SlideShare a Scribd company logo
SignificanceofCyberSecurityon
IdentityTheft
Originallypresented by:
GerardoP. Casino Jr.
DeniseAnne Paulette Cabeltes
Fel Jedd Adrian Dacula
BSIT-1B Advocates
$2.8 billion of losses were from imposter scams and $392 million were from
consumer online shopping.
National Council on Identity Theft Protection Issue 2021
Law enforcers nabbed the suspects for stealing money from a number of
individuals by pretending to be GCash, Grab, Lalamove, or Mr. Speedy
employees. News Bytes Issue 2020
The ITRC surveyed a total of about 1,600 victims of personal data theft. 40%
of these victims say that their personal data was stolen, compromised or
misused during the period of April 2021 to March 2022.
CPO Magazine Issue 2022
Are you really protected
enough on cyberspace?
Jeffrey Weiner: Criminal Defense Attorneys (2022)
Why People Commit Identity Theft
Financial
Gain
Revenge To hide
other Crime
It includes receipt, or expectation of
receipt, of anything of value,
including the receipt of other
copyrighted works.
Financial
Gain
I don’t even have a
Girlfriend, Misfortune
strikes, I was also
robbed!
Money is one of the reason why
people commit identity theft.
They prefer steal than work to earn
in a good way.
the action of inflicting hurt or
harm on someone for an injury
or wrong suffered at their
hands.
Revenge
Not all sins are met with
"Sorry"
Most people seek vendetta, they
must have their own profits on it.
They desperately wanted a payback
to that specific individual who’ve
ruined his/her existence.
To hide
other Crime
It’s an offense which is not
reported to the police and
hence not registered as an
offense.
Tranquility is the
biggest ever crime
committed
The world’s mysteries remained
unsolved due to raw information to
resolve the specific incident or worst
case, the witnesses suppressed their
voices so that it’ll not expose the
true findings.
Earlier Question; Are you really
protected enough on cyberspace?
How can be
you so sure?
How can be you so sure?
BE A CLEVER INDIVIDUAL
(Neil J. Rubenking & Jill Duffy - 12 Simple Things You Can Do to Be More Secure Online)
• Use Unique Passwords for Every Login,
• Use Multi-factor Authentication,
• Use Different Email Addresses for Every, Different
Kinds of Accounts,
• Don’t Fall Prey to Click Bait or Phishing
Scams; and
• Protect Your Social Media Privacy.
🅸🅽🆃🅴🆁🅽🅴🆃
Rejumble the following word:
🅽🅴🆃🅸🆃🅽🅴🆁
To conclude, this comes with a
Famous Quote;
“Use the internet wisely for not just
the petty enjoyment of your
senses, but for the development of
your mind as well.”
Abhijit Naskar
Once again, this has been your
Group Presenter,
Gerardo P. Casino Jr., Fel Jedd Adrian Dacula, &
Denise Anne Paulette Cabeltes, sharing today that,
”Your safety is our concern.”
References:
1. NewsBytes.PH May 2020
2. National Council on Identity Theft
Protection 2021
3. CPO Magazine Oct 2022
4. Why People Commit Identity Theft
Feb 2022
5. PCMag Aug 2022
THANK YOU!
Significance of Cyber Security on Identity Theft v.3 [Final].pptx

More Related Content

Similar to Significance of Cyber Security on Identity Theft v.3 [Final].pptx

Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
Rosetta
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
jonaspatrick12
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
Declan Winston Ramsaran
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
pat7777
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
- Mark - Fullbright
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSGreg Ewers
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Quicken Loans Zing Blog
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
GAURAV. H .TANDON
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
carlgiardina
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
- Mark - Fullbright
 

Similar to Significance of Cyber Security on Identity Theft v.3 [Final].pptx (12)

Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 

Recently uploaded

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 

Recently uploaded (20)

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Significance of Cyber Security on Identity Theft v.3 [Final].pptx

  • 1. SignificanceofCyberSecurityon IdentityTheft Originallypresented by: GerardoP. Casino Jr. DeniseAnne Paulette Cabeltes Fel Jedd Adrian Dacula BSIT-1B Advocates
  • 2. $2.8 billion of losses were from imposter scams and $392 million were from consumer online shopping. National Council on Identity Theft Protection Issue 2021 Law enforcers nabbed the suspects for stealing money from a number of individuals by pretending to be GCash, Grab, Lalamove, or Mr. Speedy employees. News Bytes Issue 2020 The ITRC surveyed a total of about 1,600 victims of personal data theft. 40% of these victims say that their personal data was stolen, compromised or misused during the period of April 2021 to March 2022. CPO Magazine Issue 2022
  • 3. Are you really protected enough on cyberspace?
  • 4. Jeffrey Weiner: Criminal Defense Attorneys (2022) Why People Commit Identity Theft Financial Gain Revenge To hide other Crime
  • 5. It includes receipt, or expectation of receipt, of anything of value, including the receipt of other copyrighted works. Financial Gain
  • 6. I don’t even have a Girlfriend, Misfortune strikes, I was also robbed!
  • 7. Money is one of the reason why people commit identity theft. They prefer steal than work to earn in a good way.
  • 8. the action of inflicting hurt or harm on someone for an injury or wrong suffered at their hands. Revenge
  • 9. Not all sins are met with "Sorry"
  • 10. Most people seek vendetta, they must have their own profits on it. They desperately wanted a payback to that specific individual who’ve ruined his/her existence.
  • 11. To hide other Crime It’s an offense which is not reported to the police and hence not registered as an offense.
  • 12. Tranquility is the biggest ever crime committed
  • 13. The world’s mysteries remained unsolved due to raw information to resolve the specific incident or worst case, the witnesses suppressed their voices so that it’ll not expose the true findings.
  • 14. Earlier Question; Are you really protected enough on cyberspace? How can be you so sure?
  • 15. How can be you so sure? BE A CLEVER INDIVIDUAL (Neil J. Rubenking & Jill Duffy - 12 Simple Things You Can Do to Be More Secure Online) • Use Unique Passwords for Every Login, • Use Multi-factor Authentication, • Use Different Email Addresses for Every, Different Kinds of Accounts, • Don’t Fall Prey to Click Bait or Phishing Scams; and • Protect Your Social Media Privacy.
  • 16. 🅸🅽🆃🅴🆁🅽🅴🆃 Rejumble the following word: 🅽🅴🆃🅸🆃🅽🅴🆁
  • 17. To conclude, this comes with a Famous Quote; “Use the internet wisely for not just the petty enjoyment of your senses, but for the development of your mind as well.” Abhijit Naskar
  • 18. Once again, this has been your Group Presenter, Gerardo P. Casino Jr., Fel Jedd Adrian Dacula, & Denise Anne Paulette Cabeltes, sharing today that, ”Your safety is our concern.”
  • 19. References: 1. NewsBytes.PH May 2020 2. National Council on Identity Theft Protection 2021 3. CPO Magazine Oct 2022 4. Why People Commit Identity Theft Feb 2022 5. PCMag Aug 2022