Crime Slide 2: Hacking Hacking trophy hacking phone phreaking Phone Phreaking 1970s John Draper Captain Crunch blueboxes phone phreaking Cracker

Size: px
Start display at page:

Download "Crime Slide 2: Hacking Hacking trophy hacking phone phreaking Phone Phreaking 1970s John Draper Captain Crunch blueboxes phone phreaking Cracker"

Transcription

1 Crime a) Cases through the years show how the Web changes the impact of crime and the impact of law. b) Our financial health is affected by technology all the new cybercrime that we have to keep up with and learn how to avoid. c) Because the hackers and criminals are so clever in finding security holes and stealing information, the technology has to continually evolve to keep up with finding and patching security flaws. Computers and the Internet make illegal activities easier to commit; they are more devastating and harder to detect. The average loss from a computer fraud is more than $100K. Identity Theft affects millions of people (8-10 million per year). No more is it just teenagers spray painting the speed limit sign to make the 35 look like 85 - computer vandalism by teenagers can bring business to a halt. Think about the damage that terrorists could accomplish they could sabotage power and communications systems. Did you know that your cell phone, handhelds, ipods, navigation systems, digital frames and other smaller devices can get viruses or be hacked into? Slide 2: Hacking Hacking breaking into computer systems on which the hacker has no authorized access. Early on, hacking referred to a creative programmer who wrote very elegant or clever programs. They created many of the first computer games and operating systems. Most had no intention of disrupting service; they frowned on doing damage. Hackers sought knowledge and intellectual challenges; some broke into systems just to see if they could do it, or to see how many times they could do it, which is referred to as trophy hacking. In the 1980s, hacking started taking on a more negative meaning, and included spreading computer viruses, pranks, thefts, and phone phreaking. o Phone Phreaking was a popular past time in the late 1970s and 1980s where the telephone service was tricked into giving free access to long-distance phone lines. o 1970s John Draper ( Captain Crunch ) discovered that a whistle in a cereal box generated a tone identical to the one used by the US telephone network and was able to fool the telephone system into giving free access to long-distance telephone lines. Eventually, instead of blowing the whistle into a pay phone mouthpiece, Draper and other resourceful individuals developed blueboxes, electronic tone generators that could reproduce the full series of tones that the US telephone network used in its call-routing system, making it possible to call anywhere in the world for free. Since then, phone phreaking has become a popular past time. Steve Wozniak, before created the Apple computer and cofounding Apple Computer Corp., was building blueboxes. Cracker in an attempt to preserve the original meaning of hacker, this term was to refer to those who break into systems without authorization, or those whose intent is to do damage, but hacker is more commonly used. White-hat hacker term used for those who hack into a system just to see if they can, just for the fun of it, with no criminal intent or intent to do damage; often to demonstrate system vulnerabilities or to improve security Black-hat hacker term for those who hack into a system with intent to destroy information or for illegal gain Script kiddies young, amateur, inexperienced hackers who sometimes use tools created by skilled hackers that they can find on the Internet Sniffers programs that read information traveling over the Internet and extract passwords Social engineering fooling people into disclosing information, such as passwords

