SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
1 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Social Engineering and
SimplifyingSecurity.
IdentityTheft
Module 10
11:16:54 ,05/16/2011AMPDT
2
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
Oakland PoliceShut Down BayArea‐Wide Identity TheftOperation
OAKLAND ‐‐ Calling it the biggestthey have seen,Oaklandpolice said Monday that an identity theft operation that
manufacturedphony checks,IDs and credit cardshas been shutdown.
Officials said there arepotentially thousandsof victims all over the BayArea and in other statesand the possibilityof an
untold amount of monetary loss.
Police ChiefAnthony Batts said breaking up the operation is particularly important to law enforcementbecauseidentity theft
"puts fearin everyone," includinghimself.
Theoperation, which Officer Holly Joshicalled a "one‐stop shop" for identity theft,was run out of a Haywardapartment in
the 21000 block of Foothill Boulevard,where residentMishel Caviness‐Williams, 40,was arrested last week as she left the
apartment.She had $4,000in cash on her,police said.
http://www.mercurynews.com
May 23,2011
Suffolk police areseekingassistancelocating a woman who allegedlytook an elderly man’sdebit card and used it on several
occasions. Police have five felony warrantson file forLavonda“Goosie”Moore, 37,for credit cardtheft,credit cardfraud,
criminally receivingmoney,third offense petit larcenyand identity theft.
Police say Moore took a debit cardfrom the victim on Hill Street on May 15 and used it on multiple occasions at anATM andat
retail stores.Therealso is a warranton file for Moore for third offense petit larceny in an unrelatedcase.
Moore’s last known address is the 600 block of BrookAvenue.Anyone who has information on Moore’s location is askedto call
CrimeLineat 1‐888‐LOCK‐U‐UP.Callers to Crime Lineneverhave to give their names or appear in court,and may be eligible for a
rewardof up to$.1,000
http://www.suffolknewsherald.com
3
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
WomanSoughtin
Theft
IDENTITY
THEFT
STATISTICS 2011
%75
11.1
Million
54$billion
%13
%4.8
TheTotalFraudAmount
Adults Victimsof
IdentityTheft
FraudAttackson Existing
Credit cardAccounts
Percent of Population
Victimized by Identity
Fraud
Victim WhoKnew
Crimes WereCommitted
http://www.spendonlife.com
4
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
ConsumerComplaint
SCENARIO
SocialSecurityNumber
number of years.A person got arrestedand producedmy SSN on his arrestsheet.
http://www.networkworld.com
MODULE
IOBJECT VW
Ehat t
So d
6
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
Identity Theft
W ha t to Do if
Identity Is Stole n
Victim of Ident ity Theft
Reporting
Identity Theft
Prot ection from
Identity The ft
U
L
E
F
How to FLind if You Are a
O
W
Soc ia l
Engine ering
7
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
Criminal
charges
Legal
issues
It leads to denial
employment, heal
carefacilities,mo
bank accountsand
cards,etc.
of
th
rtgage,
credit
Financial
losses
Identity
TheftEffects
crime offender wrongfullyobtains
the intended victim's personalidentifyinginformation,such as date of birth, Social Security
WHAT IS
IDENTITY
THEFT?
8
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
Personal Information that Can be
Stolen
Names
Address
Mother’s
maidenname
Telephone
numbers
Passportnumbers
Birthcertificates
Creditcard/Bank
account numbers
Drivinglicense
numbers
Socialsecurity
numbers
Date ofbirth
9
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
STEAL IDENTITY?
Hacking Theft of PersonalStuff
So
HOW DO
eAerinTg TACKERPShishin
Fraudsterpretend to be a
financial institutionand
send spam/pop‐up
messages to trick theuser
to reveal personal
information
Fraudsters may steal
wallets and purses, mails
including bank and credit
card statements, pre‐
approved credit offers,and
new checks or tax
information
Attackers may hackthe
computer systems to
steal confidential
personalinformation
It is an act ofmanipulating
people trust toperform
certain actions or divulging
private information, without
using technicalcracking
methods
10
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
11 Copyright © by EC-Council
erved. Reproduction is StrictlyProhibited.AllRights Res
Whatdo Attackers do with Stolen
Identity?
Cre dit Card
Fraud
Phone or Utilit ies
Fraud
Ot her Fraud
They may open a new
phone or wirelessaccount
in the user’sname, or run
up charges on his/her
existing account
They may use user’sname
to get utility services such
as electricity,heating, or
cable TV
They may get a jobusing
legitimate user ’sSocial
Security number
They may give legitimate
user ’sinformation topolice
during an arrest and ifthey
do not turn up for their
court date, a warrant for
arrest is issued on
legitimate user’sname
They may open new
credit card accounts in
the name of the userand
do not pay thebills
12 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Whatdo Attackers do with Stolen
Identity?
Bank/Finance
Fraud
Government
DocumentsFraud
They may createcounterfeit checks
using victim’sname or accountnumber
They may open a bank account in
victim’sname and issue the checks
They may clone an ATM ordebit card
and make electronic withdrawals on
victim’sname
They may takea loan on victims’name
They may get a driving license or
official ID card issued onlegitimate
user’sname but with their photo
They may use victim’snameand
Social Security number to get
government benefits
They may file a fraudulent taxreturn
using legitimate userinformation
13 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Same Name: TRENTCHARLESARSENAUL
Original IdentityTheft
IDENTITY
THEFT
EXAMPLE
Identity Theft
W ha t to Do if
Identity Is Stole n
Victim of Ident ity Theft
Soc ia l
Engine ering
Reporting
Identity Theft
Prot ection from
Identity The ft
U
L
E
F
How to FLind if You Are a
O
W
14
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
Soc ia l
Engineering
Type s of Social
Engine ering
Social Engine ers
At tempt to Gather
SOCIAL
ENGINEERING
Sensitive information
such as credit card
details, socialsecurity
