Professional Documents
Culture Documents
Information Society
Information Society
_ Smart Devices
_ Webcams
_ Routers
_ Email
_ Jailbroken Phones
PREVENTION FROM GETTING HACKED
_ Software Update
_ Using Unique Passwords for Different Accounts
_ HTTPS Encryption
_ Avoid Clicking on Ads or Strange Links
_ Change Default Username and Password on Your
Router and Smart Devices
PROTECT YOURSELF AGAINST HACKING
_ Download from First-party Sources
_ Install Antivirus Software
_ Use a VPN
_ Do NOT Login as an Admin by Default
_ Use a Password Manager
_ Use Two-factor Authentication
_ Brush Up on Anti-phishing Techniques
INTRODUCTION/DEFINITION
Identity theft continues to be
the fastest growing crime in America
and mostly us college students are
one of the most targeted populations
by thieves.
Identity theft - is when an
unauthorized person uses your
personal confirmation to access your
financial accounts, open new
accounts or commit a crime.
HOW CAN YOUR IDENTITY BE STOLEN?
From the theft of your personal
information while your online, to a
grab of data your unattended
paperwork, to the robbery of your
credit card information and to breach
to personal information from
companies you work with.
But you can take steps to avoid
being a victim. Here are the list of
some of the most common scams and
how you can take steps to stop an
identity theft. This are Phishing,
Pharming, Vishing and Smishing.
PHISHING
is an attempt to steal
personal information through email
by pretending to be a trustworthy
source.
Example. Example an identity
thief send you an email pretending
to be your bank, your banks logo is
on the email and its look legitimate.
The best way to avoid being
caught in this scam is to never
share personal information via
email
PHARMING
is where a hacker installs
malicious code on a personal
computer or server.
To avoid pharming before
you submit any personal
information on a website look
for a padlock symbol on the
website and https in the
website address.
VISHING
attempts to get you to
provide personal information
over the phone.
You might receive a
voicemail asking for your
immediate attention, the
number provide leads to an
automated service asking you
to enter personal information.
Before you ever give
personal information over the
phone make sure you know
this is a trusted source.
SMISHING
uses cell phone text
messages to get you to provide
personal information. Often the
text will contain a URL or phone
number and again just like Vishing
that Smishing message usually ask
for your immediate attention if
something is vitally important, it’s
unlikely to be sent via text message.
Do not respond to Smishing
message.
When we say theft - we mean the old
fashioned type of physically stealing
something that is your from right under your
nose.
- This type of theft includes
stealing your mail or going through you’re
recycling or trash to look for statements or
documents with personal information.
Take for example Skimming,
- skimming occurs when a device
records your credit card information and send
it to the thief to make authorize purchases.
- It can happen at an ATM or a
retail store anytime someone just a moment
alone with your credit card.
Help prevent physical theft by
shredding any document with personal
information when they are no longer needed
and locking away personal documents.
If you’re in a dorm or share housing
with people, consider bringing these
personal documents home where they are
safer. And frequently check your credit and
debit card accounts for fraudulent charges.
Items that have your full social security
number, like your social security card, should
not be carried in your wallet or purse and
instead stored and transported safely.
It may seem like identity theft is
everywhere, but if you protect yourself
online, on your mobile device at your mailbox
and always be on guard for theft, you’ll start
fighting the battle against identity theft.
References:
https://youtu.be/WykG0QbvbbU
PRIVACY INVASION
The law protects people against many
types of harm, including harm to one's
personal space and private life, infringing on
this interest is known invasion of privacy.
A person may license the right to use her name or likeness, but u
authorized usage is considered an illegitimate appropriation.
References:
Kim Tranter, of ULearnSocialMedia.com
THANK YOU