W A2 Group P P

18
Computer Crime: Computer Crime: Identity Theft, Misuse of Identity Theft, Misuse of Personal Information, and Personal Information, and How to Protect Yourself How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson, Saray Vilayhane)

Transcript of W A2 Group P P

Page 1: W A2  Group  P P

Computer Crime:Computer Crime:Identity Theft, Misuse of Identity Theft, Misuse of Personal Information, and Personal Information, and How to Protect YourselfHow to Protect Yourself

(Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson, Saray

Vilayhane)

Page 2: W A2  Group  P P

IntroductionIntroductionTechnology as constant source of

convenience Modern society is becoming

increasingly reliantErrands online = No privacyPersonal information becomes

compromised and exposed to computer crime

Page 3: W A2  Group  P P

1. Malware

2. Phishing/Pharming

3. Bank Fraud

1. Identity Theft via Medical Records

Page 4: W A2  Group  P P

1. MALWARE1. MALWARE

Malware defined as programs written with the intent of

being disruptive or damaging to (the user of) a computer or other electronic device; viruses, worms, spyware, etc., collectively.

Malware typesDestructive Annoying viruses

Page 5: W A2  Group  P P

Malware be gone!Removal of unwanted viruses Malwarebytes Remove viruses promptly Restore computer easily

and efficiently

Page 6: W A2  Group  P P

How to detect “Malicious How to detect “Malicious software” and protect computer software” and protect computer

Scan viruses

Protect and secure private information

Page 7: W A2  Group  P P

Technet solutions to protect Technet solutions to protect yourself against Malwareyourself against MalwareKeep your computer’s software patched

and current. Only download updates from reputable

sources. Always think before you install

something, weigh the risks and benefits, and be aware of the fine print.

Install and use a firewall. Prevention is always better than a cure!

Page 8: W A2  Group  P P

2. Phishing and 2. Phishing and PharmingPharmingPhishing and Pharming are ways that

predators gain access to your  personal information, like bank

account info and social security numbers, through your email and

web browser.

Phishing is a method of online identity theft through email.

Pharming is a method of identity theft by way of email and web browser.

  

Page 9: W A2  Group  P P

To protect yourselfTo protect yourself Don’t click on links within emails that ask for

your personal information. Never enter your personal information in a

pop-up screen. Protect your computer with spam filters, anti-

virus and anti-spyware software, and a firewall—remember to keep them up to date.

Only open email attachments if you’re expecting them.

Phishing isn’t just through email, but can also happen by phone so be wary of unknown callers asking for personal information.

If someone contacts you and says you’ve been a victim of fraud, verify the person’s identity before you provide any personal information.

Be careful and aware of pharming—when you go to a site and are redirected to a “copy cat site”. This is another way that your personal info is taken.

Page 10: W A2  Group  P P

3. Bank Fraud3. Bank Fraud Online banking versus Traditional

Banking – Convenience Banks can save on operating costs. Popularization has caused fraudulent

bank activity.

Banks have learned how to better safeguard, but with no guarantee.

Two-step process: 1) get your info, then 2) use it to move money

Page 11: W A2  Group  P P

Popular fraud schemes to obtain Popular fraud schemes to obtain personal informationpersonal information

"Phishing" scheme: stems from the two words "password" and "fishing." It entails sending email scams and mail supposedly from the consumer's bank as a way to obtain the consumer's personal information, social insurance number, and in this case their online banking username and password.

"Trojan Horse" scheme: unfolds when malicious software (malware) embeds to a consumer's computer without the consumer being aware of it.

Page 12: W A2  Group  P P

To To protectprotect yourself yourself Do not release your account or card numbers

when shopping online if there are other payment options available.Examples: Paypal; SunTrust Bank program Verified by Visa; ShopSafe by Bank of America

Monitor your credit. For example, use Privacy Assist Premier by Bank of America.

Never share your passwords or PINs with anyone

Page 13: W A2  Group  P P

To Protect Yourself - To Protect Yourself - continuedcontinuedNever leave your computer unattended while

using any online banking or investing service

Sign off completely when you are finished banking online

Use only secure sites (look for the padlock icon usually located at the bottom of the Web page)

Keep anti-virus software up to date

Page 14: W A2  Group  P P

4. Identity Theft via 4. Identity Theft via Medical Records Medical Records

Medical RecordsJust as vulnerable as credit

card information Medical records hold very

sensitive information◦Social Security ◦Financial Information◦Insurance information

Records aren’t stored traditionally

Page 15: W A2  Group  P P

Technology and Systems

As technology advances so does storing information

Records are now stored in computer systems

Patients are able to access records online

Medical facilities and doctor’s offices use wireless networks

Many don’t realize how vulnerable these systems and networks are

Page 16: W A2  Group  P P

Identity Theft through Medical Records

Hacking and PhishingThieves steal data from systems and

wireless networksReasons for medical identity theft

◦Monetary Gain◦Medical treatment

Danger to both parties

Page 17: W A2  Group  P P

Prevention and DetectionPrevention and DetectionNo 100% guarantee of

protectionRequires constant

monitoring and responsePatients should keep a

copy of medical recordsMany states are working

on ‘patient alert’ legislation

Page 18: W A2  Group  P P

ConclusionConclusionMalware, phishing and pharming are

all serious threats to consumer safetySafeguards put forth are valuable toolsUnderstand the vulnerability of

sensitive information in our connected world

Be vigilant in the protection of their own sensitive data

Consumers need not suffer from identity theft before learning how to protect themselves