number,etc.
Passwords
Otherpersonal
information
Human basedsocial
engineering
Computer based
socialengineering
Social engineering isthe
art of convincingpeople
to revealconfidential
information
It is the trick used to gain
sensitive information by
exploiting the basic
human nature
15
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
SOCIAL
ENGINEERING
EXAMPLE
Hi, we are fromCONSESCO
Software. We are hiring new
people for our softwaredevelopment
team. We got your contactnumber
from popular job portals.
Please provide details of your jobprofile,
current project information,
social security number,and your
residentialaddress.
16
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
CRIMINAL AS
PHONE BANKER
Hi, I am Mike callingfrom CITI Bank
Due to increasing threatperception,we
areupdating our systems with new
security features.Can you provide me
your personaldetailsto verifythatyou
arerealStella.
ThanksMike, Herearemydetails. Doyou
need anythingelse?
17
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
AUTHORITY
SUPPORT
EXAMPLE
Hi, I am JohnBrown. I'm with the
external auditorsArthur Sanderson. We've
been told by corporate to do asurprise
inspection of your disaster recovery
procedures.
Yourdepartment has 10minutes to show
me how you would recover froma
website crash.
18
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
TECHNICAL
SUPPORT
EXAMPLE
A man calls a company’s help desk and s
he has forgotten his password. He add
that if he misses the deadline on a big
advertising project, his boss might firehim.
Thehelp desk worker feels sorry forhim
and quickly resets the password,
unwittingly giving the attacker clear
entrance into thecorporate
network
19
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
Human-Based Social Engineering
Eavesdropping Shouldersurfing Dumpster diving
 Eavesdropping is
unauthorized listening of
conversations or reading
of messages
 It is interception of any
form of communication
such as audio, video, or
written
 Shoulder surfing is the
procedure where the
attackerslook over the
user ’sshoulder to gain
critical information such as
passwords, personal
identification number,
account numbers, credit
card information, etc.
 Attackermay also watch the
user from a distance using
binoculars in order to get
the pieces of information
20
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
 Dumpster divingincludes
searching for sensitive
information at the target
company’strash bins,
printer trash bins, user
desk for sticky notes,etc.
 It involves collection of
phone bills, contact
information, financial
information, operations
related information,etc.
Spam
Email
Instant
Chat
Messenger
Chain
Letters
Hoax
Letters
Pop‐up
Windows
Windows that suddenly popup
while surfing the Internet and
ask for users’information to
login or sign‐in
Hoax lettersare emails thatissue
warnings to the user on new
viruses, Trojans,or worms that
may harm the user’ssystem
Chain letters are emails that offer
freegifts such as money and
software on the condition that the
user has to forwardthe mail to the
said number ofpersons
Gathering personal information
by chatting with a selectedonline
user to get information such as
birth dates and maidennames
Irrelevant, unwanted,and
unsolicited email to collectthe
financial information, social
security numbers, andnetwork
information
Computer-Based Social Engineering
22
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
2
COMPUTER-BASED
SOCIAL
An illegitimateemail cElaimNing tGo beINromEa leEiti RateIsiNeattGemp: iretheuser’s
personal or accountinformation
Phishing emails orpop‐upsredirectuPserHs to fIakSewHebpIagNesofGmimicking trustworthysites that ask
themtosubmit theirpersonalinformation
FakeBankWebpage
2
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
23 Copyright © by EC-Coun
All Rights Reserved. Reproduction is Strictly Prohibit
PHONY
SECURITY
ALERTS
Phony SecurityAlerts are the emails or
pop‐up windows that seem to befrom
a reputed hardware or software
manufacturers like Microsoft, Dell,etc.,
It warns/alerts the user that the
system is infected and thus will
provide with an attachmentor a link in
order to patch thesystem
Scammers suggest the user to
download and installthose patches
The trap is that the file contains
maliciousprograms thatmay infect the
user system
cil
ed.
24 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Computer-Based Social Engineering through
Social NetworkingWebsites
social networking websites
exploitusers’personalinformation
25 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Identity Theft
W ha t to Do if
Identity Is Stole n
Victim of Ident ity Theft
Reporting
Identity Theft
Prot ection from
Identity The ft
U
L
E
F
How to FLind if You Are a
O
W
Soc ia l
Engine ering
26 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How toFind if Youare aVictim
ofIdentity Theft?
Billcollectionagenciescontactyou for overduedebtsyou neverincurred
Youreceivebills,invoices, or receiptsaddressedto you for goods or services
you haven’t askedfor
Youno longer receiveyour credit card or bankstatements
Younotice that some of your mailseems to be missing
Yourrequestfor mortgage or anyother loanis rejectedcitingyour badcredit
history despiteyou havinga good creditrecord
27 Copyright © by EC-Council
erved. Reproduction is StrictlyProhibited.AllRights Res
How toFind if Youare aVictim
ofIdentity Theft?
Yougetsomething in
the mail about an
apartment you never
rented,a house you
neverbought, or ajob
you neverheld
Youlose important
documentssuchas
your passport or
drivinglicense
Youidentify
irregularitiesin
your creditcard
and bank
statements
Youaredeniedfor
social benefits
citing that youare
alreadyclaiming
Youreceive
creditcard
statementwith
newaccount
Identity Theft
W ha t to Do if
Identity Is Stole n
Victim of Ident ity Theft
Reporting
Identity Theft
Prot ection from
Identity The ft
U
L
E
F
How to FLind if You Are a
O
W
Soc ia l
Engine ering
28
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
WHAT TO DO IF
IDENTITY IS
STOLEN?
Contactthecreditreportingagencies
 http://www.experian.com
 http://wwwc.equifax.com
