SlideShare a Scribd company logo
1 of 35
Eghbal Ghazizadeh
Agenda
   Identity Theft & Film
   What is identity theft?
   Types of the Identity Theft
   Statistics & Identity Theft
   How does identity theft work?
   Techniques
   Warning signs
   How to steal an identity?
   Countermeasures
   Protect yourself
   Regional legal responses
Identity Theft & Film
What is Identity Theft?

   Identity theft is a form of stealing
      someone's identity in which
  someone pretends to be someone
    else by assuming that person's
 identity, typically in order to access
resources or obtain credit and other
    benefits in that person's name
What is Identity Theft?
• The term identity theft was coined in 1964
• Determining the link between data breaches and
  identity theft is challenging
• Probability of becoming a victim to identity theft as a
  result of a data breach is ... around only 2%
What is Identity Theft?

Identity theft occurs when someone uses
your name, your Social Security number,
  or some other personal, financial, or
    medical information without your
   permission to commit fraud or other
                  crimes.
Types of the Identity Theft

Criminal identity theft
        (posing as another person when apprehended for a crime)
Financial identity theft
     (using another's identity to obtain credit, goods and services)
Identity cloning
    (using another's information to assume his or her identity in daily life)
Medical identity theft
    (using another's identity to obtain medical care or drugs)
Child identity theft.
    (children are valued because they do not have any information associated with them)
Statistics & Identity Theft

Consider the following:
 One million people in Canada will suffer from some form
of identity theft totalling over $6 billion

50% of the cases reported will be as a result of
unauthorized credit card charges.

20% of the victims will know their thieves

The average time between the date of the theft and when
it is noticed by the victim will be 14 months.
Statistics
How Does Identity Theft Work?
 • Identity theft works in a range of ways
 • from crude methods to well organised scams
      Human-Based           Computer-Based


                        Wealth
 personal information
 Cards
 Mail
 public records
 Information saved in our computers
 Information posted on social networking sites
Techniques
Techniques
• Rummaging through rubbish for personal
  information (dumpster diving)
• Retrieving personal data from redundant IT
  equipment
• Using public records about individual citizens
  (electoral rolls) Stealing bank or credit cards,
  identification cards, passports, authentication
  tokens ( pickpocketing, housebreaking or
  mail theft)
• Common-knowledge questioning (what was
  your first car model?)
Techniques
• Skimming information from bank or credit
  cards (Clone Card)
• Using 'contactless' credit card readers to
  acquire data wirelessly from RFID-enabled
  passports
• Observing users typing ( shoulder Surfing)
• Stealing personal information from computers
  ( Malware, Trojan horse, Keystroke, Other
  Spyware)
• Hacking computer networks, systems and
  databases (SQl Injection)
Techniques
•   Exploiting breaches (Social Address, IC Number)
•   Advertising bogus job ( Resume, CV)
•   Exploiting insider access and abusing the rights of privileged IT users
    to access
•   Impersonating trusted organizations in emails, SMS text messages,
    phone calls (Phishing)
•   Brute-force attacking weak passwords and using inspired guesswork
•   Obtaining castings of fingers for falsifying fingerprint identification.
•   Browsing social networking websites for personal details
•   Using false pretences to trick individuals (Pretexting)
•   Guessing Social Security numbers by using information found
TOOLS
• Gunter Ollmann said, “Interested in credit card theft?
  There’s an app for that.”
• The new program for infecting users’ computers is
  called Zeus (inexperienced hacker can operate it)
            SpyEye/ZeuS Toolkit v1.3.05
Warning signs

• You get an email, SMS or a phone call out of
  the blue asking you to ‘validate’ or ‘confirm’
  banking details.
• You notice that amounts of money go missing
  from your bank account without any
  explanations.
• The caller pushes you to provide personal
  information and discourages you from
  checking if it’s a genuine request.
• You are unable to obtain credit or a loan
  because of an inexplicably bad credit rating.
Protect Yourself
Such organizations offer recommendations on how individuals can prevent their
information falling into the wrong hands

•If your personal information is lost, stolen, or
otherwise compromised, you can minimize the
potential damage from identity theft.

•Put a Fraud Alert on Your Credit Reports
•
Review Your Credit Reports
•
Create an Identity Theft Report
•
Protect Yourself

•NEVER send money or give personal details to people you don’t know
and trust.
•If you receive a call from your bank or any other organisation, don’t
provide your personal details—instead ask for their name and a contact
number. Check with the organisation in question before calling
back. NEVER rely on a number provided in an email or click on the
provided link—instead find the contact number through an internet
search or check the back of your ATM card.
•If you receive a request from a friend or family member stranded while
on holiday asking you to transfer money to them, contact them by phone
or alternative contact to verify the request is genuine before sending any
money or providing personal details.
•
Protect Yourself

• Regularly check your credit card and/or bank
  statements to ensure that suspicious transactions are
  detected.
• Log directly onto websites you are interested in rather
  than clicking on links provided in an email.
• Always get independent advice if you are unsure
  whether an offer or request is genuine.
Protect Yourself

•   To reduce or minimize the risk of becoming a victim of identity theft or fraud,
    there are some basic steps you can take. For starters, just remember the word


                               SCAM
Stingy about giving out your personal information
Check your financial information regularly
Ask periodically for a copy of your credit report
Maintain careful records of your banking and financial accounts.
ID Theft Resources
Regional legal responses
•   Australia (135.1 General dishonesty)
•   Canada (Under section 402.2 of the Criminal Code of Canada )
•   France (In France, a person convicted of identity theft can be
    sentenced up to five years in prison and fined up to €75,000)
•   Hong Kong (Under HK Laws. Chap 210 Theft Ordinance, sec. 16A
    Fraud )
•   India (Under the Information Technology Act 2000 Chapter IX Sec 66C)
SSO & ID Theft
Identity Theft Prevention Tips

