SlideShare a Scribd company logo
Are you that safe? Protect your identity protect yourself! Identity Fraud By: Sanea&Keerthana 
What exactly is Identity Fraud? Identity fraud is referred to a big crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud. Identity is unique to you and cannot be given to someone else for their use, your personal data ­ especially your Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data ­ can be used, if they fall into the wrong hands, to personally profit at your expense. In many cases, a victim's losses may include not only out-of-pocket financial losses, but substantial additional.
All of your personal information such as your credit card number, where you live, your phone number, Medicare number, license number date of birth etc….are stored in a database. A fraud can steal from your purse or wallet but the most common way is through a computer or database where they can get a hold of your personal information by either using Trojans, phishing , hacking in or using the zero day attack.  These thieves are able to log onto a public computer you were on and hack their way into finding what you were doing. They are even able to research from government registers, search engines Google) or public records. They are able to obtains information from organizations which store quite a large amount of personal information. - By browsing on social networks such as MySpace, face book, bebo etc…they are able to get hold of any of your personal information and therefore be misused. How are databases involved in Identity Theft
How are databases involved in Identity Theft
The type of data stored about individuals in relation to Identity Theft
Types of ways this data can be misused in relation    to identity theft All your personal information (as mentioned before) if obtained is able to misused in many ways. This includes -By obtaining your credit card details this being your pin number , card number, deposit slip etc….)and using these “identity” token the thieves are able to access your savings, funds from an ATM or retail casher. They are also able to make debits such as withdrawals, purchases or checks.  - An account takeover is possible as well, where the stealer takes control over the account by rerouting the credit card statements to a new address. -They are able create new accounts using another persons identity - If they get hold of a persons insurance information , they are able to use the person’s identity information’s to obtain medical services, such as going to a doctor or goods like medicines). So therefore the thief is putting medical entries into the victims existing medical records.
Types of ways this data can be misused in relation  to identity theft apply for a loan.
Ethical responsibilities of those maintaining this database? The ethical implications are what should be stored on the databases in the first place. Also there should be a consideration of the intrinsic ethical duty placed on database security professionals to secure a database system. Who is to blame?  Consider a situation where a database protected private data, but there was no attempt to ensure its security except the statement that no one is to misuse it. A person who compromises the database in a misuse fashion has committed an ethical infraction.
Your personal information is stored in this database and this database is part of an organization whether being a bank, a social network, phone company, gas company, insurance company, the government, ATO(Australian Taxation Office) etc….  Legally banks as per the privacy act requirements have to maintain physical security, such as locks and security systems, over paper and electronic data stores and premises. They also maintain computer and network security: and other security measures such as identification codes and passwords to control access to computer systems. As for social networks information cannot be accessed until the owner has accessed it. Phone, gas and insurance or any other company in Australia are not allowed to share the information of a user with other companies without consent. Companies in Australia have to comply with the Privacy Act 1988.   Legal responsibilities of those maintaining this  database
“ We will destroy personal information if it is no longer needed: > for the purposes for which we collected it; or >for the purposes of meeting legal requirements. We will properly dispose off all paper files, letters, correspondence and any other hardcopy documents contain personal information that is no longer needed.     All information stored in electronic form that is no longer required will be deleted from our systems.” Legal responsibilities of those maintaining this  database
77%Australians believe That they give out more Personal information On the internet than they do in reality. 63% Australians reveal their name online. A third admit to revealing their home address. 29% people have given bank details or credit card numbers to non banking websites. 41 percent of 16-24 year old have written personal details online, exposing themselves to identity fraud, but are not worried of identity theft from information they have posted online. 46%of Australians believe they are at some risk of identity fraud online Survey Conducted
-75% of Australians throw out there personal information, such things like credit card statements in there rubbish and recycled therefore putting them at the risk of identity fraud. -87% Australians are concerned about Identity Theft. Identity cost 4B a year, according to Australian Federal Police. Concerns when it comes to identity fraud is that women fear financial loss, poor credit rating, feeling personally violated as well as finding it more embarrassing than men. 81% of Australians who earn $40k-69k are most likely of getting their identity stolen by throwing out their “utility bills and credit card statements. Personal information such as – DOB, address, mother's maiden name and passwords are now known to be more valuable than money. All this is enough for a “fraudster” to open bank accounts, apply for credit cards as well as loans. The Facts
 
Extra Information For more information on identity fraud visit  http://www.stopidtheft.com.au/   to learn more about it. You can also visit the Australian Government, Australian Institute of Criminology website  http://www.aic.gov.au/research/fraud/idfraud.html  , which has a list of useful links, reports, conference papers and presentations!
Video!

