英语课presentation_第1页
英语课presentation_第2页
英语课presentation_第3页
英语课presentation_第4页
英语课presentation_第5页
已阅读5页,还剩7页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、 Identity theft occurs when a criminal uses another persons personal information to take on that persons identity. Identity theft is much more than misuse of a Social Security number-it can also include credit card and mail fraud. Identity theft and identity fraud are terms used to refer to all type

2、s of crime in which someone wrongfully obtains and uses another persons personal data in some way that involves fraud or deception, typically for economic gain化化1504 王先犇王先犇Email Identity Theft A common one is identity theft through email. The thief sends you an email claiming to be a representative

3、of a financial institution that you do business with, such as a bank or credit card company. Ironically, they tell you that they suspect there has been fraudulent activity on your account. Feeling worried, you may be all too quick to give them the information they are asking for to help resolve the

4、“problem.”Phishing for ID Theft A somewhat similar type of identity theft is called “phishing.” The thief poses as the agent of a credit consolidation company and tells you there is a problem with your credit or that you need to view your credit report. They tell you can do this for a fee. The thief

5、 pockets the fee and the “credit consolidation company” disappears.Turning Your Trash into Cash Another type of identity theft takes advantage of the credit card offers you receive in the mail and discard. Known as “dumpster diving,” the thief rifles through your trash in search not only of pre-appr

6、oved credit card offers, but anything such as bank statements, information on existing credit card accounts, and tax documents.Spying on Your Private Information There are a couple of tactics that identity thieves use almost right under your nose. In one, called “shoulder surfing,” the thief manages

7、 to view and record a financial transaction, or part of one, as you are making it. While you are either at an ATM or on your cell phone, the thief uses a hidden video camera, such as the one in his or her cell phone, to get a picture of your transaction化化1504 栗天宇栗天宇Four Methods To Strengthening Your

8、 Digital Security1.Choose good passwords and PINsChoose words and numbers that no one would be able to guess even if they were privy to other parts of your personal information. Or, use words and numbers that are familiar to you, but disguise them in a hard-to-guess code.There are even randomly-gene

9、rated password programs online that will provide virtually unbreakable, or uncrackable passwords. 2Protect your computer.Many identity thieves now use complex software such as spyware and keyloggers to obtain sensitive information such as passwords and login details without the users knowledge. Just

10、 because you cant see anything wrong with your computer doesnt mean that it is safe to useA strong and regularly updated firewall, anti-virus program and anti-spyware program will provide most of the protection an individual needs.3Beware phishing scams.If you get an e-mail claiming to be from your

11、bank that tells you to check or update your information such as a password (for any reason), do not use the link in the e-mail, even if the e-mail letterhead/background looks like it came from your bank. If you think the e-mail is real, log on directly to the company or banks website and check your records there; if there are no changes, you just avoided being scammed.4Take care when shopping onlineKeep a separate credit card just for online purchases.This will make it easier to cancel if something bad does happen and your othe

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论