Id theft computer security and the human factor l.jpg
This presentation is the property of its rightful owner.
Sponsored Links
1 / 23

ID Theft, Computer Security and the Human Factor PowerPoint PPT Presentation


ID Theft, Computer Security and the Human Factor. Tom Ryan, RU-Camden Law Harold Winshel, Camden Arts & Sciences. Agenda. Identity Theft What is identity theft? Why is it bad? How is it done? What can you do to prevent it? Computer Security - Top 10 best practices Social Engineering

Download Presentation

ID Theft, Computer Security and the Human Factor

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Id theft computer security and the human factor l.jpg

ID Theft, Computer Security and the Human Factor

Tom Ryan, RU-Camden Law Harold Winshel, Camden Arts & Sciences


Agenda l.jpg

Agenda

  • Identity Theft

    • What is identity theft?

    • Why is it bad?

    • How is it done?

    • What can you do to prevent it?

  • Computer Security

    - Top 10 best practices

  • Social Engineering

    • Actions & Reactions


Identity theft l.jpg

Identity Theft

  • Prevention

  • Detection

  • Recovery


How prevalent is it l.jpg

How prevalent is it?

  • 10 Million Americans in 2003 (up 41 %)

    • http://www.ftc.gov/os/2003/12/031215idthefttestimony.pdf

  • Costs $53 Billion

    http://www.ftc.gov/os/2003/12/031215idthefttestimony.pdf

  • Un-reported costs…


How does it happen l.jpg

How does it happen?

  • Most ID theft is done through very low-tech means.

  • With a name, address and a credit card number, and the 3 digit card identifier, most telephone businesses will ship to any address.

  • Very few cross checks


Why is id theft done l.jpg

Why is ID Theft Done?

  • $$$ For financial gain. $$$


Detection l.jpg

Detection

  • You start getting collection calls/mail

  • You are denied credit

  • You stop getting mail

  • You start getting new bills for accounts you do not have or services you did not authorize.

  • Your bank account balance drops.


What you can do to prevent it l.jpg

What you can do to prevent it?

  • Account Information

  • ATM, Credit, and Debit Cards

  • Bills, Bank Statements, and Other Records

  • Calling Cards

  • Checks

  • Credit Reports

  • Mail

  • Trash


Good practices l.jpg

Good practices

  • Photocopy the contents of wallet/purse

  • Photocopy your passport (keep a copy at home and one with you)

  • Empty your wallet/purse of non-essential identifiers, especially your Social Security Card.

  • Do not use any information provided by the people trying to scam you… Look it up yourself.

  • Use a paper crosscut shredder.

  • When on vacation, don’t stop your newspaper.


Recovery l.jpg

Recovery

  • File a report with the credit provider

  • File a police report

  • Notify the Credit bureaus

  • Notify the FTC


What you can do if you become a victim l.jpg

What you can do if you become a victim?

  • Contact the fraud departments of any one of the three major credit bureaus  to place a fraud alert on your credit file.

  • Ask for new account numbers for accounts that you know or believe have been tampered with or used fraudulently.

  • Close Accounts that have been opened fraudulently.

  • File a police report. Get a copy of the report to submit to your creditors

  • File your complaint with the FTC.


What will the future bring l.jpg

What will the future bring ?

  • The trend is that it is getting worse

  • Continue with awareness and education

  • Review policies and procedures

  • Improve the security web site

  • Seek input from our user community

    Security is everybody’s business


Your computer and id theft l.jpg

Your computer and ID Theft

What you can do to

  • Protect your confidential information

  • Prepare for an incident (just in case)

  • Prevent identity theft


Your computer and id theft14 l.jpg

Your computer and ID theft

  • Protect yourself

    • When ordering online, make sure the site is secure (https://)

  • Protect others

    • Have your antivirus software keeping you up to date

    • Set your system to auto update patches


Good computing practices l.jpg

Good Computing Practices

  • Encryption (SSL, the lock, SHTTP or HTTPS)

  • Firewall

  • Anti-Adware/Anti-Trojan

  • Wireless

  • P2P file sharing

  • Separate passwords

  • Password “Safe” software

  • E-mail is not secure

  • Disconnect from the internet when not in use

  • Check our security and smoke alarm batteries at the bi-annual time changes (April & November)

  • Do not use phone numbers or web links provided by others


Good computing practices16 l.jpg

Good computing practices

  • Use automatic updating anti-virus software (Rutgers Antivirus Delivery Service - RADS)

  • Exercise caution when opening email attachments

  • Select hard to guess passwords and keeping them private

  • Back up important files

  • Download and install operating system update patches

  • Become aware of the risks in file sharing (turn off or password protect)

  • Use a password protected screen saver

  • Lock up your computer when not in use

  • Know how to report a computer abuse incident

  • Protect your computer by using a firewall


Phishing spoofing l.jpg

Phishing / Spoofing

  • Sending an email to a user falsely claiming to be an established legitimate enterprise in an effort to scam the user into surrendering private information that will be used for identity theft (www.webopedia.com)

  • Phishing – bait.

  • Spoof – fake the appearance of a popular web site


Phishing e mail l.jpg

Phishing E-mail

  • From: Fleet bank [mailto:[email protected]] Sent: Tuesday, February 10, 2004 6:31 PMTo: [email protected]: To aII Fleet bank users


Damages to you l.jpg

Damages to you

  • Time

  • Money

  • Credit rating

  • Reputation


Damages to rutgers l.jpg

Damages to Rutgers…

  • Reputation

  • Violation of federal and state laws.

  • Fines

  • Reparations costs

  • Recovery costs

  • Increased prevention costs

  • Georgia Tech release of credit cards to the internet cost them over $1,000,000.


Links and resources l.jpg

Links and Resources

  • http://www.consumer.gov/idtheft/index.html

  • http://www.usps.com/postalinspectors/idthft_ncpw.htm

  • http://www.ed.gov/about/offices/list/oig/misused/index.html

  • http://www.ssa.gov/pubs/10064.html

    • 1-800-269-0271

    • http://rusecure.rutgers.edu/sec_aware/phish.php#identity


Id theft action form l.jpg

ID Theft Action form


Services available at rutgers university for faculty staff and students l.jpg

Services available at Rutgers University for Faculty, Staff and Students

  • Help Desk for computer problems

  • Identity Theft 911

    • http://adminaffairs.rutgers.edu/IdentityTheft911.shtml

  • Computer abuse


  • Login