http://www.transunion.com
Request fora creditreport
Immediately inform credit bureaus
and establish fraudalerts
Review the credit reports and alert
the creditagencies
29
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
Freezethe credit reports with credit
reporting agencies
Contactall of your creditorsand
notify them of the fraudulentactivity
Change all the passwords ofonline
accounts
Close the accounts that you know or
believe have been tampered with or
opened fraudulently
30 Copyright © by EC-Council
erved. Reproduction is StrictlyProhibited.AllRights Res
D
WHAT TO DO IF
I ENTITY I
SSTOLEN?
Fileareport with the
local police or thepolice
in the communitywhere
the identity theft took
place
Filea complaintwith
identity theft and
cybercrimereporting
agencies such as the
FTC
Takeadvice frompolice
and reportingagencies
about how to protect
yourself from further
identitycompromise
Ask the creditcard
company aboutnew
accountnumbers
Tellthe debtcollectors
that you are avictimof
fraud and are not
responsible forthe
unpaidbill
Ask the bank to report the
fraudto a consumer
reporting agency such as
ChexSystemsthatcompiles
reports on checking
accounts
Identity Theft
W ha t to Do if
Identity Is Stole n
Victim of Ident ity Theft
Reporting
Identity Theft
Prot ection from
Identity The ft
U
L
E
F
How to FLind if You Are a
O
W
Soc ia l
Engine ering
31
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
FEDERALTRADE
COMMISSIONon, the nation's consumer pro ectionagency
,business practices,and identitytheft
http://www.ftc.gov
32
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
econsumer.gov
33
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
http://www.econsumer.gov
econsumer.gov is a portal foryou
as a consumer to report complaints about online
and related transactions with foreigncompanies
INTERNET CRIME
CO
CE
MPLAINT
NTER
http://www.ic3.gov
The Internet CrimeComplaint Center
’s(IC3) mission is to serve asa
vehicle to receive,develop, andrefer
criminal complaints regarding the
rapidly expanding arena of cyber
crime
The Internet Crime ComplaintCenter
(IC3) is a partnership between the
Federal Bureau of Investigation (FBI),
the National White Collar Crime
Center (NW3C), and the Bureau of
JusticeAssistance (BJA)
34
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
PROSECUTING
DI TYENTI
THEFBegin the process by
contacting thebureaus,
banks, or any other
organizations who may
be involved
File a formalcomplaint
with the organization
and with the police
department
Regularly update
yourselfregarding
the investigation
process to ensure
that the case is
being dealt with
properly
Obtain a copy of theTpolice complaintto
prove to the
organizations that
you have filed an
identity theft
complaint
File a complaintwith
the FederalTrade
Commission and
complete affidavits
to prove your
innocence on the
claims of identity
theft and fraudulent
activity
Contact the District
Attorney's officefor
further prosecuting
the individuals who
may be involved in
the identity theft
35
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
Identity Theft
W ha t to Do if
Identity Is Stole n
Victim of Ident ity Theft
Reporting
Identity Theft
I P H iding Tools
U
L
E
F
How to FLind if You Are a
O
W
Soc ia l
Engine ering
36
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
HIDING IP ADDRESS
USING QUICK HIDE IP
TOOL
http://www.quick‐hide‐ip.com
hides yourinternetidentity you can surfth hiding you realIP location
It redirects the Internet traffic through anonymousproxies
37
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
http://www.ultrareach.com
IP ADDRESS
38
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
HIDINGTOOHLideSIP
http://www.iphider.org
http://www.torproject.org
http://www.giantmatrix.com
http://www.anonymizer.com
MODULE
SUMMARY
39
C O P YR I G H T© BY EC-COUNCIL
A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
 Identity theft is the process of using someone else’s personal information for the
personal gain of theoffender
 Criminals look through trash for bills or other paper with personal information on it
 Criminals callthe victim impersonating a government official or other legitimate
business people and request personal information
sona Do not reply to unsolicitedemail that asks for
 Use strong passwords for allfinancialaccounts
 Review bank/credit card statements/credit reports regularly
40 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Nevergive awaysocial security information or private contactinforma tion
Ensurethat your nameis not presentin the marketers’hit lists
Shred papers with personal information instead of throwing themaway
Confirm who you are dealing with, i.e.,a legitimate representative or a
legitimate organization over thephone
Carry only necessary creditcards
Cancelcardsseldom used
Review credit reports regularly
IDENTITYTHEFT
PROTECTION
on the phone – unless YOUinitiated theCphHonEecCallKLIST
Keep your Social Securitycard,passport, license, and other valuable
personal information hidden and locked up
41 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Do not carry your Social Securitycardin yourwallet
Do not reply to unsolicited email requests forpersonalinformation
Do not give personal information over thephone
Review bank/credit cardstatements regularly
Shred credit cardoffersand “conveniencechecks”that arenot useful
Do not storeany financial information on the system and use strong
passwords forall financialaccounts
Check the telephone and cell phone bills forcalls you did notmake
Read beforeyou click, stop pre‐approved credit offers,and readwebsite
privacypolicies
IDENTITYTHEFT
PROTECTION
CHECKLIST
42 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Computer Based Identity Theft Protection
Checklist
Keepthecomputeroperatingsystemand otherapplicationsup to date
Install antivirussoftwareandscanthesystemregularly
Enable firewallprotection
Checkforwebsite policies before you enter
Becarefulwhileopeningemailattachments
Clearthebrowserhistory,logs, and recentlyopenedfileseverytime
Checkforsecuredwebsiteswhiletransmittingsensitiveinformation

