identity theft how its linked to computers
TRANSCRIPT
An informational power point by Kailey French
IDENTITY THEFT- HOW ITS LINKED TO COMPUTERS
WHAT IS IDENTITY THEFT?
DEFINITION : The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases.
Whose affectedO 1 in 8 people have been affected in the
last 5 years by identity theft.O About 10 million people every year are
affectedO That’s 19 new victims every minuteThe trends Not Slowing!Between 2001 and 2002 the reported incidence of identity theft rose 20 percent, and between 2002 and 2003 it increased a whopping 80 percent.
How its linked to the computer
• You may not know it, but your computer collects all kinds of information about you and stores it in files hidden deep on your hard drive.
• Files like browser history and other temporary Internet files can be used to reconstruct your online habits.
• These files store information like logins and passwords, names addresses, and even credit card numbers.
HOW THEY GET THIS INFORMATION
This information can be consumed 2 different ways threw the computer.
Either it can be grabbed when it is being sent over an unsecured transmission,
or
Software can be installed on your computer (like spyware) threw a virus that will collect everything needed to steal your identity and it automatically send it back to the person through e-mail, or some kind of account.
Other ways of obtaining this information could be by phishing where you create a key log that requires the person to re-enter there password and or username, then the information is sent
back to creator of the key log’s email.
Anyone can steal someone's identity, so never trust anyone with personal information such as security cards, credit cards, and other things that could be used to steal your identity.
With stolen identity you can do almost anything, purchase items online or off a shopping channel, cars houses, paraphernalia from stores, and in extreme cases even houses or cars.
What can be done with
your info
The best way to protect yourself online or at home.Never keep your Social Security Number in your purse or wallet
Check bank account balances weekly
Request credit reports from the major credit card companies annually
Never leave personal information in your vehicle
Place passwords on credit cards, bank and phone accounts, as well as on computers. Keep the password in a safe spot do Not save it in a file on your computer, it can be retrieved by someone trying to steal you identity.
Keep all your personal information in locked files, and review how you carry, send, and store personal files safely
Shred all your trash that contains personal information, such as your name, address, and phone number. Install and regularly update firewalls and anti-viruses on your computer to protect it from hackers and Internet viruses
Unless you have instigated the communication, do not give out any personal information online, over the phone, or through the mail
Never use unsecured mailboxes, but deposit all of your outgoing mail in locked boxes, at the post office, or in local collection boxes.
check your mailbox regularly for incoming mail and removing it promptly.
WORK CITED• http://identitytheft.lifetips.com/faq/133477/0/how-many-people-are-victims-of-identity-theft-
each-year/index.html
• http://articles.winferno.com/computer-fraud/internet-identity-theft/
• http://lifelockprotection.wordpress.com/top-10-best-ways-to-protect-yourself-from-identity-theft /
• http://www.google.com/search?tbm=isch&hl=en&source=hp&biw=1280&bih=929&q=shadow+of+computer&gbv=2&oq=shadow+of+computer&aq=f&aqi=&aql=&gs_l=img.3...502.4414.0.4502.18.11.0.0.0.0.0.0..0.0...0.0.Iod9511K4Ug#hl=en&safe=strict&gbv=2&tbm=isch&sa=1&q=shopping+bags&oq=shopping+bags&aq=f&aqi=&aql=&gs_l=img.3...138620.141909.0.142115.15.13.1.0.0.0.177.616.3j3.6.0...0.0.ljUguWaW8Og&bav=on.2,or.r_gc.r_pw.,cf.osb&fp=2eabc3fc941d8678&biw=1280&bih=929
http://www.google.com/search?tbm=isch&hl=en&source=hp&biw=1280&bih=929&q=shadow+of+computer&gbv=2&oq=shadow+of+computer&aq=f&aqi=&aql=&gs_l=img.3...502.4414.0.4502.18.11.0.0.0.0.0.0..0.0...0.0.Iod9511K4Ug