SlideShare a Scribd company logo
1 of 35
Eghbal Ghazizadeh
Agenda
   Identity Theft & Film
   What is identity theft?
   Types of the Identity Theft
   Statistics & Identity Theft
   How does identity theft work?
   Techniques
   Warning signs
   How to steal an identity?
   Countermeasures
   Protect yourself
   Regional legal responses
Identity Theft & Film
What is Identity Theft?

   Identity theft is a form of stealing
      someone's identity in which
  someone pretends to be someone
    else by assuming that person's
 identity, typically in order to access
resources or obtain credit and other
    benefits in that person's name
What is Identity Theft?
• The term identity theft was coined in 1964
• Determining the link between data breaches and
  identity theft is challenging
• Probability of becoming a victim to identity theft as a
  result of a data breach is ... around only 2%
What is Identity Theft?

Identity theft occurs when someone uses
your name, your Social Security number,
  or some other personal, financial, or
    medical information without your
   permission to commit fraud or other
                  crimes.
Types of the Identity Theft

Criminal identity theft
        (posing as another person when apprehended for a crime)
Financial identity theft
     (using another's identity to obtain credit, goods and services)
Identity cloning
    (using another's information to assume his or her identity in daily life)
Medical identity theft
    (using another's identity to obtain medical care or drugs)
Child identity theft.
    (children are valued because they do not have any information associated with them)
Statistics & Identity Theft

Consider the following:
 One million people in Canada will suffer from some form
of identity theft totalling over $6 billion

50% of the cases reported will be as a result of
unauthorized credit card charges.

20% of the victims will know their thieves

The average time between the date of the theft and when
it is noticed by the victim will be 14 months.
Statistics
How Does Identity Theft Work?
 • Identity theft works in a range of ways
 • from crude methods to well organised scams
      Human-Based           Computer-Based


                        Wealth
 personal information
 Cards
 Mail
 public records
 Information saved in our computers
 Information posted on social networking sites
Techniques
Techniques
• Rummaging through rubbish for personal
  information (dumpster diving)
• Retrieving personal data from redundant IT
  equipment
• Using public records about individual citizens
  (electoral rolls) Stealing bank or credit cards,
  identification cards, passports, authentication
  tokens ( pickpocketing, housebreaking or
  mail theft)
• Common-knowledge questioning (what was
  your first car model?)
Techniques
• Skimming information from bank or credit
  cards (Clone Card)
• Using 'contactless' credit card readers to
  acquire data wirelessly from RFID-enabled
  passports
• Observing users typing ( shoulder Surfing)
• Stealing personal information from computers
  ( Malware, Trojan horse, Keystroke, Other
  Spyware)
• Hacking computer networks, systems and
  databases (SQl Injection)
Techniques
•   Exploiting breaches (Social Address, IC Number)
•   Advertising bogus job ( Resume, CV)
•   Exploiting insider access and abusing the rights of privileged IT users
    to access
•   Impersonating trusted organizations in emails, SMS text messages,
    phone calls (Phishing)
•   Brute-force attacking weak passwords and using inspired guesswork
•   Obtaining castings of fingers for falsifying fingerprint identification.
•   Browsing social networking websites for personal details
•   Using false pretences to trick individuals (Pretexting)
•   Guessing Social Security numbers by using information found
TOOLS
• Gunter Ollmann said, “Interested in credit card theft?
  There’s an app for that.”
• The new program for infecting users’ computers is
  called Zeus (inexperienced hacker can operate it)
            SpyEye/ZeuS Toolkit v1.3.05
Warning signs

• You get an email, SMS or a phone call out of
  the blue asking you to ‘validate’ or ‘confirm’
  banking details.
• You notice that amounts of money go missing
  from your bank account without any
  explanations.
• The caller pushes you to provide personal
  information and discourages you from
  checking if it’s a genuine request.
• You are unable to obtain credit or a loan
  because of an inexplicably bad credit rating.
Protect Yourself
Such organizations offer recommendations on how individuals can prevent their
information falling into the wrong hands

•If your personal information is lost, stolen, or
otherwise compromised, you can minimize the
potential damage from identity theft.

•Put a Fraud Alert on Your Credit Reports
•
Review Your Credit Reports
•
Create an Identity Theft Report
•
Protect Yourself

•NEVER send money or give personal details to people you don’t know
and trust.
•If you receive a call from your bank or any other organisation, don’t
provide your personal details—instead ask for their name and a contact
number. Check with the organisation in question before calling
back. NEVER rely on a number provided in an email or click on the
provided link—instead find the contact number through an internet
search or check the back of your ATM card.
•If you receive a request from a friend or family member stranded while
on holiday asking you to transfer money to them, contact them by phone
or alternative contact to verify the request is genuine before sending any
money or providing personal details.
•
Protect Yourself

• Regularly check your credit card and/or bank
  statements to ensure that suspicious transactions are
  detected.
• Log directly onto websites you are interested in rather
  than clicking on links provided in an email.
• Always get independent advice if you are unsure
  whether an offer or request is genuine.
Protect Yourself

•   To reduce or minimize the risk of becoming a victim of identity theft or fraud,
    there are some basic steps you can take. For starters, just remember the word


                               SCAM
Stingy about giving out your personal information
Check your financial information regularly
Ask periodically for a copy of your credit report
Maintain careful records of your banking and financial accounts.
ID Theft Resources
Regional legal responses
•   Australia (135.1 General dishonesty)
•   Canada (Under section 402.2 of the Criminal Code of Canada )
•   France (In France, a person convicted of identity theft can be
    sentenced up to five years in prison and fined up to €75,000)
•   Hong Kong (Under HK Laws. Chap 210 Theft Ordinance, sec. 16A
    Fraud )
•   India (Under the Information Technology Act 2000 Chapter IX Sec 66C)
SSO & ID Theft
Identity theft