2 Something to think about: Suppose a 16-year old hacker uses automatic-dialing software to flood the emergency 911 telephone system with calls, knocking out 911 service. What penalty do you think is appropriate? Would your opinion change if it had resulted in the death of someone because an emergency call couldn t get through? Slide 3: Hacking Cases 1970s John Draper ( Captain Crunch ) explained above late 1970s 1980s Kevin Mitnick famous hacker, has spent nearly ½ his adult life either in prison or as a fugitive. Beginning at age 12, he used social engineering to gain information on how to bypass systems; at 12, he found out how to obtain his own punch for the punch-cards used for the buses in LA and soon was getting free bus rides all over LA; he was into the phone phreaking craze enabling him to make free phone long distance phone calls; he gained unauthorized access to his first computer network in 1979 at the age of 16, getting into DECs computers and copying software; he gained unauthorized access to dozens of other computer networks, claiming to never have destroyed or deleted any files; he was a wanted fugitive of the FBI for a number of years, and was finally caught in the mid-1990s. He served 5 years in prison, including 8 months in solitary confinement because law enforcement officials convinced a judge that he was able to start a nuclear war by whistling into a pay phone. He was released in Jan Now he has his own computer security consulting firm. There is controversy about what he has been accused of and what he actually did. Now, AT&T is denying service to him see this article: April 27, 1987 Captain Midnight - viewers of HBO in the US watching The Falcon and the Snowman saw their screens go blank and the message on the slide appeared for about 4 minutes. An angry satellite dish salesman figured out how to intercept the signal and broadcast that message as a protest against HBO s decision to scramble its satellite signal so that backyard dish owners were forced to buy or hire decoders to view HBO s programs. This really illustrated the vulnerability of satellites and other communications systems what if this guy was an international terrorist who was able to change the orbit of a satellite into the path of another satellite, many of which carry small nuclear reactors as a power source (satellites are directed from the ground by using radio signals to control the functioning of their small maneuvering engines). Late 1980s Fry Guy a 15-year old hacked into McDonald s payroll computer to give his friends raises. He also hacked a credit reporting service & the telephone system in a scheme to get Western Union to wire him $$ from other people s accounts. He is the same guy who in 1989 diverted all calls to the Palm Beach County Probation Department in Delray Beach, FL to a phonesex hotline in NY. Russian man & Citicorp A Russian man with accomplices in several countries used stolen passwords to steal $400,000 from Citicorp. While unknowingly under computer surveillance by authorities, he transferred another $11,000,000 to bank accounts in other countries Michelangelo virus was a time bomb that infected the computer on March 6 th if the PC user executed the program that contained the virus on that day. The virus overwrote critical records on the boot disk, which is usually the C: drive, in which case destroying the contents of the hard drive. o Viruses a type of malware, or malicious logic program (programs that get onto a computer without the user s knowledge and does malicious, sometimes very harmful things to the computer system. Malware can come from websites that you visit some are re-directs, some are just sites that you happen to visit. Malware includes viruses, worms, Trojan horses, spyware, adware, and other malicious unwanted software. There were 41,000 pieces of malware in 2006.) viruses are self-replicating programs embedded within another program, called a host, that causes damage and infects other programs, floppy disks, or hard disks by copying itself onto them. Viruses can be spread from machine to machine via diskettes or

3 CDs. They may be passed to a computer when a file is downloaded from the Internet. A 2003 study revealed that 45% of the executable files people downloaded from KaZaA contained viruses or Trojan horses. Also, viruses can be spread via through an attachment. Some are fairly harmless, just occupying disk space or consuming CPU time, but most are not usually resulting in hard disk erasure or file corruption. o Time bombs are programs that are triggered by an event in time, such as the Michelangelo which did it s damage on March 6 th, the birth date of the famous artist. o Logic bombs are programs that are triggered by the addition or deletion of data, such as one that deletes a company s data when the status of a certain employee changes from employed to terminated gambling web site hackers modified the programming at a gambling site so that everyone won; the site lost $1.9 million. Air traffic controllers in England hackers in England impersonated air-traffic controllers and gave false instructions to pilots > What kind of impact could that have today with terrorism??? 1999 Melissa virus mailed copies of itself to the first 50 people in a computer s address book on systems using popular Microsoft software. Each new copy sent 50 more copies, and the virus quickly infected approximately a million computers worldwide. Many of the clogged systems shut down the Love Bug or ILOVEYOU spread around the world in a few hours, propagating among computers using Microsoft s Windows and Outlook programs by ing itself to all the people in the infected computer s address book. It also destroyed digital images and music files, modified the computer s operating system and Internet browser and collected passwords. The virus infected major corporations like Ford and Siemens and 80% of US federal agencies, including the State Department, the Pentagon, and NASA along with members of the British Parliament and the US Congress. Many businesses and government agencies had to shut down their severs. The virus hit tens of millions of computers and did $10 billion in damage. The creator of the Love Bug was a 23-year old Filipino computer science student. When he created the virus, the Philippines had no laws against computer hacking, and he was not prosecuted. Slide 4: Hacking Cases 2000 Mafiaboy Within about a week in 2000, almost a dozen major web sites were shut down, some for several hours, by denial-of-service attacks. Victims included Yahoo!, ebay, Amazon, E*Trade, Buy.com, CNN, and others. In this kind of attack, hackers overload the target site with hundreds of thousands of requests for web pages and other information. The requests were generated by programs (worms) planted on numerous other systems (many at universities) to disguise their origin (zombie computers); thus it is also called a distributed denial-of-service attack. The attack was traced to a 15 year old Canadian (script kiddie) who used the name mafiaboy; he pleaded guilty to a long list of charges. The US government estimated the cost of this incident at $1.7 billion. One disturbing aspect of this case is that mafiaboy apparently did not write the destructive programs himself; he found them on the Net, where other 15 year olds can find them too. o DoS where a (zombie) computer repeatedly makes requests of some other computer, tying up that other computer to the point to where it shuts down and doesn t respond to any requests, not even legitimate ones. It could be overloading the target site with hundreds or thousands of requests for Web pages and other information. This is accomplished with a Trojan Horse type of malware Trojan Horses get their name from Greek mythology where the giant, wooden horse hid the Greek soldiers which led to the defeat of the Trojans; Trojans are programs that hide in or appear to be something other than what they really are some sort of malware. They can be a program that is installed on your computer that gives someone else control of your computer, where they can delete all the files on your computer,