More Related Content

PPT
Indentify Theft Slide Show
PPT
Identity theft power_point
PPT
Identity Theft: How to Avoid It
PDF
Identity Theft ppt
PPT
Identity theft
KEY
Identity theft
PPTX
Identity theft ppt
PPTX
Identity Theft Presentation
Indentify Theft Slide Show
Identity theft power_point
Identity Theft: How to Avoid It
Identity Theft ppt
Identity theft
Identity theft
Identity theft ppt
Identity Theft Presentation

What's hot (20)

PPT
Id Theft Presentation
PPTX
Identity theft
PPT
Cyber Crime Identity Theft
PDF
How to Protect Yourself From Identity Theft
PPTX
Data theft
PDF
Identity Theft: The Other You
PDF
The Identity Theft Checklist – Guidance for the general public.nz
PPTX
Social networking and identity theft
DOCX
Introduction of cyber security
PPT
Identity Theft Scams
PPT
Identity Theft
PPTX
Consumer Protection: Identity Theft
PPTX
How to Prevent Identity Theft and Fraud
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PPT
How to Prevent ID Theft
PDF
What You Need to Know to Avoid Identity Theft
PPT
Identity Theft: How to Reduce Your Risk
PDF
Identity theft fraud laws how the legal system can protect you
PPTX
Identity crisis
PPTX
Identity crisis
Id Theft Presentation
Identity theft
Cyber Crime Identity Theft
How to Protect Yourself From Identity Theft
Data theft
Identity Theft: The Other You
The Identity Theft Checklist – Guidance for the general public.nz
Social networking and identity theft
Introduction of cyber security
Identity Theft Scams
Identity Theft
Consumer Protection: Identity Theft
How to Prevent Identity Theft and Fraud
IDENTIFYING CYBER THREATS NEAR YOU
How to Prevent ID Theft
What You Need to Know to Avoid Identity Theft
Identity Theft: How to Reduce Your Risk
Identity theft fraud laws how the legal system can protect you
Identity crisis
Identity crisis
Ad

Viewers also liked (20)

PPTX
Mini project ppt
PPTX
Ppt of mini project.
PPTX
Minor Project Presentation 1
DOCX
Mini project complete
PPTX
minor project
PPTX
Final Year Project Presentation
PPTX
Presentation on project report
DOCX
A minor project report
PPT
First Review(Ppt)
PPTX
Networking Projects
PPTX
Final Project Presentation for Computer Networking
PDF
Complete-Mini-Project-Report
PPTX
Sample PowerPoint for Project Review
PPTX
Anna university-ug-pg-ppt-presentation-format
DOCX
Project report
PPT
Intensive Care Professionals and their role in Organ Donation
PPTX
Solve five problems related to computer
PDF
LaTeX for beginners
PDF
Variables Creation using SAS on Longitudinal Data for Fraud Models
PPTX
mini project
Mini project ppt
Ppt of mini project.
Minor Project Presentation 1
Mini project complete
minor project
Final Year Project Presentation
Presentation on project report
A minor project report
First Review(Ppt)
Networking Projects
Final Project Presentation for Computer Networking
Complete-Mini-Project-Report
Sample PowerPoint for Project Review
Anna university-ug-pg-ppt-presentation-format
Project report
Intensive Care Professionals and their role in Organ Donation
Solve five problems related to computer
LaTeX for beginners
Variables Creation using SAS on Longitudinal Data for Fraud Models
mini project
Ad

Similar to Powerpoint Mini Project.Pdf (17)

PDF
Misuse of personal information
PPT
IST Presentation
PDF
Identity Theft - Canada
PDF
Senior Protection Guide - Canada
PDF
Identity Privacy 101 - Quicken Loans Zing Blog
PDF
Youth Protection Guide - Canada
PPT
Identity Fraud and How to Protect Yourself
PPTX
Identity Theft.pptx
PDF
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
PPTX
Will The Typical Person Need ID Fraud Insurance Protection?
PDF
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PDF
Identity theft seminar
PDF
Identity Theft: Evolving with Technology
PPTX
ASIS Phoenix February Presentation
PDF
DONCEAP - May - About Identity Theft
PDF
You Have the Power to Stop Identity Theft
PDF
You Can Fight Identity Theft
Misuse of personal information
IST Presentation
Identity Theft - Canada
Senior Protection Guide - Canada
Identity Privacy 101 - Quicken Loans Zing Blog
Youth Protection Guide - Canada
Identity Fraud and How to Protect Yourself
Identity Theft.pptx
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Will The Typical Person Need ID Fraud Insurance Protection?
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
Identity theft seminar
Identity Theft: Evolving with Technology
ASIS Phoenix February Presentation
DONCEAP - May - About Identity Theft
You Have the Power to Stop Identity Theft
You Can Fight Identity Theft

Recently uploaded (20)

PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Getting Started with Data Integration: FME Form 101
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
STKI Israel Market Study 2025 version august
PPTX
TLE Review Electricity (Electricity).pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
project resource management chapter-09.pdf
DP Operators-handbook-extract for the Mautical Institute
A comparative study of natural language inference in Swahili using monolingua...
Developing a website for English-speaking practice to English as a foreign la...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Group 1 Presentation -Planning and Decision Making .pptx
Zenith AI: Advanced Artificial Intelligence
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Getting started with AI Agents and Multi-Agent Systems
A novel scalable deep ensemble learning framework for big data classification...
Getting Started with Data Integration: FME Form 101
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
cloud_computing_Infrastucture_as_cloud_p
NewMind AI Weekly Chronicles - August'25-Week II
STKI Israel Market Study 2025 version august
TLE Review Electricity (Electricity).pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
What is a Computer? Input Devices /output devices
project resource management chapter-09.pdf