Contenu connexe

Tendances

Identity as easy as LMNOP
Identity as easy as LMNOPIdentity as easy as LMNOP
Identity as easy as LMNOPEric Sachs
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidanceDavid Atkinson
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshopforensicsnation
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking FraudVictoria Cao
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
SOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORKSOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORKFinance Magnates
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalSiphiwe Msibi
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerceSudeshna07
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014EMC
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - officialAyodele Thomas
 

Tendances (19)

Identity as easy as LMNOP
Identity as easy as LMNOPIdentity as easy as LMNOP
Identity as easy as LMNOP
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshop
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Research Article
Research ArticleResearch Article
Research Article
 
Digital Banking Fraud
Digital Banking FraudDigital Banking Fraud
Digital Banking Fraud
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
SOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORKSOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORK
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
 

Similaire à Cscu module 10 social engineering and identity theft

Understanding identity theft
Understanding identity theftUnderstanding identity theft
Understanding identity theftPage-1-Solutions
 
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftWhat are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftcFirst
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryEight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryTransUnion
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention- Mark - Fullbright
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT- Mark - Fullbright
 

Similaire à Cscu module 10 social engineering and identity theft (20)

Understanding identity theft
Understanding identity theftUnderstanding identity theft
Understanding identity theft
 
