SlideShare une entreprise Scribd logo
1  sur  15
[object Object],[object Object],Identity Fraud By: Sanea&Keerthana 
What exactly is Identity Fraud? Identity fraud is referred to a big crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud. Identity is unique to you and cannot be given to someone else for their use, your personal data ­ especially your Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data ­ can be used, if they fall into the wrong hands, to personally profit at your expense. In many cases, a victim's losses may include not only out-of-pocket financial losses, but substantial additional.
All of your personal information such as your credit card number, where you live, your phone number, Medicare number, license number date of birth etc….are stored in a database. A fraud can steal from your purse or wallet but the most common way is through a computer or database where they can get a hold of your personal information by either using Trojans, phishing , hacking in or using the zero day attack.  These thieves are able to log onto a public computer you were on and hack their way into finding what you were doing. They are even able to research from government registers, search engines Google) or public records. They are able to obtains information from organizations which store quite a large amount of personal information. - By browsing on social networks such as MySpace, face book, bebo etc…they are able to get hold of any of your personal information and therefore be misused. How are databases involved in Identity Theft
How are databases involved in Identity Theft
The type of data stored about individuals in relation to Identity Theft
Types of ways this data can be misused in relation    to identity theft All your personal information (as mentioned before) if obtained is able to misused in many ways. This includes -By obtaining your credit card details this being your pin number , card number, deposit slip etc….)and using these “identity” token the thieves are able to access your savings, funds from an ATM or retail casher. They are also able to make debits such as withdrawals, purchases or checks.  - An account takeover is possible as well, where the stealer takes control over the account by rerouting the credit card statements to a new address. -They are able create new accounts using another persons identity - If they get hold of a persons insurance information , they are able to use the person’s identity information’s to obtain medical services, such as going to a doctor or goods like medicines). So therefore the thief is putting medical entries into the victims existing medical records.
Types of ways this data can be misused in relation  to identity theft apply for a loan.
Ethical responsibilities of those maintaining this database? The ethical implications are what should be stored on the databases in the first place. Also there should be a consideration of the intrinsic ethical duty placed on database security professionals to secure a database system. Who is to blame?  Consider a situation where a database protected private data, but there was no attempt to ensure its security except the statement that no one is to misuse it. A person who compromises the database in a misuse fashion has committed an ethical infraction.
Your personal information is stored in this database and this database is part of an organization whether being a bank, a social network, phone company, gas company, insurance company, the government, ATO(Australian Taxation Office) etc….  Legally banks as per the privacy act requirements have to maintain physical security, such as locks and security systems, over paper and electronic data stores and premises. They also maintain computer and network security: and other security measures such as identification codes and passwords to control access to computer systems. As for social networks information cannot be accessed until the owner has accessed it. Phone, gas and insurance or any other company in Australia are not allowed to share the information of a user with other companies without consent. Companies in Australia have to comply with the Privacy Act 1988.   Legal responsibilities of those maintaining this  database
“ We will destroy personal information if it is no longer needed: > for the purposes for which we collected it; or >for the purposes of meeting legal requirements. We will properly dispose off all paper files, letters, correspondence and any other hardcopy documents contain personal information that is no longer needed.     All information stored in electronic form that is no longer required will be deleted from our systems.” Legal responsibilities of those maintaining this  database
77%Australians believe That they give out more Personal information On the internet than they do in reality. 63% Australians reveal their name online. A third admit to revealing their home address. 29% people have given bank details or credit card numbers to non banking websites. 41 percent of 16-24 year old have written personal details online, exposing themselves to identity fraud, but are not worried of identity theft from information they have posted online. 46%of Australians believe they are at some risk of identity fraud online Survey Conducted
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Facts
 
Extra Information For more information on identity fraud visit  http://www.stopidtheft.com.au/   to learn more about it. You can also visit the Australian Government, Australian Institute of Criminology website  http://www.aic.gov.au/research/fraud/idfraud.html  , which has a list of useful links, reports, conference papers and presentations!
Video!

