SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
JoshMoulin.com	
  
	
  
Financial	
  Fraud	
  and	
  ID	
  The0	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   1	
  
Instructor’s	
  Background	
  
n  11	
  years	
  in	
  law	
  enforcement	
  
n  Commander	
  –	
  cyber	
  crime	
  
task	
  force	
  
n  Board	
  of	
  Directors	
  –	
  NaLonal	
  
White	
  Collar	
  Crime	
  Center	
  
(NW3C)	
  
n  Leads	
  cyber	
  security	
  team	
  for	
  
a	
  federal	
  agency	
  that	
  focuses	
  
on	
  naLonal	
  security	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   2	
  
Crimes	
  CommiRed	
  with	
  Technology	
  
IdenLty	
  The0	
  
DomesLc	
  Violence	
  
Homicide/Suicide	
  
Internet	
  Fraud/Forgery	
  
E-­‐mail	
  Threats	
  
Bomb	
  Threats	
  
Stalking	
  &	
  Harassment	
  
Missing	
  Persons	
  
Child	
  ExploitaLon	
  &	
  Abuse	
  
Gambling	
  
ProsLtuLon	
  
ExtorLon	
  
NarcoLcs	
  
So0ware	
  Piracy	
  
Intrusions/Hacking/Trade	
  Secrets	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   3	
  
IdenLty	
  The0	
  
n Online	
  ID	
  The0	
  accounts	
  for	
  only	
  10%	
  
of	
  all	
  ID	
  the0	
  
n The	
  other	
  90%	
  is	
  tradiLonal	
  ID	
  the0.	
  	
  
ID’s	
  are	
  stolen	
  a	
  variety	
  of	
  ways	
  
including:	
  
n Dumpster	
  diving	
  (use	
  a	
  confe`	
  shredder)	
  
n Obtaining	
  old	
  IT	
  equipment	
  (copy	
  machines,	
  
personal	
  computers,	
  cell	
  phones	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   4	
  
IdenLty	
  The0	
  
n Finding	
  personal	
  informaLon	
  on	
  public	
  
websites	
  (government	
  and	
  social	
  networks)	
  
n Stealing	
  informaLon	
  from	
  burglary,	
  vehicle	
  
break-­‐ins,	
  purses,	
  wallets,	
  etc.	
  
n Skimming	
  informaLon	
  using	
  RFID	
  chips	
  or	
  
skimmers	
  
n AdverLsing	
  bogus	
  jobs	
  to	
  obtain	
  job	
  
applicaLons	
  and	
  resumes	
  
n Vishing	
  –	
  (telephone	
  scams)	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   5	
  
Copy	
  Machines	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   6	
  
High-­‐Tech	
  ID	
  The0	
  
n VicLms	
  of	
  high-­‐tech	
  ID	
  the0	
  may	
  have	
  
had	
  their	
  informaLon	
  stolen	
  a	
  variety	
  
of	
  ways	
  including:	
  
n Phishing	
  Scams	
  
n SMS	
  Scams	
  (text	
  messages)	
  
n Obtaining	
  usernames	
  and	
  passwords	
  
n InfiltraLng	
  company	
  or	
  medical	
  data	
  
n InfecLng	
  a	
  personal	
  computer	
  with	
  malware	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   7	
  
OperaLng	
  System	
  Updates	
  and	
  Patches	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   8	
  
IE	
  ConLnued	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   9	
  
Viewing	
  CerLficates	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   10	
  
Mozilla	
  Firefox	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   11	
  
Mozilla	
  Firefox	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   12	
  
Mozilla	
  Firefox	
  ConLnued	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   13	
  
Phishing	
  Examples	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   14	
  
Phishing	
  Examples	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   15	
  
Peer	
  to	
  Peer	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   16	
  
Peer	
  to	
  Peer	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   17	
  
P2P	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   18	
  
Website	
  Scraping	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   19	
  
Why	
  do	
  People	
  Commit	
  ID	
  The0?	
  
n Suspects	
  will	
  steal	
  idenLLes	
  to:	
  
n Open	
  a	
  bank	
  account	
  in	
  the	
  vicLm’s	
  name	
  
n Buy	
  vehicles	
  on	
  credit	
  in	
  the	
  vicLm’s	
  name	
  
n Submit	
  loan	
  and	
  credit	
  applicaLons	
  in	
  the	
  
vicLm’s	
  name	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   20	
  
Tips	
  to	
  Protect	
  Against	
  ID	
  The0	
  
n There	
  are	
  several	
  everyday	
  things	
  
people	
  can	
  do	
  to	
  reduce	
  their	
  chances	
  
of	
  being	
  a	
  vicLm	
  of	
  ID	
  the0	
  including:	
  
n Use	
  a	
  cross-­‐cut	
  shredder	
  for	
  all	
  documents	
  
with	
  personal	
  informaLon	
  on	
  it	
  
n Get	
  mail	
  promptly	
  and	
  pay	
  aRenLon	
  to	
  
missing	
  mail	
  
n Review	
  all	
  bank	
  and	
  credit	
  acLvity	
  regularly	
  
for	
  any	
  suspicious	
  acLvity	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   21	
  
