1 / 0

How can one secure his/her computer to protect him/herself from INTRUDERS: hackers, scammers, and identity thieves? By

How can one secure his/her computer to protect him/herself from INTRUDERS: hackers, scammers, and identity thieves? By: liz. Identity theft.

borna
Download Presentation

How can one secure his/her computer to protect him/herself from INTRUDERS: hackers, scammers, and identity thieves? By

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How can one secure his/her computer to protect him/herself from INTRUDERS: hackers, scammers, and identity thieves?By: liz
  2. Identity theft Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held accountable for the perpetrator's actions. Identity theft occurs when someone uses your personally identifying information, ie. your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. The term identity theft was coined in 1964[1] source: http://en.wikipedia.org/wiki/Identity_theft
  3. TYPES of Identity theft Identity cloning and concealment This identity thief impersonates someone else in order to conceal their own true identity. Ie. People hiding from creditors or other individuals; those who want to become "anonymous" for personal reasons; posers, a label given to people who use somebody else’s photos and information through social networking sites. Criminal identity theft This refers to someone who identifies themself to police as another individual at the point of arrest, in some cases criminals have previously obtained state-issued identity documents using credentials stolen from others, or fake ID. Victims might only learn of such incidents by receiving court summons, discovering their drivers licenses are suspended, or through background checks performed for employment purposes. Synthetic identity theft Is when identities are completely or partially invented. The most common technique involves combining a real social security number with a name and birthdate other than the ones associated with the number. It is a challenge to detect as it doesn't show on either person's credit report but as a subfile. It may show as an entirely new file in the credit bureau. Medical identity theft Refers to someone who uses another person’s identity information to make false claims for medical services or goods sometimes through medical insurance information. The result of this can be deadly, because inaccurate information is linked to the victim’s medical records and therefore inappropriate decisions by medical staff. Child identity theft This happens when a minor’s Social Security number is used by another person for the scammer’s personal gain. Lines of credit, obtain driver’s licenses, or even home purchase can result to using a child’s identity. It is not only fairly common but is often undetected until child becomes an adult. This is a growing problem as confirmed by Richard Power report of the Carnegie MellonCylab with data supplied by AllClear ID, found that of 40,000 children 10.2% were victims of identity theft.
  4. WAYS INTRUDERS GET IN Anyone can fall victim to identity theft. Consider the following ways: Accessing the Internet from an unsecured PC— Without a security layer between your computer and the Internet, you invite hackers to steal your identity, destroy your files, or use your PC to attack others Obtaining potentially unwanted programs like spyware or adware on your PC—Malicious software programs may monitor your keystrokes, track your Internet logins, transmit your confidential information, or redirect your browser to fake web sites Sending personal information over the Internet— Hackers can easily retrieve sensitive data that is sent over an unsecured Internet connection Downloading files from friends and family or accepting unknown emails— You can obtain a virus, worm, or Trojan simply by accepting files from your friends, family, or others Not recognizing phishing scams or spam— Phishing scams use fraudulent emails and websites to lure unsuspecting users into revealing private account or login information Leaving your wireless network unsecured— Since your wireless network’s radio waves travel through walls, a hacker with a simple antenna could attack you from miles away to steal your information or to launch attacks from your PC Source: http://www.hawaiiantel.com/Portals/0/pdfs/1258-Identity%20Theft%20Protection%20D1.pdf
  5. Computer Security Scammers, hackers, and identity thieves are itching to steal your personal information. Here are steps you can take to protect yourself: Use Security Software That Updates Automatically Treat Your Personal Information Like Cash Check Out Companies to Find out Who You’re Really Dealing With Give Personal Information Over Encrypted Websites Only Protect Your Passwords Back Up Your Files Source: http://www.onguardonline.gov/articles/0009-computer-security
More Related