The following Video from the Federal Trade Commission outlines a few tips:
What Now?
Tools Used
Identity Theft
What do they Do with this Info?
- Open Credit Cards
- Get Bank Loans
- Make large Purchases
- Rack up Existing Debt
So Who is Vulnerable to Identity Theft?
EVERYONE!!!
- Dumpster Diving, were they go into your garbage to get at personal information, you should always shred papers containing this
- Stealing your Wallet
- Email Spoofing: Links sent to your email from your 'bank' or online shopping site asking to update your visa information. In reality the information is going directly to the hacker.
It is the unlawful collection and use of your personal information. Essentially they steal your identity and pretend to be you to get to your assets.
If you've had your identity taken there steps that can be taken
- Contact Your Bank
- Close your Credit Cards
What Can We Do?
Cyber Bullying
Show support to those being Bullied
Let them know their not alone
As the video stated, if we speak up and stand up, we can make a difference
Cyber Bullying is a big problem in today's society
- Bully's utilize the anonymity of the web to hurt their victims
Cyber Bullying: The Next Pandemic?
Source:https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcShI_79svfR8cDyzSCDVzS2uY8R6Rc7w5DR7uWuy3CITtJpcab0ww
Source: https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcQCL4j1gS2KlAZN_yI2aG4gwXVzba1MitsOsR2LQ06PiONvsv3L
The Following video discusses Cyber Bullying:
As students we utilize the web for various purposes, the following presentation will open your eyes to the world of cyber crimes, specifically Identity theft and cyber bullying and provide you with some tips to combat it
References
Whats Being Done
Tips to Avoid Cyber Crime
- Use Anti-Virus
- Change your password and utilize words along with numbers to make it harder to crack
- Get Insurance
- Think before you Click!
- Banks wont ask for a persons information online, so call your bank to confirm.
*All Images are CC Licensed
*Content taken from Week 4 Modules
As well as the following Websites:
- http://www.huffingtonpost.ca/2012/11/09/cybercrime-canada-host cyberattacks_n_2103319.html
- http://www.huffingtonpost.ca/2012/05/09/cybercrime-in-canada-said_n_1502505.html
- http://www.huffingtonpost.com/kim-garst/cyberbullying-your-kids-n_b_3093412.html
- http://www.statcan.gc.ca/pub/85-558-x/85-558-x2002001-eng.pdf
- http://thenextweb.com/ca/2011/05/09/cyber-criminal-activity-in-canada-skyrocketing/
- http://www.international.gc.ca/crime/cyber_crime-criminalite.aspx
- Cyber crimes have become more and more common, the Pentagon even plans to deploy more than 100 cyber crime teams by 2015 according the the following article from Mashable: http://mashable.com/2013/03/20/pentagon-cyber-teams-2015/
- Many countries have taken bothe domestic and international partnerships in order to combat cyber crimes
- According to the Public Safety Department, there is a fear that Canada may be becoming a base for dubious Cyber activities
- Websense has noted a 39-per-cent increase in Canadian-hosted command-and-control centers for cyber-criminals
- Along with a 239-per-cent jump in potentially infectious and otherwise dangerous Canadian websites.
Source: http://www.getsafeonline.org/themes/site_themes/getsafeonline/images/pyc.jpg
Prevent Cyber Crimes
"Canada ranks second worldwide for hosted phishing sites — ahead of well known offenders like Egypt and Russia — and hosts 170 per cent more phishing sites than during the same time period last year." (Huffington Post, 2012)
Cyber Crime
According to Statistic Canada “Cyber-crime is generally defined as a criminal offence involving a computer as the object of the crime, or the tool used to commit a material component of the offence.”
Cyber Crimes
There are many types of Cyber Crimes, but we shall focus on the following two:
- Identity Theft
- Cyber Bullying
The Internet is a very useful and convenient tool. It provides the ease to make purchases and sign up for things from the convenience of your home.This convenience can also be turned against your to get at your personal information.
Source: http://farm3.staticflickr.com/2401/5727500395_20978b90d8_o.jpg
Cyber Crimes:
Identity Theft and Cyber Bullying
Muna Ali