SlideShare a Scribd company logo
[object Object],[object Object],Identity Fraud By: Sanea&Keerthana 
What exactly is Identity Fraud? Identity fraud is referred to a big crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud. Identity is unique to you and cannot be given to someone else for their use, your personal data ­ especially your Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data ­ can be used, if they fall into the wrong hands, to personally profit at your expense. In many cases, a victim's losses may include not only out-of-pocket financial losses, but substantial additional.
All of your personal information such as your credit card number, where you live, your phone number, Medicare number, license number date of birth etc….are stored in a database. A fraud can steal from your purse or wallet but the most common way is through a computer or database where they can get a hold of your personal information by either using Trojans, phishing , hacking in or using the zero day attack.  These thieves are able to log onto a public computer you were on and hack their way into finding what you were doing. They are even able to research from government registers, search engines Google) or public records. They are able to obtains information from organizations which store quite a large amount of personal information. - By browsing on social networks such as MySpace, face book, bebo etc…they are able to get hold of any of your personal information and therefore be misused. How are databases involved in Identity Theft
How are databases involved in Identity Theft
The type of data stored about individuals in relation to Identity Theft
Types of ways this data can be misused in relation    to identity theft All your personal information (as mentioned before) if obtained is able to misused in many ways. This includes -By obtaining your credit card details this being your pin number , card number, deposit slip etc….)and using these “identity” token the thieves are able to access your savings, funds from an ATM or retail casher. They are also able to make debits such as withdrawals, purchases or checks.  - An account takeover is possible as well, where the stealer takes control over the account by rerouting the credit card statements to a new address. -They are able create new accounts using another persons identity - If they get hold of a persons insurance information , they are able to use the person’s identity information’s to obtain medical services, such as going to a doctor or goods like medicines). So therefore the thief is putting medical entries into the victims existing medical records.
Types of ways this data can be misused in relation  to identity theft apply for a loan.
Ethical responsibilities of those maintaining this database? The ethical implications are what should be stored on the databases in the first place. Also there should be a consideration of the intrinsic ethical duty placed on database security professionals to secure a database system. Who is to blame?  Consider a situation where a database protected private data, but there was no attempt to ensure its security except the statement that no one is to misuse it. A person who compromises the database in a misuse fashion has committed an ethical infraction.
Your personal information is stored in this database and this database is part of an organization whether being a bank, a social network, phone company, gas company, insurance company, the government, ATO(Australian Taxation Office) etc….  Legally banks as per the privacy act requirements have to maintain physical security, such as locks and security systems, over paper and electronic data stores and premises. They also maintain computer and network security: and other security measures such as identification codes and passwords to control access to computer systems. As for social networks information cannot be accessed until the owner has accessed it. Phone, gas and insurance or any other company in Australia are not allowed to share the information of a user with other companies without consent. Companies in Australia have to comply with the Privacy Act 1988.   Legal responsibilities of those maintaining this  database
“ We will destroy personal information if it is no longer needed: > for the purposes for which we collected it; or >for the purposes of meeting legal requirements. We will properly dispose off all paper files, letters, correspondence and any other hardcopy documents contain personal information that is no longer needed.     All information stored in electronic form that is no longer required will be deleted from our systems.” Legal responsibilities of those maintaining this  database
77%Australians believe That they give out more Personal information On the internet than they do in reality. 63% Australians reveal their name online. A third admit to revealing their home address. 29% people have given bank details or credit card numbers to non banking websites. 41 percent of 16-24 year old have written personal details online, exposing themselves to identity fraud, but are not worried of identity theft from information they have posted online. 46%of Australians believe they are at some risk of identity fraud online Survey Conducted
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Facts
 
Extra Information For more information on identity fraud visit  http://www.stopidtheft.com.au/   to learn more about it. You can also visit the Australian Government, Australian Institute of Criminology website  http://www.aic.gov.au/research/fraud/idfraud.html  , which has a list of useful links, reports, conference papers and presentations!
Video!