What are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theftWhat are the negative and lasting effects of identity theft
What are the negative and lasting effects of identity theft
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryEight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and Trajectory
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
ID Theft
ID TheftID Theft
ID Theft
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 

Plus de Alireza Ghahrood

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Alireza Ghahrood
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceAlireza Ghahrood
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEAlireza Ghahrood
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierAlireza Ghahrood
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...Alireza Ghahrood
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/Alireza Ghahrood
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisionsAlireza Ghahrood
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceAlireza Ghahrood
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycleAlireza Ghahrood
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanismsAlireza Ghahrood
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...Alireza Ghahrood
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsAlireza Ghahrood
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceAlireza Ghahrood
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securityAlireza Ghahrood
 
Cscu module 07 securing network connections
Cscu module 07 securing network connectionsCscu module 07 securing network connections
Cscu module 07 securing network connectionsAlireza Ghahrood
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryAlireza Ghahrood
 

Plus de Alireza Ghahrood (20)

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
 
ANT Catalog
ANT CatalogANT Catalog
ANT Catalog
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycle
 
implement access controls
implement access controlsimplement access controls
implement access controls
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanisms
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Cscu module 07 securing network connections
Cscu module 07 securing network connectionsCscu module 07 securing network connections
Cscu module 07 securing network connections
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 

Dernier

Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Sana Rajpoot
 
Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048Ifra Zohaib
 
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowIndore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowapshanarani255
 
Radhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts serviceRadhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts servicerahul222jai
 
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Sheetaleventcompany
 
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotSivanyaPandeya
 
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls AgencyHire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls AgencyJia Oberoi
 
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.riyadelhic riyadelhic
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...riyasharma00119
 
Book_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptxBook_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptxssuser8fd809
 
Udupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort serviceUdupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort servicemaheshsingh64440
 
Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Ifra Zohaib
 
MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154NiteshKumar82226
 
SURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL GSURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL GNiteshKumar82226
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Sana Rajpoot
 
Bhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort serviceBhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort servicemaheshsingh64440
 
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579diyaspanoida
 
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579diyaspanoida
 
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book nowLucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book nowapshanarani255
 

Dernier (20)

Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
 
Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048
 
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowIndore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
 
Radhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts serviceRadhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts service
 
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
 
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls AgencyHire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
 
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
 
Book_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptxBook_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptx
 
Udupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort serviceUdupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort service
 
Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞
 
MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154
 
SURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL GSURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL G
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
 
Bhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort serviceBhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort service
 
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
 
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
 
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book nowLucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
 