4 send spam s, run programs like keylogger programs, launch DoS attacks on other computers, etc., turning your computer into a zombie computer. o DDoS where programs planted on hundreds or thousands of other (zombie) computers (many at universities) to disguise their origin, generated the requests of some other computer at the same time much harder to trace the origin of the attack when it s coming from hundreds or thousands of computers can cripple the computer system that is under attack; e- Bay and Amazon were victims of this 2001 Code Red worm program quickly spread to 300,000 server computers at thousands of businesses worldwide. It exploited a flaw in Microsoft server software discovered a month earlier and caused infected servers to flood the White House web site with huge numbers of messages, clogging the Internet. This worm spread to more than 359,000 hosts in less than 14 hours Hacktivism hackers, like the group called Anonymous, modified or defaced the web pages of the White House, the Bureau of Labor Statistics, and the FBI. They revised the Department of Justice page to read Department of Injustice ; they changed the CIA s site to read Central Stupidity Agency and added links to porn sites. Is political hacking just an open form of political discussion, protected by our 1 st Amendment freedom of speech rights? What if it s a Denial of Service attack that interferes with health and emergency services? 2001 Code Red worm In 2001, this worm quickly spread to 300,000 server computers at thousands of businesses worldwide. It exploited a flaw in Microsoft server software discovered a month earlier and caused infected servers to flood the White House web site with huge numbers of messages, clogging the Internet. This worm spread to more than 359,000 hosts in less than 14 hours. o Worm a self contained program that spreads itself through a computer network by exploiting security holes. They infect idle workstations or terminals on the network. The earliest worms were exploratory programs that demonstrated the concept itself and were generally not destructive, although they often replicated to the point at which a network would collapse. o What is the difference between viruses and worms? Worms tend to exist in memory and are not permanent, whereas viruses tend to reside on disk where they are permanent until eradicated. Worms are also network oriented, with segments of the worm inhabiting different machines and knowing about he existence of other segments in other nodes on the networks. They actively seek out idle machines and retreat when the machine load increases. Sometimes used to create botnets for DDoS attacks. Viruses have none of these capabilities Sapphire worm or Slammer was released on January 25, It is notable for being the fastest-spreading computer worm in history. The number of hosts it infected doubled every 8.5 seconds. It ended up affecting at least 78,000 computers worldwide. It exploited a bug found in both Microsoft s SQL Server and SQL Server Desktop Engine. It overloaded networks and made database servers inaccessible. It resulted in cancelled airline flights, unavailable ATMs, and failures of emergency 911 service Blaster worm exploited a bug on Windows 2000 and Windows XP computers. Blaster infected hundreds of thousands of PCs worldwide. It s purpose seemed to be to launch a denial-ofservice attack against windowsupdate.com to prevent customers from accessing the server to download the patch needed to fix the bug. But, windowsupdate.com was a shortcut to the actual web site, so Microsoft just deleted the shortcut. However, the Blaster worm did have the effect of slowing down some computer systems. It disrupted the signaling of CSX freight trains and Amtrak passenger trains in the Northeast, leading to service delays Sasser worm was launched, which exploited a previously identified security weakness with Windows computers. About 18 million computers worldwide were infected they just shut themselves down shortly after booting. Still the worm made millions of computers unusable and disrupted operations at Delta Airlines, the European Commission, Australian railroads, and the British coast guard.

