privacy in computing

15
PRIVACY IN COMPUTING PRIVACY IN COMPUTING BY: BY: Engin and Will Engin and Will

Upload: leoma

Post on 05-Jan-2016

25 views

Category:

Documents


0 download

DESCRIPTION

PRIVACY IN COMPUTING. BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) Xxx-rated sites make your modem call some places that will cost you They can steal your job related information from your computer (industrial espionage) - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: PRIVACY IN COMPUTING

PRIVACY IN PRIVACY IN COMPUTINGCOMPUTING

BY: BY: Engin and Will Engin and Will

Page 2: PRIVACY IN COMPUTING

WHY IS PRIVACY IMPORTANT?WHY IS PRIVACY IMPORTANT?

They can use your computer to attack others They can use your computer to attack others (money, revenge)(money, revenge)

Xxx-rated sites make your modem call some Xxx-rated sites make your modem call some places that will cost youplaces that will cost you

They can steal your job related information from They can steal your job related information from your computer (industrial espionage)your computer (industrial espionage)

They can steal your information, use your They can steal your information, use your money, use your good name (identity theft), in money, use your good name (identity theft), in some cases that can be used just to terrorize some cases that can be used just to terrorize you you

Page 3: PRIVACY IN COMPUTING

IDENTITY THEFTIDENTITY THEFT

It is so hard to keep a good credit It is so hard to keep a good credit lineline

What happens if some criminal or What happens if some criminal or psycho steals your information by psycho steals your information by stealing or hacking into your stealing or hacking into your computer?computer?

Page 4: PRIVACY IN COMPUTING

TYPES OF ID THEFTTYPES OF ID THEFT

Estimated 10 million people in US found out that Estimated 10 million people in US found out that they were victims of ID Fraud in previous year.they were victims of ID Fraud in previous year.

Financial FraudFinancial Fraud Criminal ActivitiesCriminal Activities

Computer and Cyber CrimesComputer and Cyber Crimes Organized CrimesOrganized Crimes Drug TraffickingDrug Trafficking Alien SmugglingAlien Smuggling Money LaunderingMoney Laundering

Page 5: PRIVACY IN COMPUTING

STEALING IDENTITYSTEALING IDENTITY

Credit Card FraudCredit Card Fraud Paying at a restaurant or a marketPaying at a restaurant or a market On the phoneOn the phone Via internetVia internet

Page 6: PRIVACY IN COMPUTING
Page 7: PRIVACY IN COMPUTING

When you throw away a paper, look at;

•Your full name

•Complete address

•SSN, date of birth

•Complete bank account number

•Employer’s name and address

•Rate of pay

Page 8: PRIVACY IN COMPUTING

ACCESSING YOUR PERSONAL ACCESSING YOUR PERSONAL INFORMATIONINFORMATION

Dumpster divingDumpster diving Sales clerks, waitresses (memorizing or Sales clerks, waitresses (memorizing or

copying)copying) Mailbox (financial statements, bills)Mailbox (financial statements, bills) Employer’s file (secretly or with inside help)Employer’s file (secretly or with inside help) Hospital recordsHospital records Purchased online databasesPurchased online databases Collected from “clone” web sitesCollected from “clone” web sites Stolen through hacking computers (personal, Stolen through hacking computers (personal,

work or any merchants PCs)work or any merchants PCs)

Page 9: PRIVACY IN COMPUTING
Page 10: PRIVACY IN COMPUTING

PROTECTIONPROTECTION Don’t give away your SSNDon’t give away your SSN Destroy any unwanted credit card offersDestroy any unwanted credit card offers Don’t put any information on your check other than Don’t put any information on your check other than

your name and your addressyour name and your address Shred any sensitive documentShred any sensitive document Don’t carry SSN card, passport, or birth certificateDon’t carry SSN card, passport, or birth certificate Review your credit report at least once every yearReview your credit report at least once every year Never give away important personal information on Never give away important personal information on

the phone unless it’s really necessarythe phone unless it’s really necessary

Identity Theft Insurance ?Identity Theft Insurance ?

Page 11: PRIVACY IN COMPUTING
Page 12: PRIVACY IN COMPUTING

INTERNET INTERNET TRANSACTIONSTRANSACTIONS

Use the latest internet browserUse the latest internet browser Look for digital certificatesLook for digital certificates Read the privacy policiesRead the privacy policies Only use one credit cardOnly use one credit card Never give personal information unless you know Never give personal information unless you know

for sure why they need itfor sure why they need it Keep records for internet transactionsKeep records for internet transactions After you made a purchase, check your emailsAfter you made a purchase, check your emails

Page 13: PRIVACY IN COMPUTING

IF IT HAPPENS TO YOUIF IT HAPPENS TO YOU

Immediately contact your credit card issuersImmediately contact your credit card issuers Close any account that thief has openedClose any account that thief has opened Call the fraud units of the three credit reporting Call the fraud units of the three credit reporting

bureausbureaus If SSN used, notify Social Security If SSN used, notify Social Security

Administrator’s Office of Inspector GeneralAdministrator’s Office of Inspector General

Page 14: PRIVACY IN COMPUTING

Who to contactWho to contact The Credit Bureaus The Credit Bureaus EquifaxEquifax Credit Information Credit Information

Services - Consumer Fraud Div.Services - Consumer Fraud Div.P.O. Box 105496P.O. Box 105496Atlanta, Georgia 30348-5496Atlanta, Georgia 30348-5496Tel: (800) 997-2493Tel: (800) 997-2493www.equifax.com www.equifax.com

ExperianExperianP.O. Box 2104P.O. Box 2104Allen, Texas 75013-2104Allen, Texas 75013-2104Tel: (888) EXPERIAN (397-3742)Tel: (888) EXPERIAN (397-3742)www.experian.com www.experian.com

TransUnionTransUnion Fraud Victim Assistance Dept. Fraud Victim Assistance Dept.P.O. Box 390P.O. Box 390Springfield, PA 19064-0390Springfield, PA 19064-0390Tel: (800) 680-7289Tel: (800) 680-7289www.transunion.com www.transunion.com

Page 15: PRIVACY IN COMPUTING

ReferencesReferences

http://computer.howstuffworks.com/ihttp://computer.howstuffworks.com/identity-theft.htmdentity-theft.htm

http://www.microsoft.com/mscorp/twhttp://www.microsoft.com/mscorp/twc/privacy/default.mspxc/privacy/default.mspx