Tips	
  to	
  Protect	
  Against	
  ID	
  The0	
  
n Have	
  your	
  statements	
  sent	
  to	
  you	
  
electronically	
  to	
  reduce	
  personal	
  informaLon	
  
in	
  the	
  mail	
  and	
  trash	
  
n Don’t	
  carry	
  your	
  Social	
  Security	
  Card	
  	
  
n Protect	
  your	
  PIN	
  when	
  entering	
  it	
  into	
  any	
  
device	
  
n Pay	
  aRenLon	
  to	
  where	
  your	
  card	
  goes	
  during	
  
a	
  transacLon	
  
n Treat	
  all	
  financial	
  emails	
  with	
  cauLon	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   22	
  
Tips	
  to	
  Protect	
  Against	
  ID	
  The0	
  
n Do	
  not	
  provide	
  personal	
  informaLon	
  or	
  
account	
  informaLon	
  over	
  the	
  phone	
  to	
  
anyone	
  who	
  called	
  you	
  
n Use	
  strong	
  passwords	
  online	
  
n Have	
  up	
  to	
  date	
  anLvirus	
  on	
  all	
  computers	
  
n Maintain	
  the	
  operaLng	
  system	
  security	
  
patches	
  on	
  all	
  computers	
  
n Before	
  making	
  a	
  purchase	
  online,	
  make	
  sure	
  
you’re	
  doing	
  so	
  from	
  a	
  secure	
  site	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   23	
  
Online	
  Scams	
  
n According	
  to	
  the	
  NW3C	
  online	
  scams	
  
increased	
  by	
  110%	
  from	
  last	
  year	
  
n Cyber	
  fraud	
  accounted	
  for	
  $559	
  M	
  
n Some	
  of	
  the	
  most	
  common	
  online	
  
scams	
  include:	
  
n Fraudulent	
  e-­‐cards	
  
n Free	
  iPad	
  offers	
  
n Rental	
  scams	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   24	
  
Online	
  Scams	
  
n Publically	
  available	
  WiFi	
  
n Fake	
  gi0	
  cards	
  
n Immediate	
  assistance	
  scams	
  
n Work	
  from	
  home	
  scams	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   25	
  
Wireless	
  Internet	
  
n Ensure	
  wireless	
  Internet	
  is	
  secure	
  with	
  
encrypLon,	
  requiring	
  a	
  password	
  to	
  
access	
  
n Consider	
  MAC	
  address	
  filtering	
  as	
  well	
  
n “War	
  Driving”	
  is	
  a	
  common	
  occurance	
  	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   26	
  
War	
  Driving	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   27	
  
Wireless	
  Routers	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   28	
  
For	
  Further	
  InformaLon…	
  
www.JoshMoulin.com	
  
©	
  Josh	
  Moulin	
  -­‐	
  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS	
   29	
  

Contenu connexe

Similaire à Josh Moulin: Internet Scams and Identity Theft Prevention

Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 

Similaire à Josh Moulin: Internet Scams and Identity Theft Prevention (20)

ICT ICA3
ICT ICA3ICT ICA3
ICT ICA3
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Cyber Insurance - Setting the scene - The Scene
Cyber Insurance  - Setting the scene - The SceneCyber Insurance  - Setting the scene - The Scene
Cyber Insurance - Setting the scene - The Scene
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber security best practices
Cyber security best practicesCyber security best practices
Cyber security best practices
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle East
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Josh Moulin: Internet Scams and Identity Theft Prevention

