id theft computer security and the human factor l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
ID Theft, Computer Security and the Human Factor PowerPoint Presentation
Download Presentation
ID Theft, Computer Security and the Human Factor

Loading in 2 Seconds...

play fullscreen
1 / 23

ID Theft, Computer Security and the Human Factor - PowerPoint PPT Presentation


  • 257 Views
  • Uploaded on

ID Theft, Computer Security and the Human Factor. Tom Ryan, RU-Camden Law Harold Winshel, Camden Arts & Sciences. Agenda. Identity Theft What is identity theft? Why is it bad? How is it done? What can you do to prevent it? Computer Security - Top 10 best practices Social Engineering

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'ID Theft, Computer Security and the Human Factor' - mike_john


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
id theft computer security and the human factor

ID Theft, Computer Security and the Human Factor

Tom Ryan, RU-Camden Law Harold Winshel, Camden Arts & Sciences

agenda
Agenda
  • Identity Theft
    • What is identity theft?
    • Why is it bad?
    • How is it done?
    • What can you do to prevent it?
  • Computer Security

- Top 10 best practices

  • Social Engineering
    • Actions & Reactions
identity theft
Identity Theft
  • Prevention
  • Detection
  • Recovery
how prevalent is it
How prevalent is it?
  • 10 Million Americans in 2003 (up 41 %)
    • http://www.ftc.gov/os/2003/12/031215idthefttestimony.pdf
  • Costs $53 Billion

http://www.ftc.gov/os/2003/12/031215idthefttestimony.pdf

  • Un-reported costs…
how does it happen
How does it happen?
  • Most ID theft is done through very low-tech means.
  • With a name, address and a credit card number, and the 3 digit card identifier, most telephone businesses will ship to any address.
  • Very few cross checks
why is id theft done
Why is ID Theft Done?
  • $$$ For financial gain. $$$
detection
Detection
  • You start getting collection calls/mail
  • You are denied credit
  • You stop getting mail
  • You start getting new bills for accounts you do not have or services you did not authorize.
  • Your bank account balance drops.
what you can do to prevent it
What you can do to prevent it?
  • Account Information
  • ATM, Credit, and Debit Cards
  • Bills, Bank Statements, and Other Records
  • Calling Cards
  • Checks
  • Credit Reports
  • Mail
  • Trash
good practices
Good practices
  • Photocopy the contents of wallet/purse
  • Photocopy your passport (keep a copy at home and one with you)
  • Empty your wallet/purse of non-essential identifiers, especially your Social Security Card.
  • Do not use any information provided by the people trying to scam you… Look it up yourself.
  • Use a paper crosscut shredder.
  • When on vacation, don’t stop your newspaper.
recovery
Recovery
  • File a report with the credit provider
  • File a police report
  • Notify the Credit bureaus
  • Notify the FTC
what you can do if you become a victim
What you can do if you become a victim?
  • Contact the fraud departments of any one of the three major credit bureaus  to place a fraud alert on your credit file.
  • Ask for new account numbers for accounts that you know or believe have been tampered with or used fraudulently.
  • Close Accounts that have been opened fraudulently.
  • File a police report. Get a copy of the report to submit to your creditors
  • File your complaint with the FTC.
what will the future bring
What will the future bring ?
  • The trend is that it is getting worse
  • Continue with awareness and education
  • Review policies and procedures
  • Improve the security web site
  • Seek input from our user community

Security is everybody’s business

your computer and id theft
Your computer and ID Theft

What you can do to

  • Protect your confidential information
  • Prepare for an incident (just in case)
  • Prevent identity theft
your computer and id theft14
Your computer and ID theft
  • Protect yourself
    • When ordering online, make sure the site is secure (https://)
  • Protect others
    • Have your antivirus software keeping you up to date
    • Set your system to auto update patches
good computing practices
Good Computing Practices
  • Encryption (SSL, the lock, SHTTP or HTTPS)
  • Firewall
  • Anti-Adware/Anti-Trojan
  • Wireless
  • P2P file sharing
  • Separate passwords
  • Password “Safe” software
  • E-mail is not secure
  • Disconnect from the internet when not in use
  • Check our security and smoke alarm batteries at the bi-annual time changes (April & November)
  • Do not use phone numbers or web links provided by others
good computing practices16
Good computing practices
  • Use automatic updating anti-virus software (Rutgers Antivirus Delivery Service - RADS)
  • Exercise caution when opening email attachments
  • Select hard to guess passwords and keeping them private
  • Back up important files
  • Download and install operating system update patches
  • Become aware of the risks in file sharing (turn off or password protect)
  • Use a password protected screen saver
  • Lock up your computer when not in use
  • Know how to report a computer abuse incident
  • Protect your computer by using a firewall
phishing spoofing
Phishing / Spoofing
  • Sending an email to a user falsely claiming to be an established legitimate enterprise in an effort to scam the user into surrendering private information that will be used for identity theft (www.webopedia.com)
  • Phishing – bait.
  • Spoof – fake the appearance of a popular web site
phishing e mail
Phishing E-mail
  • From: Fleet bank [mailto:user-billing06@fleet.com] Sent: Tuesday, February 10, 2004 6:31 PMTo: abuse@rutgers.eduSubject: To aII Fleet bank users
damages to you
Damages to you
  • Time
  • Money
  • Credit rating
  • Reputation
damages to rutgers
Damages to Rutgers…
  • Reputation
  • Violation of federal and state laws.
  • Fines
  • Reparations costs
  • Recovery costs
  • Increased prevention costs
  • Georgia Tech release of credit cards to the internet cost them over $1,000,000.
links and resources
Links and Resources
  • http://www.consumer.gov/idtheft/index.html
  • http://www.usps.com/postalinspectors/idthft_ncpw.htm
  • http://www.ed.gov/about/offices/list/oig/misused/index.html
  • http://www.ssa.gov/pubs/10064.html
    • 1-800-269-0271
    • http://rusecure.rutgers.edu/sec_aware/phish.php#identity
services available at rutgers university for faculty staff and students
Services available at Rutgers University for Faculty, Staff and Students
  • Help Desk for computer problems
  • Identity Theft 911
    • http://adminaffairs.rutgers.edu/IdentityTheft911.shtml
  • Computer abuse