identity theft how its linked to computers

8
An informational power point by Kailey French IDENTITY THEFT- HOW ITS LINKED TO COMPUTERS

Upload: fk12252

Post on 26-Jun-2015

410 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Identity theft  how its linked to computers

An informational power point by Kailey French

IDENTITY THEFT- HOW ITS LINKED TO COMPUTERS

Page 2: Identity theft  how its linked to computers

WHAT IS IDENTITY THEFT?

DEFINITION : The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases.

Page 3: Identity theft  how its linked to computers

Whose affectedO 1 in 8 people have been affected in the

last 5 years by identity theft.O About 10 million people every year are

affectedO That’s 19 new victims every minuteThe trends Not Slowing!Between 2001 and 2002 the reported incidence of identity theft rose 20 percent, and between 2002 and 2003 it increased a whopping 80 percent.

Page 4: Identity theft  how its linked to computers

How its linked to the computer

• You may not know it, but your computer collects all kinds of information about you and stores it in files hidden deep on your hard drive.

• Files like browser history and other temporary Internet files can be used to reconstruct your online habits.

• These files store information like logins and passwords, names addresses, and even credit card numbers.

Page 5: Identity theft  how its linked to computers

HOW THEY GET THIS INFORMATION

This information can be consumed 2 different ways threw the computer.

Either it can be grabbed when it is being sent over an unsecured transmission,

or

Software can be installed on your computer (like spyware) threw a virus that will collect everything needed to steal your identity and it automatically send it back to the person through e-mail, or some kind of account.

Other ways of obtaining this information could be by phishing where you create a key log that requires the person to re-enter there password and or username, then the information is sent

back to creator of the key log’s email.

Page 6: Identity theft  how its linked to computers

Anyone can steal someone's identity, so never trust anyone with personal information such as security cards, credit cards, and other things that could be used to steal your identity.

With stolen identity you can do almost anything, purchase items online or off a shopping channel, cars houses, paraphernalia from stores, and in extreme cases even houses or cars.

What can be done with

your info

Page 7: Identity theft  how its linked to computers

The best way to protect yourself online or at home.Never keep your Social Security Number in your purse or wallet

Check bank account balances weekly

Request credit reports from the major credit card companies annually

Never leave personal information in your vehicle

Place passwords on credit cards, bank and phone accounts, as well as on computers. Keep the password in a safe spot do Not save it in a file on your computer, it can be retrieved by someone trying to steal you identity.

Keep all your personal information in locked files, and review how you carry, send, and store personal files safely

Shred all your trash that contains personal information, such as your name, address, and phone number. Install and regularly update firewalls and anti-viruses on your computer to protect it from hackers and Internet viruses

Unless you have instigated the communication, do not give out any personal information online, over the phone, or through the mail

Never use unsecured mailboxes, but deposit all of your outgoing mail in locked boxes, at the post office, or in local collection boxes.

check your mailbox regularly for incoming mail and removing it promptly.

Page 8: Identity theft  how its linked to computers

WORK CITED• http://identitytheft.lifetips.com/faq/133477/0/how-many-people-are-victims-of-identity-theft-

each-year/index.html

• http://articles.winferno.com/computer-fraud/internet-identity-theft/

• http://lifelockprotection.wordpress.com/top-10-best-ways-to-protect-yourself-from-identity-theft /

• http://www.google.com/search?tbm=isch&hl=en&source=hp&biw=1280&bih=929&q=shadow+of+computer&gbv=2&oq=shadow+of+computer&aq=f&aqi=&aql=&gs_l=img.3...502.4414.0.4502.18.11.0.0.0.0.0.0..0.0...0.0.Iod9511K4Ug#hl=en&safe=strict&gbv=2&tbm=isch&sa=1&q=shopping+bags&oq=shopping+bags&aq=f&aqi=&aql=&gs_l=img.3...138620.141909.0.142115.15.13.1.0.0.0.177.616.3j3.6.0...0.0.ljUguWaW8Og&bav=on.2,or.r_gc.r_pw.,cf.osb&fp=2eabc3fc941d8678&biw=1280&bih=929

http://www.google.com/search?tbm=isch&hl=en&source=hp&biw=1280&bih=929&q=shadow+of+computer&gbv=2&oq=shadow+of+computer&aq=f&aqi=&aql=&gs_l=img.3...502.4414.0.4502.18.11.0.0.0.0.0.0..0.0...0.0.Iod9511K4Ug