5 2001 Choke & Hello worms two early worms to strike instant messaging systems were Choke and Hello, which appeared in Worms were less devastating back then because only about 141 million people used instant messaging. Today, more than 800 million people use instant messaging, so the impact can be much greater. In April 2005, the appearance of the Kelvir worm forced the Reuters news agency to remove 60,000 subscribers from its Microsoft-based instant messaging service for 20 hours. Firewalls software or hardware (or combination of both) that help protect against malware; they monitor incoming communications, possibly preventing unauthorized access from external sources. Firewalls may be great at stopping unwanted intrusions, but they often do little or nothing to detect virus-laden s or stop intrusive adware and spyware. You'll want separate antivirus and spyware checkers to stymie these threats. Windows comes with a firewall program, as does MacOS (disabled by default). There are other 3 rd party firewalls, some free, that are very good. Slide 5: Firewalls software or hardware (or combination of both) that help protect against malware; they monitor incoming communications, possibly preventing unauthorized access from external sources. Firewalls may be great at stopping unwanted intrusions, but they often do little or nothing to detect virus-laden s or stop intrusive adware and spyware. You'll want separate antivirus and spyware checkers to stymie these threats. Windows comes with a firewall program, as does MacOS (disabled by default). There are other 3 rd party firewalls, some free, that are very good. Slide 6: First Amendment We saw in Chapter 3 that writing about how to make bombs online is not illegal; what about virus or hacking code? (We didn t talk about that yet ) Slide 7: Virus Code Online Hospital example: which one(s) should be considered guilty, or hold some degree or responsibility? Slide 8: Identity Theft FTC receives hundreds of thousands of complaints of identity theft each year. Ages are the most common victims use Web heavily or are less aware of risks? Department of Justice reports that fraud losses amount to billions of dollars per year in the U.S. with several million victims About 8-10 million people per year are victims of identity theft in the U.S. 3-12% (depending on source) are computer-related. It is estimated (by the FTC) that 1 in 6 Americans will be a victim of identity theft this year alone. Victims spend on average $1200 in out-of-pocket expenses and an average of 175 hours in their efforts to resolve the many problems caused by identity thieves. Slide 9: Methods of Identity Theft In 1998, Congress made it a federal crime to knowingly use another person s identification Phishing an example of social engineering - - phishing quiz online Vishing (voice phishing) modified phishing scams where the provides a fake phone number to call where the victim hears requests for their account number and other identifying information