More Related Content

What's hot

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
Lisa Sosebee
 
Identity theft
Identity theftIdentity theft
Identity theft
SARASWATHI S
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
Rahmat Inggi
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
Experian_US
 
Data theft
Data theftData theft
Data theft
Laura
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
- Mark - Fullbright
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
- Mark - Fullbright
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
carlgiardina
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
nahinworld
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scams
ncpd
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Lisa Sosebee
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
vcrisafulli
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
English Online Inc.
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
hewie
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
- Mark - Fullbright
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
milfamln
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
Identity Theft Protection
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
nnguyen10
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
nnguyen10
 

What's hot (20)

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Data theft
Data theftData theft
Data theft
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scams
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 

Viewers also liked

Mini project ppt
Mini project pptMini project ppt
Mini project ppt
Manendra Shukla
 
Ppt of mini project.
Ppt of mini project.Ppt of mini project.
Ppt of mini project.
saikiran_gone
 
Minor Project Presentation 1
Minor Project Presentation 1Minor Project Presentation 1
Minor Project Presentation 1
Pratishtha Ram
 
Mini project complete
Mini project completeMini project complete
Mini project complete
Nur Dalila Zamri
 
minor project
minor projectminor project
minor project
Harleen Wadhwa
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
Syed Absar
 
Presentation on project report
Presentation on project reportPresentation on project report
Presentation on project report
ramesh_x
 
A minor project report
A minor project reportA minor project report
A minor project report
xenal
 
First Review(Ppt)
First Review(Ppt)First Review(Ppt)
First Review(Ppt)
smjagadish
 
Networking Projects
Networking ProjectsNetworking Projects
Networking Projects
cegonsoft1999
 
Final Project Presentation for Computer Networking
Final Project Presentation for Computer NetworkingFinal Project Presentation for Computer Networking
Final Project Presentation for Computer Networking
Maia Bittner
 
Complete-Mini-Project-Report
Complete-Mini-Project-ReportComplete-Mini-Project-Report
Complete-Mini-Project-Report
Akshay Pratap Singh
 
Sample PowerPoint for Project Review
Sample PowerPoint for Project ReviewSample PowerPoint for Project Review
Sample PowerPoint for Project Review
MissKarchin
 
Anna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-formatAnna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-format
Veera Victory
 
Project report
Project reportProject report
Project report
Pardeep Gupta
 
Intensive Care Professionals and their role in Organ Donation
Intensive Care Professionals and  their role in Organ DonationIntensive Care Professionals and  their role in Organ Donation
Intensive Care Professionals and their role in Organ Donation
Stiftelsen Organdonasjon
 
Solve five problems related to computer
Solve five problems related to computerSolve five problems related to computer
Solve five problems related to computer
umesh patil
 
LaTeX for beginners
LaTeX for beginnersLaTeX for beginners
LaTeX for beginners
Stéphane Péchard
 
Variables Creation using SAS on Longitudinal Data for Fraud Models
Variables Creation using SAS on Longitudinal Data for Fraud ModelsVariables Creation using SAS on Longitudinal Data for Fraud Models
Variables Creation using SAS on Longitudinal Data for Fraud Models
Kaitlyn Hu
 
mini project
mini projectmini project
mini project
Pratyush Srivastava
 

Viewers also liked (20)

Mini project ppt
Mini project pptMini project ppt
Mini project ppt
 
Ppt of mini project.
Ppt of mini project.Ppt of mini project.
Ppt of mini project.
 
Minor Project Presentation 1
Minor Project Presentation 1Minor Project Presentation 1
Minor Project Presentation 1
 
Mini project complete
Mini project completeMini project complete
Mini project complete
 
minor project
minor projectminor project
minor project
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 
Presentation on project report
Presentation on project reportPresentation on project report
Presentation on project report
 
A minor project report
A minor project reportA minor project report
A minor project report
 
First Review(Ppt)
First Review(Ppt)First Review(Ppt)
First Review(Ppt)
 
Networking Projects
Networking ProjectsNetworking Projects
Networking Projects
 
Final Project Presentation for Computer Networking
Final Project Presentation for Computer NetworkingFinal Project Presentation for Computer Networking
Final Project Presentation for Computer Networking
 
Complete-Mini-Project-Report
Complete-Mini-Project-ReportComplete-Mini-Project-Report
Complete-Mini-Project-Report
 
Sample PowerPoint for Project Review
Sample PowerPoint for Project ReviewSample PowerPoint for Project Review
Sample PowerPoint for Project Review
 
Anna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-formatAnna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-format
 
Project report
Project reportProject report
Project report
 
Intensive Care Professionals and their role in Organ Donation
Intensive Care Professionals and  their role in Organ DonationIntensive Care Professionals and  their role in Organ Donation
Intensive Care Professionals and their role in Organ Donation
 
Solve five problems related to computer
Solve five problems related to computerSolve five problems related to computer
Solve five problems related to computer
 
