0% found this document useful (0 votes)
43 views13 pages

Chapter 3. Lesson 4 Identity Theft

Identity theft involves criminals obtaining personal or financial information to impersonate someone else. There are several types of identity theft like financial, tax, medical, and criminal identity theft. Criminals can steal information through data breaches, unsecure browsing, malware, credit card or phone theft, phishing, or card skimming. To prevent identity theft, people should protect their information, monitor accounts for suspicious activity, and take steps to respond to potential identity theft.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views13 pages

Chapter 3. Lesson 4 Identity Theft

Identity theft involves criminals obtaining personal or financial information to impersonate someone else. There are several types of identity theft like financial, tax, medical, and criminal identity theft. Criminals can steal information through data breaches, unsecure browsing, malware, credit card or phone theft, phishing, or card skimming. To prevent identity theft, people should protect their information, monitor accounts for suspicious activity, and take steps to respond to potential identity theft.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

IDENTITY

THEFT
WHAT IS IDENTITY THEFT?
Is the crime of obtaining
the personal or financial
information of another
person for the sole
purpose of assuming that
person's name or identity
to make transactions or
purchases.
EXAMPLES OF IDENTITY THEFT
 Financial identity theft- common example of financial
identity fraud is someone stealing your credit card information
to make purchases without your knowledge.
 Tax-related identity theft- In this type of exploit, the criminal
files a false tax return with the Internal Revenue Service (IRS)
using a stolen Social Security number.
 Medical identity theft.- In this type of identity theft, the thief
steals information, including health insurance member
numbers, to receive medical services. The victim's health
insurance provider may get the fraudulent bills, which will be
reflected in the victim's account as services he received.
 Criminal identity theft. In this example, a person under
arrest gives stolen identity information to the police.
Criminals sometimes back this up with a fake ID or
state-issued documents containing stolen credentials. If
this type of exploit is successful, the victim is charged
instead of the thief.

 Child identity theft. In this exploit, a child's Social


Security number is misused to apply for government
benefits, opening bank accounts and other services.
Children's information is often sought after by criminals
because the damage may go unnoticed for a long time.
 Senior identity theft. This type of exploit targets people over
the age of 60. Because senior citizens are often identity theft
targets, it is especially important for this segment of the
population to stay on top of the evolving methods thieves use to
steal information.

 Identity cloning for concealment. In this type of exploit, a


thief impersonates someone else in order to hide from law
enforcement or creditors. Because this type isn't explicitly
financially motivated, it's harder to track, and there often isn't a
paper trail for law enforcement to follow.
HOW IDENTITY THEFT HAPPENS?

 Data Breaches happens when someone gains access to


an organization's data without authorization.

 Unsecure Browsing. For the most part, you can browse


the internet safely, especially if you stick to well-known
websites.

 Malware Activity. Malware is malicious software that's


designed to wreak all sorts of havoc.
 Credit Card Theft. One of the simplest forms of
identity theft is credit card theft.

 Phishing and Spam Attacks. Some scammers use email


and text messages and other forms of electronic
communication to steal your sensitive information.
 Mobile Phone Theft. Smartphones are a treasure trove
of information for identity thieves, especially if your
apps allow you to log in automatically without a
password or fingerprint.

 Card Skimming. Some thieves use a skimming


device that easily can be placed over a card reader on an
ATM or a fuel pump without looking out of the
ordinary.
HOW TO PREVENT IDENTITY
THEFT?

 Protectingyourself from identity theft and


financial exploitation is an ongoing
process. Vigilance is the best strategy for
ensuring your identity’s safety. Employ a
“3-D” approach in protecting your
identity.
 DETER Avoid identity theft by protecting your personal
information.

 DETECT Be aware of suspicious activities by routinely


monitoring your financial accounts and billing
statements.

 DEFEND If you identify potential identity theft, take


steps to stop further damage.
REFERENCES
 Merriam Webster https://
www.merriam-webster.com/dictionary/cyber
 Collins Dictionary, British English, American English https://
www.collinsdictionary.com/dictionary/english/security
 International Telecommunications Union https://
www.itu.int/en/ITUD/Cybersecurity/Documents/Introduction
%20to%20the%20Concept%20of%20IT%20Security.pdf

 Kaspersky https://
www.kaspersky.com/resource-center/definitions/what-is-cybe
r-security
 Cisco Umbrella https
://umbrella.cisco.com/blog/2019/12/04/cisco-umbrella-top-1
0-cybersecurity-tips/?utm_medium=web-referral&utm_source

You might also like