6 Pharming another technique to lure people to fake Web sites where thieves collect personal data involves planting false Internet addresses in the tables on a DNS, sometimes via software inadvertently downloaded from a dishonest or hacked Web site, so when you type in the address for a bank Web site, for example, a counterfeit site comes up Whaling s to small business owners that look like a subpoena from U.S. District Court when you click on it, it downloads a virus that gathers all passwords on your computer, sends them back to criminals who then logs into your accounts & changes your passwords then they clean out your accounts Resumes online if they contain SSNs and other identifying information, target for identity thieves SSNs a part-time English teacher at a California junior college used the SSNs of some of her students provided on her class lists to open fraudulent credit card accounts; rings of identity thieves with members working on hospital staffs obtained SSNs of hospitalized patients from their wristbands or hospital charts. o who it is ok to give your SSN to: motor vehicle departments; tax departments; welfare departments; any transactions involving taxes (banks, brokerages, employers); most other businesses have no legal right to demand your number. In some states, there are laws preventing schools from requiring SSNs of the children. Doctor s offices will want it mainly to make sure if you don t pay your bill, they have a way to track you down, but they legally don t have a need for it. Dumpster diving the #1 way thieves get our information; a tv reporter did some dumpster diving behind a number of banks and found that they unloaded old files & records without shredding them records with SSNs, addresses, dob, etc. Mailbox theft 20% of identity theft is a result of this practice bank statements, credit card statements, pre-approved credit card offers, etc. Pretexting someone will call you impersonating someone from a legitimate company, like your insurance company, trying to get you to verify your account information Shoulder surfing sometimes use devices like cell phones to record you without your knowledge; also, some have used binoculars, telescopes, and video cameras to spy on customers Slide 10: Methods of Identity Theft Social networking sites names, addresses, even birthdates are easy to find File sharing and peer to peer software the people accessing your music files also have access to other files on your computer Bogus job offers thieves will place fake employment ads and get you to fill out an application, including your SSN Fake sweepstakes or lotteries usually sent my and claim that you ve won the Canadian lottery or some other sweepstakes that you ve never actually entered Hacking can get access to all the info on your computer Lost or stolen items purse, wallet, laptop, PDA, etc. Workers in your home contractors or other workers can find account info that you may have in plain view Changing your address thieves will often forge your signature to have your mail forwarded to another address then they will get your bank statements, etc. Copying info from a transaction stealing your credit card info when processing your transactions Credit reports they may pose as a potential employer or landlord (pretexting) to get a copy or your credit report RFID readers thieves build RFID readers to steal the info off your cards (that use RFID) Slide 11: How the Victim is Affected

7 Slide 12: How to Protect Yourself Don t carry checkbook, SSN card, or all your credit cards with you all the time Shred your credit card offers, etc. Use updated anti-spyware/anti-theft software on your computer Never give out personal info over the phone Monitor your credit reports 4 out of 5 credit reports have errors on them. If you have a PayPal account, you can free credit alerts sign in to your PayPal account, then using their search box, search for Equifax choose the first item returned, and then that brings up the registration page for Equifax Credit Alerts - - no longer available for free now it s $14.95 per month with Equifax ID Patrol Be careful of using your credit cards in restaurants Might be a good idea to write ask for id on the back of your card although won t help if the store clerk doesn t even check the back of the card One college instructor signed Elmer Fudd and the clerk never noticed Another experiment where a white man used a credit card that had a picture of a black man on it clerk never noticed Biometrics: including fingerprints, voice prints, face structure, hand geometry, eye patterns, and DNA will biometrics make us more secure or will it make it easier to build dossiers on people? What happens when a hacker gets a copy of a file with our digitized thumbprint or retina scan? Something to think about: Have you used a biometric system somewhere? Or do you know of somewhere in your town or city where biometrics is used? Describe the application and its benefits and risks. See if you can find out if there have been problems with the technology. Slide 13: If You Think You ve Been a Victim of Identity Theft: 1. police report 2. fraud alert a flag that credit agencies put on your credit report, that prevents anyone from taking out any credit in your name, so no car loans, no credit cards, etc. The creditor will notify you to verify that you want this transaction to take place. Lenders do still have access to your credit report. Problem with fraud alerts creditors are supposed to contact you to verify, but they are not required by law to, so sometimes they do not. 3. credit freeze a lock that will prevent new lenders from being able to access your credit report at all. As of November of 2007, the three main credit reporting bureaus make it available in all 50 states. When you want to apply for credit, you need to request the credit agency to lift the freeze, then the lender can access the report, and then you request to have the freeze reinstated. There is usually a fee to initiate a freeze and one to unfreeze unless you have been a victim of identity theft. Slide 14: What Are Your Rights? Truth in Lending Federal law passed in 1968 that protects consumers in credit transactions by requiring clear disclosure of key terms of the lending agreement and all costs. One of the things this law gives you is the 3 day right of rescission that you have to change your mind about certain credit transactions that use your home as collateral, such as on a home equity loan or if you refinance your home with a different lender (but not a mortgage for an original purchase) Fair Credit Reporting Act originally passed in 1970; enforced by the FTC regulates the collection, dissemination, and use of consumer information. It says that you must be told what s in your credit file and have any errors corrected. If you are refused credit, you can get your report for

