Safeguarding Your Computer - PowerPoint PPT Presentation

1 / 47
About This Presentation
Title:

Safeguarding Your Computer

Description:

ID theft occurs when an unauthorized person pretends to be you or uses your ... Get a free credit report annually. www.annualcreditreport.com ... – PowerPoint PPT presentation

Number of Views:62
Avg rating:3.0/5.0
Slides: 48
Provided by: nch9
Category:

less

Transcript and Presenter's Notes

Title: Safeguarding Your Computer


1
Identity theft
Florida Department ofLaw Enforcement Computer
Crime Center
Dan Leonard
2
Overview
  • Acquisition of Our Personal Information
  • Its Misuse
  • Staying as Safe as Possible
  • Recovery Steps

3
Identity Theft
ID theft occurs when an unauthorized person
pretends to be you or uses your personal
information
4
(No Transcript)
5
ID Theft
  • Became a federal crime in 1998 with the passage
    of The Identity Theft and Assumption Deterrence
    Act
  • Florida statute 817.568 took effect in 1999 --
    Criminal use of personal identification
    information

6
ID Theft Statistics
7
ID Theft Statistics
8
ID Theft Statistics
9
ID Theft Statistics
10
Who Gets Hurt?
  • Victims bear the emotional costs
  • Businesses and citizens bear the financial costs
  • Everyone but the criminal

11
Identity Theft
Someone got my Social Security number off the
Internet and stole my identity. Thank God I
hated being me!
12
How do they get my information?(No-tech ways)
  • Theft of wallets, purses
  • Mail theft
  • Change of address cards
  • Dumpster diving
  • Shoulder surfing
  • Find info in your home
  • Moles
  • Social engineering

13
How do they get my information?(No-tech ways)
  • Pretexting creating a scenario (a pretext) to
    persuade a target to release information.
  • Used to trick businesses into disclosing customer
    information
  • Involves prior research
  • Most U.S. companies still verify a client by
    asking only for SSN, date of birth, or mothers
    maiden name

14
How do they get my information?(Hi-tech ways)
  • Skimming

Criminals skimmer, mounted and colored to
resemble exterior of real ATM. A pinhole camera
is mounted inside a plastic brochure holder to
capture PIN.
15
Skimming
  • The customers credit card is used to pay for a
    legitimate transaction

HOWEVER
... the card is diverted by an employee, who
swipes the card
through an illegally-used device that stores the
information from the cards magnetic strip ...
16
(No Transcript)
17
How do they get my information?(Hi-tech ways)
  • Social Engineering
  • Malware
  • Phishing
  • Vishing

18
How do they get my information?(Hi-tech ways)
  • Malware
  • -Virus
  • -Trojan Horse
  • - Key Logger

19
Phishing
  • Sending a message claiming to be a business to
    scam the user into surrendering private
    information

Phishing attacks use both social engineering and
technical subterfuge to steal consumers'
identity and financial account credentials.
20
Spear Phishing
  • A highly targeted e-mail attack that a scammer
    will send only to people within
  • a small group, such as a company

Spear phishers also target people who use
a certain product or web site. Scammers use
any information to personalize a phishing scam to
as specific a group as possible
21
How Does Phishing Work?
  • You receive a spoofed email that appears to be
    from a legitimate company
  • The email informs you that there has been a
    problem with your account
  • A link in the email takes you to a counterfeit
    website usually a copy of a major company like
    Amazon, eBay, or a Bank of America
  • You are instructed to fix the problem by entering
    sensitive personal information at the risk of
    losing access to the account

22
(No Transcript)
23
(No Transcript)
24
(No Transcript)
25
Tips to Avoid Getting Hooked
  • Be skeptical of email that asks for personal
    information
  • DO NOT click on the link provided
  • Access your user information only through the
    companys homepage

26
More Tips
  • If a web address is spoofed it is likely to have
    an excessively long URL
  • Always report fraudulent or suspicious email to
    your ISP
  • Contact law enforcement if youve been a victim

27
www.antiphishing.org
28
Internet Crime Complaint Center
www.ic3.gov
29
Vishing
  • Uses Voice Over IP (VOIP) technology instead of a
    misdirected web link to steal user info
  • Attacker calls phone numbers in a given region
    using war dialer
  • Automated recording alerts consumer to fraudulent
    activity with their credit card or bank account
  • Victim instructed to call phone number thats
    shown in spoofed caller ID and shows the same
    name as financial company
  • When victim calls, automated message instructs to
    enter account information

30
What do they do with the information?
  • Existing account fraud
  • Change the mailing address on your accounts
  • Forge checks and wipe out your existing account
  • New account fraud
  • Open new lines of credit
  • Open accounts to write bad checks
  • Other
  • Commit crimes and give your name as an alias

31
ID Theft Prevention
  • Use a credit card
  • Fair Credit Billing Act limits consumer liability
  • Electronic Fund Transfer Act limits consumer
    liability for ATM or debit cards, with
    stipulations
  • Ensure electronically printed credit card
    receipts show only the last 4 or 5 digits
  • Get a free credit report annually
  • www.annualcreditreport.com
  • Shred all documents containing personal info
  • Dont email personal or financial information

32
ID Theft Prevention (Cont.)
  • Update anti-virus and anti-spyware software
    regularly
  • Do not download files from strangers
  • Do not click on links fromunknown people
  • Use a secure connection for online transactions

33
Secure Connection
34
Secure Connection
35
Secure Connection
36
ID Theft Prevention (Cont.)
  • Don't enter your SSN on web pages if you can help
    it
  • Use a firewall
  • Safeguard all your account numbers and passwords

37
Strong Passphrase Example
  • Example
  • W925,waw2mal

Working nine to 5, what a way to make a living
38
Password Hint
  • If you cant remember your password, write down a
    HINT
  • W925,waw2mal dolly

39
(No Transcript)
40
If You Think Youre a Victim
  • Call the FTC ID Theft Hotline 1-877-IDTHEFT
    (877-438-4338)
  • Contact the 3 major credit bureaus
  • Fraud alert vs. credit freeze
  • File a report with your local police
  • Contact your creditors

41
http//www.fdle.state.fl.us
42
(No Transcript)
43
(No Transcript)
44
If You Think Youre a Victim
  • Report stolen checks
  • Remember to report stolen or compromisedATM or
    debit cards immediately
  • Notify local Postal Inspector of any mail fraud
  • Call Social Security Administration if Social
    Security Number has been used fraudulently
  • Dont give in!

45
http//myfloridalegal.com/identitytheft
46
http//www.consumer.gov/idtheft
47
Contact Information
  • Computer Crime Center
  • Florida Dept of Law Enforcement
  • 2331 Phillips Rd.
  • Tallahassee, FL 32308
  • (850) 617-1350
  • ComputerCrimeCenter_at_fdle.state.fl.us
Write a Comment
User Comments (0)
About PowerShow.com