Id theft computer security and the human factor
Download
1 / 23

ID Theft, Computer Security and the Human Factor - PowerPoint PPT Presentation


  • 249 Views
  • Uploaded on

ID Theft, Computer Security and the Human Factor. Tom Ryan, RU-Camden Law Harold Winshel, Camden Arts & Sciences. Agenda. Identity Theft What is identity theft? Why is it bad? How is it done? What can you do to prevent it? Computer Security - Top 10 best practices Social Engineering

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'ID Theft, Computer Security and the Human Factor' - mike_john


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Id theft computer security and the human factor l.jpg

ID Theft, Computer Security and the Human Factor

Tom Ryan, RU-Camden Law Harold Winshel, Camden Arts & Sciences


Agenda l.jpg
Agenda

  • Identity Theft

    • What is identity theft?

    • Why is it bad?

    • How is it done?

    • What can you do to prevent it?

  • Computer Security

    - Top 10 best practices

  • Social Engineering

    • Actions & Reactions


Identity theft l.jpg
Identity Theft

  • Prevention

  • Detection

  • Recovery


How prevalent is it l.jpg
How prevalent is it?

  • 10 Million Americans in 2003 (up 41 %)

    • http://www.ftc.gov/os/2003/12/031215idthefttestimony.pdf

  • Costs $53 Billion

    http://www.ftc.gov/os/2003/12/031215idthefttestimony.pdf

  • Un-reported costs…


How does it happen l.jpg
How does it happen?

  • Most ID theft is done through very low-tech means.

  • With a name, address and a credit card number, and the 3 digit card identifier, most telephone businesses will ship to any address.

  • Very few cross checks


Why is id theft done l.jpg
Why is ID Theft Done?

  • $$$ For financial gain. $$$


Detection l.jpg
Detection

  • You start getting collection calls/mail

  • You are denied credit

  • You stop getting mail

  • You start getting new bills for accounts you do not have or services you did not authorize.

  • Your bank account balance drops.


What you can do to prevent it l.jpg
What you can do to prevent it?

  • Account Information

  • ATM, Credit, and Debit Cards

  • Bills, Bank Statements, and Other Records

  • Calling Cards

  • Checks

  • Credit Reports

  • Mail

  • Trash


Good practices l.jpg
Good practices

  • Photocopy the contents of wallet/purse

  • Photocopy your passport (keep a copy at home and one with you)

  • Empty your wallet/purse of non-essential identifiers, especially your Social Security Card.

  • Do not use any information provided by the people trying to scam you… Look it up yourself.

  • Use a paper crosscut shredder.

  • When on vacation, don’t stop your newspaper.


Recovery l.jpg
Recovery

  • File a report with the credit provider

  • File a police report

  • Notify the Credit bureaus

  • Notify the FTC


What you can do if you become a victim l.jpg
What you can do if you become a victim?

  • Contact the fraud departments of any one of the three major credit bureaus  to place a fraud alert on your credit file.

  • Ask for new account numbers for accounts that you know or believe have been tampered with or used fraudulently.

  • Close Accounts that have been opened fraudulently.

  • File a police report. Get a copy of the report to submit to your creditors

  • File your complaint with the FTC.


What will the future bring l.jpg
What will the future bring ?

  • The trend is that it is getting worse

  • Continue with awareness and education

  • Review policies and procedures

  • Improve the security web site

  • Seek input from our user community

    Security is everybody’s business


Your computer and id theft l.jpg
Your computer and ID Theft

What you can do to

  • Protect your confidential information

  • Prepare for an incident (just in case)

  • Prevent identity theft


Your computer and id theft14 l.jpg
Your computer and ID theft

  • Protect yourself

    • When ordering online, make sure the site is secure (https://)

  • Protect others

    • Have your antivirus software keeping you up to date

    • Set your system to auto update patches


Good computing practices l.jpg
Good Computing Practices

  • Encryption (SSL, the lock, SHTTP or HTTPS)

  • Firewall

  • Anti-Adware/Anti-Trojan

  • Wireless

  • P2P file sharing

  • Separate passwords

  • Password “Safe” software

  • E-mail is not secure

  • Disconnect from the internet when not in use

  • Check our security and smoke alarm batteries at the bi-annual time changes (April & November)

  • Do not use phone numbers or web links provided by others


Good computing practices16 l.jpg
Good computing practices

  • Use automatic updating anti-virus software (Rutgers Antivirus Delivery Service - RADS)

  • Exercise caution when opening email attachments

  • Select hard to guess passwords and keeping them private

  • Back up important files

  • Download and install operating system update patches

  • Become aware of the risks in file sharing (turn off or password protect)

  • Use a password protected screen saver

  • Lock up your computer when not in use

  • Know how to report a computer abuse incident

  • Protect your computer by using a firewall


Phishing spoofing l.jpg
Phishing / Spoofing

  • Sending an email to a user falsely claiming to be an established legitimate enterprise in an effort to scam the user into surrendering private information that will be used for identity theft (www.webopedia.com)

  • Phishing – bait.

  • Spoof – fake the appearance of a popular web site


Phishing e mail l.jpg
Phishing E-mail

  • From: Fleet bank [mailto:user-billing06@fleet.com] Sent: Tuesday, February 10, 2004 6:31 PMTo: abuse@rutgers.eduSubject: To aII Fleet bank users


Damages to you l.jpg
Damages to you

  • Time

  • Money

  • Credit rating

  • Reputation


Damages to rutgers l.jpg
Damages to Rutgers…

  • Reputation

  • Violation of federal and state laws.

  • Fines

  • Reparations costs

  • Recovery costs

  • Increased prevention costs

  • Georgia Tech release of credit cards to the internet cost them over $1,000,000.


Links and resources l.jpg
Links and Resources

  • http://www.consumer.gov/idtheft/index.html

  • http://www.usps.com/postalinspectors/idthft_ncpw.htm

  • http://www.ed.gov/about/offices/list/oig/misused/index.html

  • http://www.ssa.gov/pubs/10064.html

    • 1-800-269-0271

    • http://rusecure.rutgers.edu/sec_aware/phish.php#identity



Services available at rutgers university for faculty staff and students l.jpg
Services available at Rutgers University for Faculty, Staff and Students

  • Help Desk for computer problems

  • Identity Theft 911

    • http://adminaffairs.rutgers.edu/IdentityTheft911.shtml

  • Computer abuse