8 free and the credit bureau must help you interpret the data if you need interpretation. If you notify the bureau of any error, they have 30 days to resolve the dispute. Fair Credit Billing Act An amendment to the Truth In Lending Act, passed in 1986, to protect consumers from unfair billing practices and to provide a mechanism for dealing with billing errors; applies to open end credit accounts, such as credit cards and other revolving charge accounts. Creditors are required to promptly credit your payments and correct billing mistakes and you can withhold payments on defective goods. You can sue them if they violate any of these requirements. Examples of errors: Slide 15: The Credit Card Act of 2009 The latest update of the Truth In Lending Act signed into law by Obama over the summer to protect consumers from abusive tactics used by credit card companies 1. Banks must notify 45 days in advance when changing interest rates or late fees (only on new balances) (took effect Aug. 20 th ) 2. No more retroactive interest rate hikes on existing balances 3. No more raising interest rates based on customer s late payments on other, unrelated cards or utility bills 4. Payment due dates must be at least 21 days after mailing of bill (took effect Aug. 20 th ) 5. Extra payment above minimum due must be applied to higher rate balances first 6. Must opt-in to over-the-limit fees if you don t agree to it, then transactions that would take you over your limit will just be rejected o plus other fee restrictions: banks cannot charge a fee for paying by phone or online (unless it s to expedite a payment); if you pay in person at the local branch, it has to be credited the same day; payments received by the due date (or the next day if it s on a day that they don t receive mail) won t trigger a late fee -> but Clark Howard conducted an experiment into this issue in using a credit card, Clark sent nine monthly payments via next day delivery, and every one of them arrived within a day as expected. But of those nine payments, only two of them were posted on time. The other seven were posted a day or more after the due date even though Clark knew they arrived on time. You are protected virtually 100 percent if you pay electronically. It s cheaper, quicker and more secure. 7. Must disclose to consumers how long it will take to pay off; also must disclose what the payments would be for paying off within 12, 24, or 36 months o If you owe $5000 at 18% interest, and all you pay is the minimum amount due each month it will take you over 30 years to pay it off!!! 8. Restricts card issuance to students under 21 if you cannot prove an independent means of income or provide the signature of a co-signer, they will not give you a credit card o According to a Sallie Mae study college students carried an average balance of $3173 on their credit cards last year 9. Gift card protections they cannot expire for at least 5 years; cannot assess inactivity fees unless the card has gone unused for 12 months

9 Slide 16: Establishing Good Credit first of all, know that credit card companies target college students you have to be smart with your credit cards Checking account having a checking or savings account can help show that you have money and know how to manage it Department store cards can help establish good payment history Prepaid cards another good place to start Co-signer on applications helps establish good payment history - the Web site where you can get a free copy of all 3 credit reports: TransUnion, Experian, Equifax - - less than 15% of people pull their credit reports; they receive and process millions of records daily, which include bill-paying history; information from public records such as lawsuits, bankruptcies, or liens; supposed to be used as info for evaluating applicants for credit; some employers also use them as part of a background check on job applicants o point out FAQs o an amendment in 2003 now enables you to get a free copy of your credit reports one from each reporting agency per year o insurance companies are going to start looking at credit reports - Fair Isaac Score average credit score (as of 1/29/07) is 723 (ranges from ) your FICO score affects your ability to get a loan, and what rate you get. To raise your score, get your debt paid off; keep at least one credit card active (use it sparingly and pay it off each month); don t have more than 1 or 2 credit cards if you do close out credit cards, keep the older ones (if they have good rates) because the longer you have an account open and in good standing, the better your score o Fair Isaac is changing the way they figure your score used to be that a late payment would demolish your FICO score now an occasional late pay will not harm your score, but a pattern of late payments will destroy it. They may even start using your payment history with things like utility bills, rent, and bounced checks, which currently do not affect your FICO score. o closing an old credit card drops your score by about 12 points Slide 17: Crime Fighting vs Privacy & Civil Liberties 4 th Amendment requires that search warrants be specific about what is to be searched or seized Assignment 5.32 page 302: Find the final decision or current status of the case described in the box BASEBALL, LABORATORY FILES, AND THE FOURTH AMENDMENT (Section 5.5.1) so what happens when authorities are searching a computer for one thing and finds other illegal activities, or illegal activities by other people who use that same computer? or when a computer technician is servicing someone s computer and finds what he believes is illegal material on the person s computer see if you can find out whatever happened in the Washington State vs Westbrook case, where this happened and the technician reported it to authorities Slide 18: Whose Laws Rule the Web? ILOVEYOU virus infected millions of computers worldwide, destroying files, collecting passwords, and shutting down computer systems at major corporations and government agencies o this was the one written by a student from the Phillippines charges were dropped because they had no laws against releasing a virus at the time what should happen to him if he were to travel to the U.S., Canada, France, Germany, or any other country where the virus did damage? Other cases in the book pages (we ll talk about in a different module)

