WHAT IS IDENTITY THEFT

1.0x

WHAT IS IDENTITY THEFT

Created 2 years ago

Duration 0:11:52
lesson view count 3
Select the file type you wish to download
Slide Content
  1. WHAT IS IDENTITY THEFT?

    Slide 1 - WHAT IS IDENTITY THEFT?

    • Identity thieves take your personal information and use it to harm you in various ways, including these:
    • User names, passwords, and PIN numbers
    • Social Security numbers
    • Phone and utility account numbers
    • Bank and credit card numbers
    • Employment and student identification numbers
    • 1
  2. Background Information

    Slide 2 - Background Information

    • Driver’s license and passport numbers
    • Methods that thieves obtain personal information
    • Protecting consumer information
    • Rights to the consumer if have discovered information has been stolen
    • Realization that the government has limited responsibility to recognize potential threats
    • Helping the consumer to recognize the potential threats and to respond to the treat the best way possible.
    • 2
  3. Methods that thieves Obtain personal information

    Slide 3 - Methods that thieves Obtain personal information

    • Thieves implemented the use of phishing where they are able to send spam and pop-up messages to get the consumer to reveal information.
    • Other programs such as bots that have the ability to stay on a computer for months at a time
    • collecting personal information such as password, banking information, and internet usage
    • Or even frequently used email addresses as well
    • Trojan programs are able to perform a man- in the middle attack valid transactions by silently changing your bank account details to there’s.
    • They also use a Trojan program that makes the malware more aggressive on the computer.
    • 3
  4. Protecting Consumer information

    Slide 4 - Protecting Consumer information

    • Get in the habit of shredding all sensitive documents
    • Renewing credit reports every year
    • Reviewing credit card statements
    • Removing mail as soon as possible
    • Delete or throw away any mailing bills or other documents
    • Delete as soon as possible personal information from and unsecure mail box.
    • 4
  5. Rights of the consumer if they have discovered information has been stolen

    Slide 5 - Rights of the consumer if they have discovered information has been stolen

    • Place a fraud alert on he/she’s credit report and review the report
    • Close all accounts that they know or believed to know
    • File a police repot
    • Finally file a complaint with the Federal Trade Commission
    • The costumer should also understand the their rights as a victim
    • When documenting a thief there are three types of reports used a police report, an identity theft report, and a FTC complaint
    • 5
  6. 6

    Slide 6 - 6

    • Credit card fraud on the rise
  7. Realization that the government has limited responsibility to recognize potential threats

    Slide 7 - Realization that the government has limited responsibility to recognize potential threats

    • The government position on identity theft is that varies from state to state
    • However across the board the promote the consumer to remain educated about identity theft
    • The government also by law has to prosecute those thieves that are caught with serious penalties.
    • 7
  8. 8

    Slide 8 - 8

    • On the rise
  9. Helping the consumer to recognize the potential threats and to respond to the treat the best way possible.

    Slide 9 - Helping the consumer to recognize the potential threats and to respond to the treat the best way possible.

    • Ways of preventing is by understanding the mediums that thieves use to obtain potential damaging information
    • The victim also may place a 90-day to 7 year fuad alert
    • The victim should also get a free copy of their credit report and summary of their rights from each reporting agency
    • In order to do this the victim will need to submit a copy of a valid theft report
    • The victim should also get a copy of there credit report and summary of there rights from each agency
    • Ask the reporting companies to block the fraudulent information from appearing on their reports
    • 9
  10. Work cited

    Slide 10 - Work cited

    • "About Identity Theft - Deter. Detect. Defend. Avoid ID Theft." FTC. <http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html>.
    • Daniels, Peggy. "Identity Theft is a Growing Problem." Opposing Viewpoints Resource Center. Gale. 2012. Cecil College. <Http://find.galegroup.com/ovrc/informark>.
    • "Deter: Minimize Your Risk." Ftc.Gov. Ftc. <http://www.ftc.gov/bcp/edu/microsites/
    • idtheft/consumers/deter.html>.
    • "Identity Theft Victims' Statement of Rights." FTC. Federal Trade Commission. <http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/rights.html>.
    • Marshall, Patrick. "Cybersecurity." CQ Researcher 13.33 (2003): 797-820. CQ Researcher Online. CQ Press. 26 Sept. 2003. Cecil College. 29 Jan. 2008 <http://library.cqpress.com/cqresearcher/cqresrre2003092600>.
    • Obringer, Leeann. "How Identity Theft Works." How Stuffworks. <http://money.howstuffworks.com/identity-theft.htm>.
    • "Stop. Think. Click." Onguard Online. Sept. 2012. <http://onguardonline.gov/investing.html>.
    • "Take Charge: Fighting Back Against Identity Theft." Federal Trade Commission. Feb. 2012. Federal Trade Commission. <http://www.ftc.gov/bcp/edu/pu
    • bs/consumer/idtheft/idt04.shtm>.
    • "Top 10 Cybersecurity Menaces for 2008Listed: Expect Increased Attacks on Web Browser, More Botnets, and Sophisticated Cyberespionage, According to the Annual SANS Institute Report. "Information Week"" Expanded Academic ASAP.Gale. 15 Jan. 2012. Cecil College. <http://find.galegroup.com/itx/infomark>.
    • "5 Things Identity Thieves Do to Steal Your Life H2.0." NewsBank Popular Science. Apr. 2013. Cecil College. <http://clabweb.clab.cecil.edu:2053/iw-search/we/InfoWeb>.
    • 10