Cscu module 10 social engineering and identity theft

  • 1. 1 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Social Engineering and SimplifyingSecurity. IdentityTheft Module 10
  • 2. 11:16:54 ,05/16/2011AMPDT 2 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . Oakland PoliceShut Down BayArea‐Wide Identity TheftOperation OAKLAND ‐‐ Calling it the biggestthey have seen,Oaklandpolice said Monday that an identity theft operation that manufacturedphony checks,IDs and credit cardshas been shutdown. Officials said there arepotentially thousandsof victims all over the BayArea and in other statesand the possibilityof an untold amount of monetary loss. Police ChiefAnthony Batts said breaking up the operation is particularly important to law enforcementbecauseidentity theft "puts fearin everyone," includinghimself. Theoperation, which Officer Holly Joshicalled a "one‐stop shop" for identity theft,was run out of a Haywardapartment in the 21000 block of Foothill Boulevard,where residentMishel Caviness‐Williams, 40,was arrested last week as she left the apartment.She had $4,000in cash on her,police said. http://www.mercurynews.com
  • 3. May 23,2011 Suffolk police areseekingassistancelocating a woman who allegedlytook an elderly man’sdebit card and used it on several occasions. Police have five felony warrantson file forLavonda“Goosie”Moore, 37,for credit cardtheft,credit cardfraud, criminally receivingmoney,third offense petit larcenyand identity theft. Police say Moore took a debit cardfrom the victim on Hill Street on May 15 and used it on multiple occasions at anATM andat retail stores.Therealso is a warranton file for Moore for third offense petit larceny in an unrelatedcase. Moore’s last known address is the 600 block of BrookAvenue.Anyone who has information on Moore’s location is askedto call CrimeLineat 1‐888‐LOCK‐U‐UP.Callers to Crime Lineneverhave to give their names or appear in court,and may be eligible for a rewardof up to$.1,000 http://www.suffolknewsherald.com 3 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . WomanSoughtin Theft
  • 4. IDENTITY THEFT STATISTICS 2011 %75 11.1 Million 54$billion %13 %4.8 TheTotalFraudAmount Adults Victimsof IdentityTheft FraudAttackson Existing Credit cardAccounts Percent of Population Victimized by Identity Fraud Victim WhoKnew Crimes WereCommitted http://www.spendonlife.com 4 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 5. ConsumerComplaint SCENARIO SocialSecurityNumber number of years.A person got arrestedand producedmy SSN on his arrestsheet. http://www.networkworld.com
  • 6. MODULE IOBJECT VW Ehat t So d 6 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 7. Identity Theft W ha t to Do if Identity Is Stole n Victim of Ident ity Theft Reporting Identity Theft Prot ection from Identity The ft U L E F How to FLind if You Are a O W Soc ia l Engine ering 7 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 8. Criminal charges Legal issues It leads to denial employment, heal carefacilities,mo bank accountsand cards,etc. of th rtgage, credit Financial losses Identity TheftEffects crime offender wrongfullyobtains the intended victim's personalidentifyinginformation,such as date of birth, Social Security WHAT IS IDENTITY THEFT? 8 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 9. Personal Information that Can be Stolen Names Address Mother’s maidenname Telephone numbers Passportnumbers Birthcertificates Creditcard/Bank account numbers Drivinglicense numbers Socialsecurity numbers Date ofbirth 9 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 10. STEAL IDENTITY? Hacking Theft of PersonalStuff So HOW DO eAerinTg TACKERPShishin Fraudsterpretend to be a financial institutionand send spam/pop‐up messages to trick theuser to reveal personal information Fraudsters may steal wallets and purses, mails including bank and credit card statements, pre‐ approved credit offers,and new checks or tax information Attackers may hackthe computer systems to steal confidential personalinformation It is an act ofmanipulating people trust toperform certain actions or divulging private information, without using technicalcracking methods 10 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 11. 11 Copyright © by EC-Council erved. Reproduction is StrictlyProhibited.AllRights Res Whatdo Attackers do with Stolen Identity? Cre dit Card Fraud Phone or Utilit ies Fraud Ot her Fraud They may open a new phone or wirelessaccount in the user’sname, or run up charges on his/her existing account They may use user’sname to get utility services such as electricity,heating, or cable TV They may get a jobusing legitimate user ’sSocial Security number They may give legitimate user ’sinformation topolice during an arrest and ifthey do not turn up for their court date, a warrant for arrest is issued on legitimate user’sname They may open new credit card accounts in the name of the userand do not pay thebills
  • 12. 12 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Whatdo Attackers do with Stolen Identity? Bank/Finance Fraud Government DocumentsFraud They may createcounterfeit checks using victim’sname or accountnumber They may open a bank account in victim’sname and issue the checks They may clone an ATM ordebit card and make electronic withdrawals on victim’sname They may takea loan on victims’name They may get a driving license or official ID card issued onlegitimate user’sname but with their photo They may use victim’snameand Social Security number to get government benefits They may file a fraudulent taxreturn using legitimate userinformation
  • 13. 13 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Same Name: TRENTCHARLESARSENAUL Original IdentityTheft IDENTITY THEFT EXAMPLE