Powerpoint Mini Project.Pdf

  • 1. Are you that safe? Protect your identity protect yourself! Identity Fraud By: Sanea&Keerthana 
  • 2. What exactly is Identity Fraud? Identity fraud is referred to a big crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud. Identity is unique to you and cannot be given to someone else for their use, your personal data ­ especially your Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data ­ can be used, if they fall into the wrong hands, to personally profit at your expense. In many cases, a victim's losses may include not only out-of-pocket financial losses, but substantial additional.
  • 3. All of your personal information such as your credit card number, where you live, your phone number, Medicare number, license number date of birth etc….are stored in a database. A fraud can steal from your purse or wallet but the most common way is through a computer or database where they can get a hold of your personal information by either using Trojans, phishing , hacking in or using the zero day attack. These thieves are able to log onto a public computer you were on and hack their way into finding what you were doing. They are even able to research from government registers, search engines Google) or public records. They are able to obtains information from organizations which store quite a large amount of personal information. - By browsing on social networks such as MySpace, face book, bebo etc…they are able to get hold of any of your personal information and therefore be misused. How are databases involved in Identity Theft
  • 4. How are databases involved in Identity Theft
  • 5. The type of data stored about individuals in relation to Identity Theft
  • 6. Types of ways this data can be misused in relation to identity theft All your personal information (as mentioned before) if obtained is able to misused in many ways. This includes -By obtaining your credit card details this being your pin number , card number, deposit slip etc….)and using these “identity” token the thieves are able to access your savings, funds from an ATM or retail casher. They are also able to make debits such as withdrawals, purchases or checks. - An account takeover is possible as well, where the stealer takes control over the account by rerouting the credit card statements to a new address. -They are able create new accounts using another persons identity - If they get hold of a persons insurance information , they are able to use the person’s identity information’s to obtain medical services, such as going to a doctor or goods like medicines). So therefore the thief is putting medical entries into the victims existing medical records.
  • 7. Types of ways this data can be misused in relation to identity theft apply for a loan.
  • 8. Ethical responsibilities of those maintaining this database? The ethical implications are what should be stored on the databases in the first place. Also there should be a consideration of the intrinsic ethical duty placed on database security professionals to secure a database system. Who is to blame? Consider a situation where a database protected private data, but there was no attempt to ensure its security except the statement that no one is to misuse it. A person who compromises the database in a misuse fashion has committed an ethical infraction.
  • 9. Your personal information is stored in this database and this database is part of an organization whether being a bank, a social network, phone company, gas company, insurance company, the government, ATO(Australian Taxation Office) etc…. Legally banks as per the privacy act requirements have to maintain physical security, such as locks and security systems, over paper and electronic data stores and premises. They also maintain computer and network security: and other security measures such as identification codes and passwords to control access to computer systems. As for social networks information cannot be accessed until the owner has accessed it. Phone, gas and insurance or any other company in Australia are not allowed to share the information of a user with other companies without consent. Companies in Australia have to comply with the Privacy Act 1988.   Legal responsibilities of those maintaining this database
  • 10. “ We will destroy personal information if it is no longer needed: > for the purposes for which we collected it; or >for the purposes of meeting legal requirements. We will properly dispose off all paper files, letters, correspondence and any other hardcopy documents contain personal information that is no longer needed.   All information stored in electronic form that is no longer required will be deleted from our systems.” Legal responsibilities of those maintaining this database
  • 11. 77%Australians believe That they give out more Personal information On the internet than they do in reality. 63% Australians reveal their name online. A third admit to revealing their home address. 29% people have given bank details or credit card numbers to non banking websites. 41 percent of 16-24 year old have written personal details online, exposing themselves to identity fraud, but are not worried of identity theft from information they have posted online. 46%of Australians believe they are at some risk of identity fraud online Survey Conducted
  • 12. -75% of Australians throw out there personal information, such things like credit card statements in there rubbish and recycled therefore putting them at the risk of identity fraud. -87% Australians are concerned about Identity Theft. Identity cost 4B a year, according to Australian Federal Police. Concerns when it comes to identity fraud is that women fear financial loss, poor credit rating, feeling personally violated as well as finding it more embarrassing than men. 81% of Australians who earn $40k-69k are most likely of getting their identity stolen by throwing out their “utility bills and credit card statements. Personal information such as – DOB, address, mother's maiden name and passwords are now known to be more valuable than money. All this is enough for a “fraudster” to open bank accounts, apply for credit cards as well as loans. The Facts
  • 13.  
  • 14. Extra Information For more information on identity fraud visit http://www.stopidtheft.com.au/ to learn more about it. You can also visit the Australian Government, Australian Institute of Criminology website http://www.aic.gov.au/research/fraud/idfraud.html , which has a list of useful links, reports, conference papers and presentations!