LaTeX for beginners
LaTeX for beginnersLaTeX for beginners
LaTeX for beginners
 
Variables Creation using SAS on Longitudinal Data for Fraud Models
Variables Creation using SAS on Longitudinal Data for Fraud ModelsVariables Creation using SAS on Longitudinal Data for Fraud Models
Variables Creation using SAS on Longitudinal Data for Fraud Models
 
mini project
mini projectmini project
mini project
 

Similar to Powerpoint Mini Project.Pdf

Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
Zev Aidikoff
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
guest1d1ed5
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
- Mark - Fullbright
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Quicken Loans Zing Blog
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
- Mark - Fullbright
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
raminder12_kaur
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Elizabeth Dimit
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
tommy2tone44
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
- Mark - Fullbright
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
mullarkea
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
Norfolk Naval Shipyard
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
- Mark - Fullbright
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
- Mark - Fullbright
 

Similar to Powerpoint Mini Project.Pdf (17)

Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Powerpoint Mini Project.Pdf

  • 1.
  • 2. What exactly is Identity Fraud? Identity fraud is referred to a big crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud. Identity is unique to you and cannot be given to someone else for their use, your personal data ­ especially your Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data ­ can be used, if they fall into the wrong hands, to personally profit at your expense. In many cases, a victim's losses may include not only out-of-pocket financial losses, but substantial additional.
  • 3. All of your personal information such as your credit card number, where you live, your phone number, Medicare number, license number date of birth etc….are stored in a database. A fraud can steal from your purse or wallet but the most common way is through a computer or database where they can get a hold of your personal information by either using Trojans, phishing , hacking in or using the zero day attack. These thieves are able to log onto a public computer you were on and hack their way into finding what you were doing. They are even able to research from government registers, search engines Google) or public records. They are able to obtains information from organizations which store quite a large amount of personal information. - By browsing on social networks such as MySpace, face book, bebo etc…they are able to get hold of any of your personal information and therefore be misused. How are databases involved in Identity Theft
  • 4. How are databases involved in Identity Theft
  • 5. The type of data stored about individuals in relation to Identity Theft
  • 6. Types of ways this data can be misused in relation to identity theft All your personal information (as mentioned before) if obtained is able to misused in many ways. This includes -By obtaining your credit card details this being your pin number , card number, deposit slip etc….)and using these “identity” token the thieves are able to access your savings, funds from an ATM or retail casher. They are also able to make debits such as withdrawals, purchases or checks. - An account takeover is possible as well, where the stealer takes control over the account by rerouting the credit card statements to a new address. -They are able create new accounts using another persons identity - If they get hold of a persons insurance information , they are able to use the person’s identity information’s to obtain medical services, such as going to a doctor or goods like medicines). So therefore the thief is putting medical entries into the victims existing medical records.
  • 7. Types of ways this data can be misused in relation to identity theft apply for a loan.
  • 8. Ethical responsibilities of those maintaining this database? The ethical implications are what should be stored on the databases in the first place. Also there should be a consideration of the intrinsic ethical duty placed on database security professionals to secure a database system. Who is to blame? Consider a situation where a database protected private data, but there was no attempt to ensure its security except the statement that no one is to misuse it. A person who compromises the database in a misuse fashion has committed an ethical infraction.
  • 9. Your personal information is stored in this database and this database is part of an organization whether being a bank, a social network, phone company, gas company, insurance company, the government, ATO(Australian Taxation Office) etc…. Legally banks as per the privacy act requirements have to maintain physical security, such as locks and security systems, over paper and electronic data stores and premises. They also maintain computer and network security: and other security measures such as identification codes and passwords to control access to computer systems. As for social networks information cannot be accessed until the owner has accessed it. Phone, gas and insurance or any other company in Australia are not allowed to share the information of a user with other companies without consent. Companies in Australia have to comply with the Privacy Act 1988.   Legal responsibilities of those maintaining this database
  • 10. “ We will destroy personal information if it is no longer needed: > for the purposes for which we collected it; or >for the purposes of meeting legal requirements. We will properly dispose off all paper files, letters, correspondence and any other hardcopy documents contain personal information that is no longer needed.   All information stored in electronic form that is no longer required will be deleted from our systems.” Legal responsibilities of those maintaining this database
  • 11. 77%Australians believe That they give out more Personal information On the internet than they do in reality. 63% Australians reveal their name online. A third admit to revealing their home address. 29% people have given bank details or credit card numbers to non banking websites. 41 percent of 16-24 year old have written personal details online, exposing themselves to identity fraud, but are not worried of identity theft from information they have posted online. 46%of Australians believe they are at some risk of identity fraud online Survey Conducted
  • 12.
  • 13.  
  • 14. Extra Information For more information on identity fraud visit http://www.stopidtheft.com.au/ to learn more about it. You can also visit the Australian Government, Australian Institute of Criminology website http://www.aic.gov.au/research/fraud/idfraud.html , which has a list of useful links, reports, conference papers and presentations!