  • 14. Identity Theft W ha t to Do if Identity Is Stole n Victim of Ident ity Theft Soc ia l Engine ering Reporting Identity Theft Prot ection from Identity The ft U L E F How to FLind if You Are a O W 14 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 15. Soc ia l Engineering Type s of Social Engine ering Social Engine ers At tempt to Gather SOCIAL ENGINEERING Sensitive information such as credit card details, socialsecurity number,etc. Passwords Otherpersonal information Human basedsocial engineering Computer based socialengineering Social engineering isthe art of convincingpeople to revealconfidential information It is the trick used to gain sensitive information by exploiting the basic human nature 15 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 16. SOCIAL ENGINEERING EXAMPLE Hi, we are fromCONSESCO Software. We are hiring new people for our softwaredevelopment team. We got your contactnumber from popular job portals. Please provide details of your jobprofile, current project information, social security number,and your residentialaddress. 16 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 17. CRIMINAL AS PHONE BANKER Hi, I am Mike callingfrom CITI Bank Due to increasing threatperception,we areupdating our systems with new security features.Can you provide me your personaldetailsto verifythatyou arerealStella. ThanksMike, Herearemydetails. Doyou need anythingelse? 17 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 18. AUTHORITY SUPPORT EXAMPLE Hi, I am JohnBrown. I'm with the external auditorsArthur Sanderson. We've been told by corporate to do asurprise inspection of your disaster recovery procedures. Yourdepartment has 10minutes to show me how you would recover froma website crash. 18 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 19. TECHNICAL SUPPORT EXAMPLE A man calls a company’s help desk and s he has forgotten his password. He add that if he misses the deadline on a big advertising project, his boss might firehim. Thehelp desk worker feels sorry forhim and quickly resets the password, unwittingly giving the attacker clear entrance into thecorporate network 19 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 20. Human-Based Social Engineering Eavesdropping Shouldersurfing Dumpster diving  Eavesdropping is unauthorized listening of conversations or reading of messages  It is interception of any form of communication such as audio, video, or written  Shoulder surfing is the procedure where the attackerslook over the user ’sshoulder to gain critical information such as passwords, personal identification number, account numbers, credit card information, etc.  Attackermay also watch the user from a distance using binoculars in order to get the pieces of information 20 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .  Dumpster divingincludes searching for sensitive information at the target company’strash bins, printer trash bins, user desk for sticky notes,etc.  It involves collection of phone bills, contact information, financial information, operations related information,etc.
  • 21. Spam Email Instant Chat Messenger Chain Letters Hoax Letters Pop‐up Windows Windows that suddenly popup while surfing the Internet and ask for users’information to login or sign‐in Hoax lettersare emails thatissue warnings to the user on new viruses, Trojans,or worms that may harm the user’ssystem Chain letters are emails that offer freegifts such as money and software on the condition that the user has to forwardthe mail to the said number ofpersons Gathering personal information by chatting with a selectedonline user to get information such as birth dates and maidennames Irrelevant, unwanted,and unsolicited email to collectthe financial information, social security numbers, andnetwork information Computer-Based Social Engineering 22 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 22. 2 COMPUTER-BASED SOCIAL An illegitimateemail cElaimNing tGo beINromEa leEiti RateIsiNeattGemp: iretheuser’s personal or accountinformation Phishing emails orpop‐upsredirectuPserHs to fIakSewHebpIagNesofGmimicking trustworthysites that ask themtosubmit theirpersonalinformation FakeBankWebpage 2 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 23. 23 Copyright © by EC-Coun All Rights Reserved. Reproduction is Strictly Prohibit PHONY SECURITY ALERTS Phony SecurityAlerts are the emails or pop‐up windows that seem to befrom a reputed hardware or software manufacturers like Microsoft, Dell,etc., It warns/alerts the user that the system is infected and thus will provide with an attachmentor a link in order to patch thesystem Scammers suggest the user to download and installthose patches The trap is that the file contains maliciousprograms thatmay infect the user system cil ed.
  • 24. 24 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Computer-Based Social Engineering through Social NetworkingWebsites social networking websites exploitusers’personalinformation
  • 25. 25 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Identity Theft W ha t to Do if Identity Is Stole n Victim of Ident ity Theft Reporting Identity Theft Prot ection from Identity The ft U L E F How to FLind if You Are a O W Soc ia l Engine ering
  • 26. 26 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. How toFind if Youare aVictim ofIdentity Theft? Billcollectionagenciescontactyou for overduedebtsyou neverincurred Youreceivebills,invoices, or receiptsaddressedto you for goods or services you haven’t askedfor Youno longer receiveyour credit card or bankstatements Younotice that some of your mailseems to be missing Yourrequestfor mortgage or anyother loanis rejectedcitingyour badcredit history despiteyou havinga good creditrecord
  • 27. 27 Copyright © by EC-Council erved. Reproduction is StrictlyProhibited.AllRights Res How toFind if Youare aVictim ofIdentity Theft? Yougetsomething in the mail about an apartment you never rented,a house you neverbought, or ajob you neverheld Youlose important documentssuchas your passport or drivinglicense Youidentify irregularitiesin your creditcard and bank statements Youaredeniedfor social benefits citing that youare alreadyclaiming Youreceive creditcard statementwith newaccount