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you. At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

Corona Police Department

Corona Police Department By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

IDENTITY THEFT RESOURCE KIT

IDENTITY THEFT RESOURCE KIT IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What

More information

When Fraud Comes Knocking

When Fraud Comes Knocking When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.

More information

I dentity theft occurs

I dentity theft occurs 1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

Why Credit is Important

Why Credit is Important Page 1 Why Credit is Important Page 6 How to Protect Yourself from Identity Theft Page 7 Cosigning and Money Lending Tips Page 8 How to Avoid Credit Card Interest Why Credit is Important Learning to build

More information

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage. Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

More information

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain. Identity Theft Identity Theft Occurs when someone uses your personal information without your permission for personal gain. Someone uses your personal information to open a department store credit account

More information

CHAPTER 10: COMPUTER SECURITY AND RISKS

CHAPTER 10: COMPUTER SECURITY AND RISKS CHAPTER 10: COMPUTER SECURITY AND RISKS Multiple Choice: 1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer:

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain. Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

Protecting Yourself Against Fraud and Identity Theft

Protecting Yourself Against Fraud and Identity Theft Summit Branches are conveniently located in Rochester (8), Seneca Falls (1), Buffalo (2), Syracuse (5) and Cortland (2) Protecting Yourself Against Fraud and Identity Theft A presentation by The Summit

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Standard 9: The student will identify and explain consumer fraud and identity theft.

Standard 9: The student will identify and explain consumer fraud and identity theft. TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial

More information

Emerging Trends in Malware - Antivirus and Beyond

Emerging Trends in Malware - Antivirus and Beyond Malware White Paper April 2011 Emerging Trends in Malware - Antivirus and Beyond One need only listen to the news or read the latest Twitter and media updates to hear about cyber crime and be reminded

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

Beware! Identity Theft

Beware! Identity Theft STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal

More information

What You Need to Know About Identity Theft. Identity Theft Prevention Tips

What You Need to Know About Identity Theft. Identity Theft Prevention Tips What You Need to Know About Identity Theft Identity theft is the fastest growing crime in America. Criminals who gain access to simply a few pieces of valid personal information can impersonate another

More information

Citi Identity Theft Solutions

Citi Identity Theft Solutions Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account

More information

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

identity theft: How To Safeguard Your Privacy and Keep Your Good Name identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

WHAT S IT ALL ABOUT?

WHAT S IT ALL ABOUT? WHAT S IT ALL ABOUT? Introduction The 1990 s spawned a new variety of crooks called identity thieves. Their stock in trade? Your everyday transactions, which usually reveal bits of your personal information:

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY

More information

Protect Yourself From Identity Theft

Protect Yourself From Identity Theft Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

What is it? How does it occur? How potentially devastating it can be? How do we detect fraud? How can we minimize the risk of being victimized?

What is it? How does it occur? How potentially devastating it can be? How do we detect fraud? How can we minimize the risk of being victimized? IDENTITY THEFT & PREVENTION Bucknell University Department of Public Safety Identity Theft Learning Objectives What is it? How pervasive is it? How does it occur? How potentially devastating it can be?