More Related Content

What's hot (20)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Phishing
PhishingPhishing
Phishing
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Phishing
PhishingPhishing
Phishing
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 

Similar to Identity Theft Prevention Tips

H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 

Similar to Identity Theft Prevention Tips (20)

Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 

Recently uploaded

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Identity Theft Prevention Tips

  • 2. Agenda  Identity Theft & Film  What is identity theft?  Types of the Identity Theft  Statistics & Identity Theft  How does identity theft work?  Techniques  Warning signs  How to steal an identity?  Countermeasures  Protect yourself  Regional legal responses
  • 4. What is Identity Theft? Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
  • 5. What is Identity Theft? • The term identity theft was coined in 1964 • Determining the link between data breaches and identity theft is challenging • Probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%
  • 6. What is Identity Theft? Identity theft occurs when someone uses your name, your Social Security number, or some other personal, financial, or medical information without your permission to commit fraud or other crimes.
  • 7. Types of the Identity Theft Criminal identity theft (posing as another person when apprehended for a crime) Financial identity theft (using another's identity to obtain credit, goods and services) Identity cloning (using another's information to assume his or her identity in daily life) Medical identity theft (using another's identity to obtain medical care or drugs) Child identity theft. (children are valued because they do not have any information associated with them)
  • 8. Statistics & Identity Theft Consider the following: One million people in Canada will suffer from some form of identity theft totalling over $6 billion 50% of the cases reported will be as a result of unauthorized credit card charges. 20% of the victims will know their thieves The average time between the date of the theft and when it is noticed by the victim will be 14 months.
  • 10. How Does Identity Theft Work? • Identity theft works in a range of ways • from crude methods to well organised scams Human-Based Computer-Based Wealth personal information Cards Mail public records Information saved in our computers Information posted on social networking sites
  • 12. Techniques • Rummaging through rubbish for personal information (dumpster diving) • Retrieving personal data from redundant IT equipment • Using public records about individual citizens (electoral rolls) Stealing bank or credit cards, identification cards, passports, authentication tokens ( pickpocketing, housebreaking or mail theft) • Common-knowledge questioning (what was your first car model?)
  • 13. Techniques • Skimming information from bank or credit cards (Clone Card) • Using 'contactless' credit card readers to acquire data wirelessly from RFID-enabled passports • Observing users typing ( shoulder Surfing) • Stealing personal information from computers ( Malware, Trojan horse, Keystroke, Other Spyware) • Hacking computer networks, systems and databases (SQl Injection)
  • 14. Techniques • Exploiting breaches (Social Address, IC Number) • Advertising bogus job ( Resume, CV) • Exploiting insider access and abusing the rights of privileged IT users to access • Impersonating trusted organizations in emails, SMS text messages, phone calls (Phishing) • Brute-force attacking weak passwords and using inspired guesswork • Obtaining castings of fingers for falsifying fingerprint identification. • Browsing social networking websites for personal details • Using false pretences to trick individuals (Pretexting) • Guessing Social Security numbers by using information found
  • 15. TOOLS • Gunter Ollmann said, “Interested in credit card theft? There’s an app for that.” • The new program for infecting users’ computers is called Zeus (inexperienced hacker can operate it) SpyEye/ZeuS Toolkit v1.3.05
  • 16. Warning signs • You get an email, SMS or a phone call out of the blue asking you to ‘validate’ or ‘confirm’ banking details. • You notice that amounts of money go missing from your bank account without any explanations. • The caller pushes you to provide personal information and discourages you from checking if it’s a genuine request. • You are unable to obtain credit or a loan because of an inexplicably bad credit rating.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Protect Yourself Such organizations offer recommendations on how individuals can prevent their information falling into the wrong hands •If your personal information is lost, stolen, or otherwise compromised, you can minimize the potential damage from identity theft. •Put a Fraud Alert on Your Credit Reports • Review Your Credit Reports • Create an Identity Theft Report •
  • 29. Protect Yourself •NEVER send money or give personal details to people you don’t know and trust. •If you receive a call from your bank or any other organisation, don’t provide your personal details—instead ask for their name and a contact number. Check with the organisation in question before calling back. NEVER rely on a number provided in an email or click on the provided link—instead find the contact number through an internet search or check the back of your ATM card. •If you receive a request from a friend or family member stranded while on holiday asking you to transfer money to them, contact them by phone or alternative contact to verify the request is genuine before sending any money or providing personal details. •
  • 30. Protect Yourself • Regularly check your credit card and/or bank statements to ensure that suspicious transactions are detected. • Log directly onto websites you are interested in rather than clicking on links provided in an email. • Always get independent advice if you are unsure whether an offer or request is genuine.
  • 31. Protect Yourself • To reduce or minimize the risk of becoming a victim of identity theft or fraud, there are some basic steps you can take. For starters, just remember the word SCAM Stingy about giving out your personal information Check your financial information regularly Ask periodically for a copy of your credit report Maintain careful records of your banking and financial accounts.
  • 33. Regional legal responses • Australia (135.1 General dishonesty) • Canada (Under section 402.2 of the Criminal Code of Canada ) • France (In France, a person convicted of identity theft can be sentenced up to five years in prison and fined up to €75,000) • Hong Kong (Under HK Laws. Chap 210 Theft Ordinance, sec. 16A Fraud ) • India (Under the Information Technology Act 2000 Chapter IX Sec 66C)
  • 34. SSO & ID Theft