Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Business

No description
by

Jaden Coniglio

on 14 June 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Business

The CSA Presents
Criminal
Crackers
3 Types of Identity Theft!
*Criminal

*Financial

*Medical
Privacy Invasion
Photos Online
*Everything online, stays online

*Certain photos can affect your future

*Anyone has access to the photos
Hackers
Computers and Society
Overview
Hackers
Crackers
Identity Theft
Companies And Your Information
Photos
Identity Theft
*Posing as another for committing crime
Financial
*Using anothers identity for money
Medical
*For medicinal or drug use
Criminal Identity Theft
*Criminal ID's himself as someone else
*Gives police fake information
*Victim has hard time cleaning record
Financial Identity Theft
*Most common form of theft
*Approx. 15 million americans are victims
*America losses approx. $50 billion
*Average loss is $3,500
Medical Identity Theft
* Some seek medical care using other's ID's
*cause extreme harm to victims
*leaves trail of false information in medical records
Unauthorized users who break into computer systems in order to steal, change or destroy information
.
-"White hats"

*Hack for personal use
*access your computer if not protected
*Hijack your user names and passwords
*Steal your money/accounts in your name
*Make purchases
R
E
F
L
E
C
T
E
N
T
H
P
R
O
T
E
C
T
*Have more knowledge
*Hack for their own amusement
*Break in for criminal gain
*Steal credit card information
*Leave viruses
*Destroy files
*Collect personal information to sell
Example:
Companies and your information
*Companies can take your photos without permission

*They can sell your information

*Use you as data to make profit
*Took her photo

*Photo shopped the photo

*Sold it for profit
Conclusion
*Information online is available to anyone

*Identity theft
*Hackers and Crackers
*Privacy Rights
*Photos
*Companies and your information
Full transcript