  • 28. Identity Theft W ha t to Do if Identity Is Stole n Victim of Ident ity Theft Reporting Identity Theft Prot ection from Identity The ft U L E F How to FLind if You Are a O W Soc ia l Engine ering 28 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 29. WHAT TO DO IF IDENTITY IS STOLEN? Contactthecreditreportingagencies  http://www.experian.com  http://wwwc.equifax.com http://www.transunion.com Request fora creditreport Immediately inform credit bureaus and establish fraudalerts Review the credit reports and alert the creditagencies 29 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . Freezethe credit reports with credit reporting agencies Contactall of your creditorsand notify them of the fraudulentactivity Change all the passwords ofonline accounts Close the accounts that you know or believe have been tampered with or opened fraudulently
  • 30. 30 Copyright © by EC-Council erved. Reproduction is StrictlyProhibited.AllRights Res D WHAT TO DO IF I ENTITY I SSTOLEN? Fileareport with the local police or thepolice in the communitywhere the identity theft took place Filea complaintwith identity theft and cybercrimereporting agencies such as the FTC Takeadvice frompolice and reportingagencies about how to protect yourself from further identitycompromise Ask the creditcard company aboutnew accountnumbers Tellthe debtcollectors that you are avictimof fraud and are not responsible forthe unpaidbill Ask the bank to report the fraudto a consumer reporting agency such as ChexSystemsthatcompiles reports on checking accounts
  • 31. Identity Theft W ha t to Do if Identity Is Stole n Victim of Ident ity Theft Reporting Identity Theft Prot ection from Identity The ft U L E F How to FLind if You Are a O W Soc ia l Engine ering 31 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 32. FEDERALTRADE COMMISSIONon, the nation's consumer pro ectionagency ,business practices,and identitytheft http://www.ftc.gov 32 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 33. econsumer.gov 33 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . http://www.econsumer.gov econsumer.gov is a portal foryou as a consumer to report complaints about online and related transactions with foreigncompanies
  • 34. INTERNET CRIME CO CE MPLAINT NTER http://www.ic3.gov The Internet CrimeComplaint Center ’s(IC3) mission is to serve asa vehicle to receive,develop, andrefer criminal complaints regarding the rapidly expanding arena of cyber crime The Internet Crime ComplaintCenter (IC3) is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of JusticeAssistance (BJA) 34 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 35. PROSECUTING DI TYENTI THEFBegin the process by contacting thebureaus, banks, or any other organizations who may be involved File a formalcomplaint with the organization and with the police department Regularly update yourselfregarding the investigation process to ensure that the case is being dealt with properly Obtain a copy of theTpolice complaintto prove to the organizations that you have filed an identity theft complaint File a complaintwith the FederalTrade Commission and complete affidavits to prove your innocence on the claims of identity theft and fraudulent activity Contact the District Attorney's officefor further prosecuting the individuals who may be involved in the identity theft 35 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 36. Identity Theft W ha t to Do if Identity Is Stole n Victim of Ident ity Theft Reporting Identity Theft I P H iding Tools U L E F How to FLind if You Are a O W Soc ia l Engine ering 36 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 37. HIDING IP ADDRESS USING QUICK HIDE IP TOOL http://www.quick‐hide‐ip.com hides yourinternetidentity you can surfth hiding you realIP location It redirects the Internet traffic through anonymousproxies 37 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .
  • 38. http://www.ultrareach.com IP ADDRESS 38 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D . HIDINGTOOHLideSIP http://www.iphider.org http://www.torproject.org http://www.giantmatrix.com http://www.anonymizer.com
  • 39. MODULE SUMMARY 39 C O P YR I G H T© BY EC-COUNCIL A LLR I G H TS RESERVED. R E P R O D U CTION IS STRICTLYP R O H I B I TE D .  Identity theft is the process of using someone else’s personal information for the personal gain of theoffender  Criminals look through trash for bills or other paper with personal information on it  Criminals callthe victim impersonating a government official or other legitimate business people and request personal information sona Do not reply to unsolicitedemail that asks for  Use strong passwords for allfinancialaccounts  Review bank/credit card statements/credit reports regularly
  • 40. 40 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Nevergive awaysocial security information or private contactinforma tion Ensurethat your nameis not presentin the marketers’hit lists Shred papers with personal information instead of throwing themaway Confirm who you are dealing with, i.e.,a legitimate representative or a legitimate organization over thephone Carry only necessary creditcards Cancelcardsseldom used Review credit reports regularly IDENTITYTHEFT PROTECTION on the phone – unless YOUinitiated theCphHonEecCallKLIST Keep your Social Securitycard,passport, license, and other valuable personal information hidden and locked up
  • 41. 41 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Do not carry your Social Securitycardin yourwallet Do not reply to unsolicited email requests forpersonalinformation Do not give personal information over thephone Review bank/credit cardstatements regularly Shred credit cardoffersand “conveniencechecks”that arenot useful Do not storeany financial information on the system and use strong passwords forall financialaccounts Check the telephone and cell phone bills forcalls you did notmake Read beforeyou click, stop pre‐approved credit offers,and readwebsite privacypolicies IDENTITYTHEFT PROTECTION CHECKLIST
  • 42. 42 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Computer Based Identity Theft Protection Checklist Keepthecomputeroperatingsystemand otherapplicationsup to date Install antivirussoftwareandscanthesystemregularly Enable firewallprotection Checkforwebsite policies before you enter Becarefulwhileopeningemailattachments Clearthebrowserhistory,logs, and recentlyopenedfileseverytime Checkforsecuredwebsiteswhiletransmittingsensitiveinformation