More Related Content

What's hot

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 

What's hot (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Identity theft

H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsDeb Vosejpka
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Barbara O'Neill
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Trainingswalton4
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 

Similar to Identity theft (20)

Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Ppl World Atl June 2007 Training
Ppl World Atl June 2007 TrainingPpl World Atl June 2007 Training
Ppl World Atl June 2007 Training
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Identity theft

  • 2. Agenda  Identity Theft & Film  What is identity theft?  Types of the Identity Theft  Statistics & Identity Theft  How does identity theft work?  Techniques  Warning signs  How to steal an identity?  Countermeasures  Protect yourself  Regional legal responses
  • 4. What is Identity Theft? Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name
  • 5. What is Identity Theft? • The term identity theft was coined in 1964 • Determining the link between data breaches and identity theft is challenging • Probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%
  • 6. What is Identity Theft? Identity theft occurs when someone uses your name, your Social Security number, or some other personal, financial, or medical information without your permission to commit fraud or other crimes.
  • 7. Types of the Identity Theft Criminal identity theft (posing as another person when apprehended for a crime) Financial identity theft (using another's identity to obtain credit, goods and services) Identity cloning (using another's information to assume his or her identity in daily life) Medical identity theft (using another's identity to obtain medical care or drugs) Child identity theft. (children are valued because they do not have any information associated with them)
  • 8. Statistics & Identity Theft Consider the following: One million people in Canada will suffer from some form of identity theft totalling over $6 billion 50% of the cases reported will be as a result of unauthorized credit card charges. 20% of the victims will know their thieves The average time between the date of the theft and when it is noticed by the victim will be 14 months.
  • 10. How Does Identity Theft Work? • Identity theft works in a range of ways • from crude methods to well organised scams Human-Based Computer-Based Wealth personal information Cards Mail public records Information saved in our computers Information posted on social networking sites
  • 12. Techniques • Rummaging through rubbish for personal information (dumpster diving) • Retrieving personal data from redundant IT equipment • Using public records about individual citizens (electoral rolls) Stealing bank or credit cards, identification cards, passports, authentication tokens ( pickpocketing, housebreaking or mail theft) • Common-knowledge questioning (what was your first car model?)
  • 13. Techniques • Skimming information from bank or credit cards (Clone Card) • Using 'contactless' credit card readers to acquire data wirelessly from RFID-enabled passports • Observing users typing ( shoulder Surfing) • Stealing personal information from computers ( Malware, Trojan horse, Keystroke, Other Spyware) • Hacking computer networks, systems and databases (SQl Injection)
  • 14. Techniques • Exploiting breaches (Social Address, IC Number) • Advertising bogus job ( Resume, CV) • Exploiting insider access and abusing the rights of privileged IT users to access • Impersonating trusted organizations in emails, SMS text messages, phone calls (Phishing) • Brute-force attacking weak passwords and using inspired guesswork • Obtaining castings of fingers for falsifying fingerprint identification. • Browsing social networking websites for personal details • Using false pretences to trick individuals (Pretexting) • Guessing Social Security numbers by using information found
  • 15. TOOLS • Gunter Ollmann said, “Interested in credit card theft? There’s an app for that.” • The new program for infecting users’ computers is called Zeus (inexperienced hacker can operate it) SpyEye/ZeuS Toolkit v1.3.05
  • 16. Warning signs • You get an email, SMS or a phone call out of the blue asking you to ‘validate’ or ‘confirm’ banking details. • You notice that amounts of money go missing from your bank account without any explanations. • The caller pushes you to provide personal information and discourages you from checking if it’s a genuine request. • You are unable to obtain credit or a loan because of an inexplicably bad credit rating.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Protect Yourself Such organizations offer recommendations on how individuals can prevent their information falling into the wrong hands •If your personal information is lost, stolen, or otherwise compromised, you can minimize the potential damage from identity theft. •Put a Fraud Alert on Your Credit Reports • Review Your Credit Reports • Create an Identity Theft Report •
  • 29. Protect Yourself •NEVER send money or give personal details to people you don’t know and trust. •If you receive a call from your bank or any other organisation, don’t provide your personal details—instead ask for their name and a contact number. Check with the organisation in question before calling back. NEVER rely on a number provided in an email or click on the provided link—instead find the contact number through an internet search or check the back of your ATM card. •If you receive a request from a friend or family member stranded while on holiday asking you to transfer money to them, contact them by phone or alternative contact to verify the request is genuine before sending any money or providing personal details. •
  • 30. Protect Yourself • Regularly check your credit card and/or bank statements to ensure that suspicious transactions are detected. • Log directly onto websites you are interested in rather than clicking on links provided in an email. • Always get independent advice if you are unsure whether an offer or request is genuine.
  • 31. Protect Yourself • To reduce or minimize the risk of becoming a victim of identity theft or fraud, there are some basic steps you can take. For starters, just remember the word SCAM Stingy about giving out your personal information Check your financial information regularly Ask periodically for a copy of your credit report Maintain careful records of your banking and financial accounts.
  • 33. Regional legal responses • Australia (135.1 General dishonesty) • Canada (Under section 402.2 of the Criminal Code of Canada ) • France (In France, a person convicted of identity theft can be sentenced up to five years in prison and fined up to €75,000) • Hong Kong (Under HK Laws. Chap 210 Theft Ordinance, sec. 16A Fraud ) • India (Under the Information Technology Act 2000 Chapter IX Sec 66C)
  • 34. SSO & ID Theft