Top Banner
Who is that? Is his identity safe?
12

IST Presentation

Jan 23, 2015

Download

Education

guest1d1ed5

Mariessa & Rochelle presented a Powerpoint presentation in IST on Identity Fraud.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IST Presentation

Who is that? Is his identity safe?

Page 2: IST Presentation

PPRREESSEENNTTEEDD

BBYY

MMAARRIIEESSSSAA

&&

RROOCCHHEELLLLEE

Page 3: IST Presentation

What is Identity fraudIdentity fraud?

It is the use of a stolen identity in criminal activity, to obtain goods or services by deception.

In the blink of an eye, Identity Fraud causes a great loss to the victim, but a great benefit to the thief.

Without having committed any crime, the victim of identity fraudidentity fraud is charged.

Identity fraud is one of the fastest growing Identity fraud is one of the fastest growing crimes in Australia and costs the Australian crimes in Australia and costs the Australian community billions of dollars every year.community billions of dollars every year.

Page 4: IST Presentation

How are databases involved in Identity Identity FraudFraud?

Most companies store information about their clients in databases for easy retrieval. If a thief can access that database, the clients are at risk of identity fraud.

You don’t have to think hard about where YOUR personal data is stored:

- Student information on the school database.- Family members’ records in an employer or

landlord database.- Banks, utility companies, hospitals and tax offices

store people’s information in databases.

Page 5: IST Presentation

The internet has made it easier for anyone to obtain personal and financial data and trade the information. Want to know where and how your Want to know where and how your name could be found? name could be found? Let’s try:

-A search engine; any social network site you have joinedautomatically adds your name to the online database.

Identity Fraud is a common fear individuals don’t anticipate. This is why Mr. Lennon ensures we do not add any personal information when working online on Blogger.

Other ways of gaining our personal information include:•Dumpsters & trashcans (Disposed mail can be searched)•Spam programs (False promise computer advertisements)•Purchasing from online or offline databases•Bribery in companies•Hacking•Eavesdropping•Stealing wallets or important documents

Page 6: IST Presentation

What type of data may be stored about individuals?

Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, your personal data can be exploited. This includes:Full name & Date of BirthAddressContact details (Telephone/mobile no., e-mail)Bank account detailsCredit Card numberPast recordsPhoto ID

Page 7: IST Presentation

Accessing bank account information allows the thief to:

gain credit cards, loans, state benefits or simply take over the existing account.

make purchases in the victim’s name. file for bankruptcy, cleaning the bank account

of cash. obtain genuine official documents like

passports and driving licenses.

Some of the ways in which this data can be misused

Page 8: IST Presentation

Ethical Responsibilities Ethical Responsibilities of of those maintaining the databasethose maintaining the database

These are concerned by the employees who keep the records in databases.

The developer of the database should take action in imposing firm security rules.

Developers have a strict responsibility to ensure the security of the systems they develop where security is a requirement.

Ethical responsibility requires one to think twice before giving in to the Identity thief, and breaking the customer’s trust.

Page 9: IST Presentation

Legal Responsibilities of those maintaining the database

On the Commonwealth level, a person is guilty of an offence if the person does anything with the intention of dishonestly causing a loss to another person

The person shouldn’t give access to anyone to the database without having seen genuine proof of identity

They must maintain a backup and recovery of all records

Must co-ordinate and complete regular database upgrades that will ensure reliability and security

Responsibility to provide final approval for those wishing to retrieve records off the database, provided it is for official reasons

Page 10: IST Presentation

Thanks for viewing our presentation!

Case closed! =)

Page 11: IST Presentation

What can you do to prevent Identity TheftIdentity Theft?

Identity_Theft.flv

Page 12: IST Presentation

Presentation prepared by:

Mariessa Lai

&

Rochelle De Silva

10IST.110IST.1