More information

Protect Yourself Against Identity Theft

Protect Yourself Against Identity Theft Protect Yourself Against Identity Theft Watch out for Phishing Attacks! A Message from District Attorney P. David Soares Dear Friends, In the age of the Internet, the information highway runs right into

More information

Driving License. National Insurance Number

Driving License. National Insurance Number STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

COB 302 Management Information System (Lesson 8)

COB 302 Management Information System (Lesson 8) COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500 INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information

More information

Identity Theft. Prevention and Recovery Information Kit

Identity Theft. Prevention and Recovery Information Kit Identity Theft Prevention and Recovery Information Kit A step-by-step guide designed to help you protect your identity and recover if you ve been victimized. 800-522-4100 valleynationalbank.com 2012 Valley

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

Identity Theft and Strategies for Crime Prevention

Identity Theft and Strategies for Crime Prevention Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What

More information

Client Education. Learn About Identity Theft

Client Education. Learn About Identity Theft Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that

More information

Identity Theft Still a Major Problem

Identity Theft Still a Major Problem July/August 2005 Volume 9 Issue 4 Identity Theft Still a Major Problem Inside This Issue Identity Theft Still a Major Problem page 1 Identity Theft How Thieves Get Your Information page 2 Identity Theft

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

How Spyware and Anti-Spyware Work

How Spyware and Anti-Spyware Work 22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade

More information

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION

More information

Topic 1 Lesson 1: Importance of network security

Topic 1 Lesson 1: Importance of network security Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you

More information

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How

More information

Protecting Yourself from Identity Theft. Charlene L. Esaw Chief, Outreach and Student Programs Central Intelligence Agency (CIA) May 2009

Protecting Yourself from Identity Theft. Charlene L. Esaw Chief, Outreach and Student Programs Central Intelligence Agency (CIA) May 2009 Protecting Yourself from Identity Theft Charlene L. Esaw Chief, Outreach and Student Programs Central Intelligence Agency (CIA) May 2009 How Many of You...? use an ATM machine use your credit card online

More information

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft. Client Resources SAFEGUARDING YOUR IDENTITY Your personal and financial information is precious. Protect it by being savvy about identity theft. EVERYONE IS AT RISK FOR IDENTITY THEFT. It s an unfortunate

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal

More information

Preventing identity theft

Preventing identity theft Preventing identity theft About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

DVD Companion Learning Guide

DVD Companion Learning Guide DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material

More information

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09 IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit Identity Theft: It Could Happen To You! Attorney General Tom Reilly s Guide to Protecting Yourself and Your Credit One Ashburton Place ~ Boston, MA 02108 ~ (617) 727-2200 www.ago.state.ma.us February 2005

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

What is Identity Theft?

What is Identity Theft? What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

More information

Identity Theft Problem and Solutions

Identity Theft Problem and Solutions Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or

More information

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Identity Theft Awareness: Don t Fall Victim to these Common Scams Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

Employee ID Theft Resource Guide

Employee ID Theft Resource Guide Employee ID Theft Resource Guide ID Theft Resolution Legal Resources ID Theft Assistance Updates www.legalresources.net ID Theft What is Identity Theft? Identity Theft is a serious crime in which someone

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Threat Events: Software Attacks (cont.)

Threat Events: Software Attacks (cont.) ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

Identity Theft Simple ways to keep your sensitive information safe.

Identity Theft Simple ways to keep your sensitive information safe. Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly

More information

Improve Your Credit Put Bad Credit Behind You

Improve Your Credit Put Bad Credit Behind You Improve Your Credit Put Bad Credit Behind You Improve your credit While it s possible to get by without credit, access to credit is essential for buying a home, financing a car or getting a credit card.

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

Identity Theft. The Most Pervasive Financial Crime Today. Presented by; Wells Fargo Corporate Security. Wells Fargo All Rights Reserved 1

Identity Theft. The Most Pervasive Financial Crime Today. Presented by; Wells Fargo Corporate Security. Wells Fargo All Rights Reserved 1 Identity Theft The Most Pervasive Financial Crime Today Presented by; Wells Fargo Corporate Security Wells Fargo All Rights Reserved 1 It s so very simple to be anyone you please, on any given morning

More information

Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Viruses and Related Threats

Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Viruses and Related Threats Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen FTC Facts For Consumers Federal Trade Commission For The Consumer August 2005 Identity Crisis... What to Do If Your Identity is Stolen Maybe you never opened that account, but someone else did...someone

More information

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic

More information