Contenu connexe

Tendances

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Data theft
Data theftData theft
Data theftLaura
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber securitynahinworld
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scamsncpd
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 
Identity crisis
Identity crisisIdentity crisis
Identity crisisnnguyen10
 
Identity crisis
Identity crisisIdentity crisis
Identity crisisnnguyen10
 

Tendances (20)

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Data theft
Data theftData theft
Data theft
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scams
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 
Identity crisis
Identity crisisIdentity crisis
Identity crisis
 

En vedette

Ppt of mini project.
Ppt of mini project.Ppt of mini project.
Ppt of mini project.saikiran_gone
 
Minor Project Presentation 1
Minor Project Presentation 1Minor Project Presentation 1
Minor Project Presentation 1Pratishtha Ram
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project PresentationSyed Absar
 
Presentation on project report
Presentation on project reportPresentation on project report
Presentation on project reportramesh_x
 
A minor project report
A minor project reportA minor project report
A minor project reportxenal
 
First Review(Ppt)
First Review(Ppt)First Review(Ppt)
First Review(Ppt)smjagadish
 
Final Project Presentation for Computer Networking
Final Project Presentation for Computer NetworkingFinal Project Presentation for Computer Networking
Final Project Presentation for Computer NetworkingMaia Bittner
 
Sample PowerPoint for Project Review
Sample PowerPoint for Project ReviewSample PowerPoint for Project Review
Sample PowerPoint for Project ReviewMissKarchin
 
Anna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-formatAnna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-formatVeera Victory
 
Intensive Care Professionals and their role in Organ Donation
Intensive Care Professionals and  their role in Organ DonationIntensive Care Professionals and  their role in Organ Donation
Intensive Care Professionals and their role in Organ DonationStiftelsen Organdonasjon
 
Solve five problems related to computer
Solve five problems related to computerSolve five problems related to computer
Solve five problems related to computerumesh patil
 
Variables Creation using SAS on Longitudinal Data for Fraud Models
Variables Creation using SAS on Longitudinal Data for Fraud ModelsVariables Creation using SAS on Longitudinal Data for Fraud Models
Variables Creation using SAS on Longitudinal Data for Fraud ModelsKaitlyn Hu
 

En vedette (20)

Mini project ppt
Mini project pptMini project ppt
Mini project ppt
 
Ppt of mini project.
Ppt of mini project.Ppt of mini project.
Ppt of mini project.
 
Minor Project Presentation 1
Minor Project Presentation 1Minor Project Presentation 1
Minor Project Presentation 1
 
Mini project complete
Mini project completeMini project complete
Mini project complete
 
minor project
minor projectminor project
minor project
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 
Presentation on project report
Presentation on project reportPresentation on project report
Presentation on project report
 
A minor project report
A minor project reportA minor project report
A minor project report
 
First Review(Ppt)
First Review(Ppt)First Review(Ppt)
First Review(Ppt)
 
Networking Projects
Networking ProjectsNetworking Projects
Networking Projects
 
Final Project Presentation for Computer Networking
Final Project Presentation for Computer NetworkingFinal Project Presentation for Computer Networking
Final Project Presentation for Computer Networking
 
Complete-Mini-Project-Report
Complete-Mini-Project-ReportComplete-Mini-Project-Report
Complete-Mini-Project-Report
 
Sample PowerPoint for Project Review
Sample PowerPoint for Project ReviewSample PowerPoint for Project Review
Sample PowerPoint for Project Review
 
Anna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-formatAnna university-ug-pg-ppt-presentation-format
Anna university-ug-pg-ppt-presentation-format
 
Project report
Project reportProject report
Project report
 
Intensive Care Professionals and their role in Organ Donation
Intensive Care Professionals and  their role in Organ DonationIntensive Care Professionals and  their role in Organ Donation
Intensive Care Professionals and their role in Organ Donation
 
Solve five problems related to computer
Solve five problems related to computerSolve five problems related to computer
Solve five problems related to computer
 
LaTeX for beginners
LaTeX for beginnersLaTeX for beginners
LaTeX for beginners
 
Variables Creation using SAS on Longitudinal Data for Fraud Models
Variables Creation using SAS on Longitudinal Data for Fraud ModelsVariables Creation using SAS on Longitudinal Data for Fraud Models
Variables Creation using SAS on Longitudinal Data for Fraud Models
 
mini project
mini projectmini project
mini project
 

Similaire à Powerpoint Mini Project.Pdf

Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminarmullarkea
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 

