protecting your identity anders olson computers iii september 18, 2008
TRANSCRIPT
![Page 1: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/1.jpg)
Protecting Your Identity
Anders Olson
Computers III
September 18, 2008
![Page 2: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/2.jpg)
Identity theft has become
a real problem in the
real world and the virtual world online. Following are tips on
what to do to prevent identity theft in both of them.
![Page 3: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/3.jpg)
Real World
• What do identity thieves want?
• Where do they find these?
• How are these used?
• How do you defend yourself?
![Page 4: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/4.jpg)
What do identity thieves want?
• To become you using:– Your social security card
– Driver’s license
– Account numbers
– Passwords
![Page 5: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/5.jpg)
Where do they find these?
• Purse/wallet– A lot of personal information stored there.
• Mailbox– Credit card bills, checking account
statements, pre-approved credit cards, outgoing bills
• Glove compartment– Vehicle registration, insurance cards, old bills
& receipts
![Page 6: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/6.jpg)
Where do they find these?
• Trash
– Dumpster diving for old bills, accounts statements, etc.
• You
– Fake phone calls asking for personal information
![Page 7: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/7.jpg)
What are they used for?
• To open credit card accounts
• To change mailing addresses on current cards
• Shopping sprees
• Use your name when arrested
• Apply for jobs
• File for bankruptcy under your name to avoid paying debts
![Page 8: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/8.jpg)
How do you defend your self?
• Purse/wallet– Don’t carry social security cards, more credit
cards than you need, or a list of passwords to different things like PINs.
• Mailbox– Take outgoing mail to post office and pick up
mail as soon as possible
• Glove Compartment– Clean out unneeded material. Lock your car.
![Page 9: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/9.jpg)
Virtual World
• What do they want?
• Where do virtual thieves find these?
• How do you defend yourself?
![Page 10: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/10.jpg)
What do they want?
• Your information– Your banking information– Your passwords– Your personal information (name, address,
etc.)– Anything that they can get their hands on and
allow them to create a new identity to use for their own purposes
![Page 11: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/11.jpg)
Where do the virtual thieves find these?
• Unless proper safeguards are in place thieves can and will access:– Bank account information– Electronic tax returns– Insurance information– Spreadsheets/word processing documents– Anything with information
![Page 12: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/12.jpg)
How do you defend yourself?
• Passwords– Use unique passwords– Change regularly– Remember them, don’t write them down
• File-sharing sites– If you can get their files, they can get yours.
• Beware of Phising– Phising- emails luring people to give their
logins, passwords, etc. to phony sites.
![Page 13: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/13.jpg)
How do you defend yourself?
• Be careful of using public computers– Users can view list of previous sites users
have visited
• Purchase Anti-Virus Software
• Keep Operating Software Updated
• Install a Firewall
• Don’t give our personal information over the internet.
![Page 14: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/14.jpg)
Further Your Knowledge
• OnGuardOnline.gov
• Nationwide consumer reporting companies:– Equifax: 1-800-525-6285– Experian: 1-888-EXPERIAN (397-3742)– TransUnion: 1-800-680-7289
• FTC Avoid ID Theft PowerPoint
![Page 15: Protecting Your Identity Anders Olson Computers III September 18, 2008](https://reader036.vdocument.in/reader036/viewer/2022083006/56649f395503460f94c569e6/html5/thumbnails/15.jpg)
Bibliography
• “Deter. Detect. Defend. Avoid ID Theft” [Online Image] 18 September 2008 <http://www.ftc.gov/bcp/edu/microsites/idtheft/images/identity-theft-symbols.gif>
• <http://www.onguardonline.com/• http://www.equifax.com/home/• http://www.experian.com/• http://www.transunion.com/• http://www.ftc.gov/idtheft