Credit Protection Service Run Credit Annually (all 3 agencies) Shred Old Mail Keep Mailing Address Up-to-Date Never Carry Social Security Card Never Give out Personal Information Don’t Carry What You Don’t Need
If You Become AVictim 175 hours, $800 Police Report Obtain Credit Reports FTC Report Get Credit Protection Service Keep Detailed Notes of Conversations Make a list of Names and Numbers Copies of Everything
Phishing attempting to acquire sensitive information such as usernames, passwords and credit card information through an electronic communication.
Phishing AOHell (1996) Transition to Financial Institutions (2001) Social Networking Sites (2006) Further Development (Present)
Spear Phishing Targeted versions of phishing Phishers are able to determine which banks potential victims use, and target bogus e-mails accordingly.
Whaling Spear Phishing high profile targets Phishing directed specifically at senior level executives, wealthy individuals
More Resources ID Theft   http://www.ftc.gov Phishing http://www.antiphishing.org/ http://www.onguardonline.gov/topics/phishing.aspx

More Related Content

What's hot

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic The TNS Group
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-researchJustin Saunders
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Data theft
Data theftData theft
Data theftLaura
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14Naval OPSEC
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
Internet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And HoaxesInternet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And Hoaxeschartwick
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking FraudVictoria Cao
 

What's hot (20)

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Data theft
Data theftData theft
Data theft
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Internet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And HoaxesInternet Scams, Fraud, And Hoaxes
Internet Scams, Fraud, And Hoaxes
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking Fraud
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Similar to Id Theft & Phishing2

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Identity Theft Investigator Training
Identity Theft Investigator TrainingIdentity Theft Investigator Training
Identity Theft Investigator TrainingSLINGR
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theftmkinzie
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Id Theft
Id TheftId Theft
Id Theftmojo_5
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 

Similar to Id Theft & Phishing2 (20)

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft Investigator Training
Identity Theft Investigator TrainingIdentity Theft Investigator Training
Identity Theft Investigator Training
 
ID Theft
ID TheftID Theft
ID Theft
 
Identity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am IIdentity Theft - If you are me, then who am I
Identity Theft - If you are me, then who am I
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theft
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing
PhishingPhishing
Phishing
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Id Theft
Id TheftId Theft
Id Theft
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Phising
PhisingPhising
Phising
 
Features of-scam
Features of-scamFeatures of-scam
Features of-scam
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Identity Theft 101
Identity Theft 101Identity Theft 101
Identity Theft 101
 

Recently uploaded

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134LR1709MUSIC
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptzechu97
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfHenry Tapper
 
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Björn Rohles
 
Get Bad Credit Loans with Guaranteed Approval
Get Bad Credit Loans with Guaranteed ApprovalGet Bad Credit Loans with Guaranteed Approval
Get Bad Credit Loans with Guaranteed ApprovalDollarLoan Hub
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
 
Lars Winkelbauer — Sustainable Development in the Era of Air Cargo Technology
Lars Winkelbauer — Sustainable Development in the Era of Air Cargo TechnologyLars Winkelbauer — Sustainable Development in the Era of Air Cargo Technology
Lars Winkelbauer — Sustainable Development in the Era of Air Cargo Technologylarswinkelbauer23
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxmy Pandit
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideYourLegal Accounting
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small businessBen Wann
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Lviv Startup Club
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdcreerey
 
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAAPETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAAlawrenceads01
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementBojamma2
 
Securing Your Peace of Mind: Private Security Guard Services’
Securing Your Peace of Mind: Private Security Guard Services’Securing Your Peace of Mind: Private Security Guard Services’
Securing Your Peace of Mind: Private Security Guard Services’Dragon Dream Bar
 
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...dvividconsultant15
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
 

Recently uploaded (20)

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
Meaningful Technology for Humans: How Strategy Helps to Deliver Real Value fo...
 
Get Bad Credit Loans with Guaranteed Approval
Get Bad Credit Loans with Guaranteed ApprovalGet Bad Credit Loans with Guaranteed Approval
Get Bad Credit Loans with Guaranteed Approval
 
Commercial RO Plant Manufacturer In Noida.pdf
Commercial RO Plant Manufacturer In Noida.pdfCommercial RO Plant Manufacturer In Noida.pdf
Commercial RO Plant Manufacturer In Noida.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Lars Winkelbauer — Sustainable Development in the Era of Air Cargo Technology
Lars Winkelbauer — Sustainable Development in the Era of Air Cargo TechnologyLars Winkelbauer — Sustainable Development in the Era of Air Cargo Technology
Lars Winkelbauer — Sustainable Development in the Era of Air Cargo Technology
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAAPETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
PETAVIT SIP-01.pdfAAAAAAAAAAAAAAAAAAAAAAAAAAA
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Securing Your Peace of Mind: Private Security Guard Services’
Securing Your Peace of Mind: Private Security Guard Services’Securing Your Peace of Mind: Private Security Guard Services’
Securing Your Peace of Mind: Private Security Guard Services’
 
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
University of Connecticut Fees, Courses, Acceptance Rate, Admission deadline,...
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 

Id Theft & Phishing2

  • 1. Id Theft & Phishing By: Audie, Fae, Jeff, and Julia
  • 2. ID Theft Occurs when an unauthorized party uses your personal information to commit fraud.
  • 3. Id Theft 10 million cases 1 in 20 adults Fastest Growing Crime Victims are often Arrested
  • 4. Id Theft (How it Occurs) Phishing Old Mail Dumpster Diving Hacking Online Transactions Lost/Stolen Purse/Wallet
  • 5.
  • 6.
  • 7. Preventatives Credit Protection Service Run Credit Annually (all 3 agencies) Shred Old Mail Keep Mailing Address Up-to-Date Never Carry Social Security Card Never Give out Personal Information Don’t Carry What You Don’t Need
  • 8. If You Become AVictim 175 hours, $800 Police Report Obtain Credit Reports FTC Report Get Credit Protection Service Keep Detailed Notes of Conversations Make a list of Names and Numbers Copies of Everything
  • 9. Phishing attempting to acquire sensitive information such as usernames, passwords and credit card information through an electronic communication.
  • 10. Phishing AOHell (1996) Transition to Financial Institutions (2001) Social Networking Sites (2006) Further Development (Present)
  • 11. Spear Phishing Targeted versions of phishing Phishers are able to determine which banks potential victims use, and target bogus e-mails accordingly.
  • 12. Whaling Spear Phishing high profile targets Phishing directed specifically at senior level executives, wealthy individuals
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. More Resources ID Theft http://www.ftc.gov Phishing http://www.antiphishing.org/ http://www.onguardonline.gov/topics/phishing.aspx