ID Theft, Computer Security and the Human Factor - PowerPoint PPT Presentation

1 / 23
About This Presentation
Title:

ID Theft, Computer Security and the Human Factor

Description:

ID Theft, Computer Security and the Human Factor ... Photocopy the contents of wallet/purse. Photocopy your passport (keep a copy at home and one with you) ... – PowerPoint PPT presentation

Number of Views:51
Avg rating:3.0/5.0
Slides: 24
Provided by: mco79
Category:

less

Transcript and Presenter's Notes

Title: ID Theft, Computer Security and the Human Factor


1
ID Theft, Computer Security and the Human Factor
  • Tom Ryan, RU-Camden Law Harold Winshel, Camden
    Arts Sciences

2
Agenda
  • Identity Theft
  • What is identity theft?
  • Why is it bad?
  • How is it done?
  • What can you do to prevent it?
  • Computer Security
  • - Top 10 best practices
  • Social Engineering
  • Actions Reactions

3
Identity Theft
  • Prevention
  • Detection
  • Recovery

4
How prevalent is it?
  • 10 Million Americans in 2003 (up 41 )
  • http//www.ftc.gov/os/2003/12/031215idthefttestimo
    ny.pdf
  • Costs 53 Billion
  • http//www.ftc.gov/os/2003/12/031215idthefttesti
    mony.pdf
  • Un-reported costs

5
How does it happen?
  • Most ID theft is done through very low-tech
    means.
  • With a name, address and a credit card number,
    and the 3 digit card identifier, most telephone
    businesses will ship to any address.
  • Very few cross checks

6
Why is ID Theft Done?
  • For financial gain.

7
Detection
  • You start getting collection calls/mail
  • You are denied credit
  • You stop getting mail
  • You start getting new bills for accounts you do
    not have or services you did not authorize.
  • Your bank account balance drops.

8
What you can do to prevent it?
  • Account Information
  • ATM, Credit, and Debit Cards
  • Bills, Bank Statements, and Other Records
  • Calling Cards
  • Checks
  • Credit Reports
  • Mail
  • Trash

9
Good practices
  • Photocopy the contents of wallet/purse
  • Photocopy your passport (keep a copy at home and
    one with you)
  • Empty your wallet/purse of non-essential
    identifiers, especially your Social Security
    Card.
  • Do not use any information provided by the people
    trying to scam you Look it up yourself.
  • Use a paper crosscut shredder.
  • When on vacation, dont stop your newspaper.

10
Recovery
  • File a report with the credit provider
  • File a police report
  • Notify the Credit bureaus
  • Notify the FTC

11
What you can do if you become a victim?
  • Contact the fraud departments of any one of the
    three major credit bureaus  to place a fraud
    alert on your credit file.
  • Ask for new account numbers for accounts that you
    know or believe have been tampered with or used
    fraudulently.
  • Close Accounts that have been opened
    fraudulently.
  • File a police report. Get a copy of the report to
    submit to your creditors
  • File your complaint with the FTC.

12
What will the future bring ?
  • The trend is that it is getting worse
  • Continue with awareness and education
  • Review policies and procedures
  • Improve the security web site
  • Seek input from our user community
  • Security is everybodys business

13
Your computer and ID Theft
  • What you can do to
  • Protect your confidential information
  • Prepare for an incident (just in case)
  • Prevent identity theft

14
Your computer and ID theft
  • Protect yourself
  • When ordering online, make sure the site is
    secure (https//)
  • Protect others
  • Have your antivirus software keeping you up to
    date
  • Set your system to auto update patches

15
Good Computing Practices
  • Encryption (SSL, the lock, SHTTP or HTTPS)
  • Firewall
  • Anti-Adware/Anti-Trojan
  • Wireless
  • P2P file sharing
  • Separate passwords
  • Password Safe software
  • E-mail is not secure
  • Disconnect from the internet when not in use
  • Check our security and smoke alarm batteries at
    the bi-annual time changes (April November)
  • Do not use phone numbers or web links provided by
    others

16
Good computing practices
  • Use automatic updating anti-virus software
    (Rutgers Antivirus Delivery Service - RADS)
  • Exercise caution when opening email attachments
  • Select hard to guess passwords and keeping them
    private
  • Back up important files
  • Download and install operating system update
    patches
  • Become aware of the risks in file sharing (turn
    off or password protect)
  • Use a password protected screen saver
  • Lock up your computer when not in use
  • Know how to report a computer abuse incident
  • Protect your computer by using a firewall

17
Phishing / Spoofing
  • Sending an email to a user falsely claiming to be
    an established legitimate enterprise in an effort
    to scam the user into surrendering private
    information that will be used for identity theft
    (www.webopedia.com)
  • Phishing bait.
  • Spoof fake the appearance of a popular web site

18
Phishing E-mail
  • From Fleet bank mailtouser-billing06_at_fleet.com
    Sent Tuesday, February 10, 2004 631 PMTo
    abuse_at_rutgers.eduSubject To aII Fleet bank
    users

19
Damages to you
  • Time
  • Money
  • Credit rating
  • Reputation

20
Damages to Rutgers
  • Reputation
  • Violation of federal and state laws.
  • Fines
  • Reparations costs
  • Recovery costs
  • Increased prevention costs
  • Georgia Tech release of credit cards to the
    internet cost them over 1,000,000.

21
Links and Resources
  • http//www.consumer.gov/idtheft/index.html
  • http//www.usps.com/postalinspectors/idthft_ncpw.h
    tm
  • http//www.ed.gov/about/offices/list/oig/misused/i
    ndex.html
  • http//www.ssa.gov/pubs/10064.html
  • 1-800-269-0271
  • http//rusecure.rutgers.edu/sec_aware/phish.phpid
    entity

22
ID Theft Action form
23
Services available at Rutgers University for
Faculty, Staff and Students
  • Help Desk for computer problems
  • Identity Theft 911
  • http//adminaffairs.rutgers.edu/IdentityTheft911.s
    html
  • Computer abuse
Write a Comment
User Comments (0)
About PowerShow.com