  • 1. JoshMoulin.com     Financial  Fraud  and  ID  The0   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   1  
  • 2. Instructor’s  Background   n  11  years  in  law  enforcement   n  Commander  –  cyber  crime   task  force   n  Board  of  Directors  –  NaLonal   White  Collar  Crime  Center   (NW3C)   n  Leads  cyber  security  team  for   a  federal  agency  that  focuses   on  naLonal  security   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   2  
  • 3. Crimes  CommiRed  with  Technology   IdenLty  The0   DomesLc  Violence   Homicide/Suicide   Internet  Fraud/Forgery   E-­‐mail  Threats   Bomb  Threats   Stalking  &  Harassment   Missing  Persons   Child  ExploitaLon  &  Abuse   Gambling   ProsLtuLon   ExtorLon   NarcoLcs   So0ware  Piracy   Intrusions/Hacking/Trade  Secrets   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   3  
  • 4. IdenLty  The0   n Online  ID  The0  accounts  for  only  10%   of  all  ID  the0   n The  other  90%  is  tradiLonal  ID  the0.     ID’s  are  stolen  a  variety  of  ways   including:   n Dumpster  diving  (use  a  confe`  shredder)   n Obtaining  old  IT  equipment  (copy  machines,   personal  computers,  cell  phones   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   4  
  • 5. IdenLty  The0   n Finding  personal  informaLon  on  public   websites  (government  and  social  networks)   n Stealing  informaLon  from  burglary,  vehicle   break-­‐ins,  purses,  wallets,  etc.   n Skimming  informaLon  using  RFID  chips  or   skimmers   n AdverLsing  bogus  jobs  to  obtain  job   applicaLons  and  resumes   n Vishing  –  (telephone  scams)   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   5  
  • 6. Copy  Machines   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   6  
  • 7. High-­‐Tech  ID  The0   n VicLms  of  high-­‐tech  ID  the0  may  have   had  their  informaLon  stolen  a  variety   of  ways  including:   n Phishing  Scams   n SMS  Scams  (text  messages)   n Obtaining  usernames  and  passwords   n InfiltraLng  company  or  medical  data   n InfecLng  a  personal  computer  with  malware   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   7  
  • 8. OperaLng  System  Updates  and  Patches   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   8  
  • 9. IE  ConLnued   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   9  
  • 10. Viewing  CerLficates   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   10  
  • 11. Mozilla  Firefox   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   11  
  • 12. Mozilla  Firefox   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   12  
  • 13. Mozilla  Firefox  ConLnued   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   13  
  • 14. Phishing  Examples   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   14  
  • 15. Phishing  Examples   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   15  
  • 16. Peer  to  Peer   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   16  
  • 17. Peer  to  Peer   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   17  
  • 18. P2P   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   18  
  • 19. Website  Scraping   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   19  
  • 20. Why  do  People  Commit  ID  The0?   n Suspects  will  steal  idenLLes  to:   n Open  a  bank  account  in  the  vicLm’s  name   n Buy  vehicles  on  credit  in  the  vicLm’s  name   n Submit  loan  and  credit  applicaLons  in  the   vicLm’s  name   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   20  
  • 21. Tips  to  Protect  Against  ID  The0   n There  are  several  everyday  things   people  can  do  to  reduce  their  chances   of  being  a  vicLm  of  ID  the0  including:   n Use  a  cross-­‐cut  shredder  for  all  documents   with  personal  informaLon  on  it   n Get  mail  promptly  and  pay  aRenLon  to   missing  mail   n Review  all  bank  and  credit  acLvity  regularly   for  any  suspicious  acLvity   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   21  
  • 22. Tips  to  Protect  Against  ID  The0   n Have  your  statements  sent  to  you   electronically  to  reduce  personal  informaLon   in  the  mail  and  trash   n Don’t  carry  your  Social  Security  Card     n Protect  your  PIN  when  entering  it  into  any   device   n Pay  aRenLon  to  where  your  card  goes  during   a  transacLon   n Treat  all  financial  emails  with  cauLon   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   22  
  • 23. Tips  to  Protect  Against  ID  The0   n Do  not  provide  personal  informaLon  or   account  informaLon  over  the  phone  to   anyone  who  called  you   n Use  strong  passwords  online   n Have  up  to  date  anLvirus  on  all  computers   n Maintain  the  operaLng  system  security   patches  on  all  computers   n Before  making  a  purchase  online,  make  sure   you’re  doing  so  from  a  secure  site   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   23  
  • 24. Online  Scams   n According  to  the  NW3C  online  scams   increased  by  110%  from  last  year   n Cyber  fraud  accounted  for  $559  M   n Some  of  the  most  common  online   scams  include:   n Fraudulent  e-­‐cards   n Free  iPad  offers   n Rental  scams   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   24  
  • 25. Online  Scams   n Publically  available  WiFi   n Fake  gi0  cards   n Immediate  assistance  scams   n Work  from  home  scams   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   25  
  • 26. Wireless  Internet   n Ensure  wireless  Internet  is  secure  with   encrypLon,  requiring  a  password  to   access   n Consider  MAC  address  filtering  as  well   n “War  Driving”  is  a  common  occurance     ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   26  
  • 27. War  Driving   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   27  
  • 28. Wireless  Routers   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   28  
  • 29. For  Further  InformaLon…   www.JoshMoulin.com   ©  Josh  Moulin  -­‐  GCFA,CFCE,CAWFE,DFCP,ACE,CEECS   29