Similaire à Powerpoint Mini Project.Pdf (17)

Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Identity theft seminar
Identity theft seminarIdentity theft seminar
Identity theft seminar
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Powerpoint Mini Project.Pdf

  • 1.
  • 2. What exactly is Identity Fraud? Identity fraud is referred to a big crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud. Identity is unique to you and cannot be given to someone else for their use, your personal data ­ especially your Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data ­ can be used, if they fall into the wrong hands, to personally profit at your expense. In many cases, a victim's losses may include not only out-of-pocket financial losses, but substantial additional.
  • 3. All of your personal information such as your credit card number, where you live, your phone number, Medicare number, license number date of birth etc….are stored in a database. A fraud can steal from your purse or wallet but the most common way is through a computer or database where they can get a hold of your personal information by either using Trojans, phishing , hacking in or using the zero day attack. These thieves are able to log onto a public computer you were on and hack their way into finding what you were doing. They are even able to research from government registers, search engines Google) or public records. They are able to obtains information from organizations which store quite a large amount of personal information. - By browsing on social networks such as MySpace, face book, bebo etc…they are able to get hold of any of your personal information and therefore be misused. How are databases involved in Identity Theft
  • 4. How are databases involved in Identity Theft
  • 5. The type of data stored about individuals in relation to Identity Theft
  • 6. Types of ways this data can be misused in relation to identity theft All your personal information (as mentioned before) if obtained is able to misused in many ways. This includes -By obtaining your credit card details this being your pin number , card number, deposit slip etc….)and using these “identity” token the thieves are able to access your savings, funds from an ATM or retail casher. They are also able to make debits such as withdrawals, purchases or checks. - An account takeover is possible as well, where the stealer takes control over the account by rerouting the credit card statements to a new address. -They are able create new accounts using another persons identity - If they get hold of a persons insurance information , they are able to use the person’s identity information’s to obtain medical services, such as going to a doctor or goods like medicines). So therefore the thief is putting medical entries into the victims existing medical records.
  • 7. Types of ways this data can be misused in relation to identity theft apply for a loan.
  • 8. Ethical responsibilities of those maintaining this database? The ethical implications are what should be stored on the databases in the first place. Also there should be a consideration of the intrinsic ethical duty placed on database security professionals to secure a database system. Who is to blame? Consider a situation where a database protected private data, but there was no attempt to ensure its security except the statement that no one is to misuse it. A person who compromises the database in a misuse fashion has committed an ethical infraction.
  • 9. Your personal information is stored in this database and this database is part of an organization whether being a bank, a social network, phone company, gas company, insurance company, the government, ATO(Australian Taxation Office) etc…. Legally banks as per the privacy act requirements have to maintain physical security, such as locks and security systems, over paper and electronic data stores and premises. They also maintain computer and network security: and other security measures such as identification codes and passwords to control access to computer systems. As for social networks information cannot be accessed until the owner has accessed it. Phone, gas and insurance or any other company in Australia are not allowed to share the information of a user with other companies without consent. Companies in Australia have to comply with the Privacy Act 1988.   Legal responsibilities of those maintaining this database
  • 10. “ We will destroy personal information if it is no longer needed: > for the purposes for which we collected it; or >for the purposes of meeting legal requirements. We will properly dispose off all paper files, letters, correspondence and any other hardcopy documents contain personal information that is no longer needed.   All information stored in electronic form that is no longer required will be deleted from our systems.” Legal responsibilities of those maintaining this database
  • 11. 77%Australians believe That they give out more Personal information On the internet than they do in reality. 63% Australians reveal their name online. A third admit to revealing their home address. 29% people have given bank details or credit card numbers to non banking websites. 41 percent of 16-24 year old have written personal details online, exposing themselves to identity fraud, but are not worried of identity theft from information they have posted online. 46%of Australians believe they are at some risk of identity fraud online Survey Conducted
  • 12.
  • 13.  
  • 14. Extra Information For more information on identity fraud visit http://www.stopidtheft.com.au/ to learn more about it. You can also visit the Australian Government, Australian Institute of Criminology website http://www.aic.gov.au/research/fraud/idfraud.html , which has a list of useful links, reports, conference papers and presentations!