SlideShare ist ein Scribd-Unternehmen logo
1 von 21
SignificanceofCyberSecurityon
IdentityTheft
Originallypresented by:
GerardoP. Casino Jr.
DeniseAnne Paulette Cabeltes
Fel Jedd Adrian Dacula
BSIT-1B Advocates
$2.8 billion of losses were from imposter scams and $392 million were from
consumer online shopping.
National Council on Identity Theft Protection Issue 2021
Law enforcers nabbed the suspects for stealing money from a number of
individuals by pretending to be GCash, Grab, Lalamove, or Mr. Speedy
employees. News Bytes Issue 2020
The ITRC surveyed a total of about 1,600 victims of personal data theft. 40%
of these victims say that their personal data was stolen, compromised or
misused during the period of April 2021 to March 2022.
CPO Magazine Issue 2022
Are you really protected
enough on cyberspace?
Jeffrey Weiner: Criminal Defense Attorneys (2022)
Why People Commit Identity Theft
Financial
Gain
Revenge To hide
other Crime
It includes receipt, or expectation of
receipt, of anything of value,
including the receipt of other
copyrighted works.
Financial
Gain
I don’t even have a
Girlfriend, Misfortune
strikes, I was also
robbed!
Money is one of the reason why
people commit identity theft.
They prefer steal than work to earn
in a good way.
the action of inflicting hurt or
harm on someone for an injury
or wrong suffered at their
hands.
Revenge
Not all sins are met with
"Sorry"
Most people seek vendetta, they
must have their own profits on it.
They desperately wanted a payback
to that specific individual who’ve
ruined his/her existence.
To hide
other Crime
It’s an offense which is not
reported to the police and
hence not registered as an
offense.
Tranquility is the
biggest ever crime
committed
The world’s mysteries remained
unsolved due to raw information to
resolve the specific incident or worst
case, the witnesses suppressed their
voices so that it’ll not expose the
true findings.
Earlier Question; Are you really
protected enough on cyberspace?
How can be
you so sure?
How can be you so sure?
BE A CLEVER INDIVIDUAL
(Neil J. Rubenking & Jill Duffy - 12 Simple Things You Can Do to Be More Secure Online)
• Use Unique Passwords for Every Login,
• Use Multi-factor Authentication,
• Use Different Email Addresses for Every, Different
Kinds of Accounts,
• Don’t Fall Prey to Click Bait or Phishing
Scams; and
• Protect Your Social Media Privacy.
🅸🅽🆃🅴🆁🅽🅴🆃
Rejumble the following word:
🅽🅴🆃🅸🆃🅽🅴🆁
To conclude, this comes with a
Famous Quote;
“Use the internet wisely for not just
the petty enjoyment of your
senses, but for the development of
your mind as well.”
Abhijit Naskar
Once again, this has been your
Group Presenter,
Gerardo P. Casino Jr., Fel Jedd Adrian Dacula, &
Denise Anne Paulette Cabeltes, sharing today that,
”Your safety is our concern.”
References:
1. NewsBytes.PH May 2020
2. National Council on Identity Theft
Protection 2021
3. CPO Magazine Oct 2022
4. Why People Commit Identity Theft
Feb 2022
5. PCMag Aug 2022
THANK YOU!
Significance of Cyber Security on Identity Theft v.3 [Final].pptx

Weitere ähnliche Inhalte

Ähnlich wie Significance of Cyber Security on Identity Theft v.3 [Final].pptx

PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
Greg Ewers
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
Gary Kazmer
 

Ähnlich wie Significance of Cyber Security on Identity Theft v.3 [Final].pptx (12)

Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Significance of Cyber Security on Identity Theft v.3 [Final].pptx

  • 1. SignificanceofCyberSecurityon IdentityTheft Originallypresented by: GerardoP. Casino Jr. DeniseAnne Paulette Cabeltes Fel Jedd Adrian Dacula BSIT-1B Advocates
  • 2. $2.8 billion of losses were from imposter scams and $392 million were from consumer online shopping. National Council on Identity Theft Protection Issue 2021 Law enforcers nabbed the suspects for stealing money from a number of individuals by pretending to be GCash, Grab, Lalamove, or Mr. Speedy employees. News Bytes Issue 2020 The ITRC surveyed a total of about 1,600 victims of personal data theft. 40% of these victims say that their personal data was stolen, compromised or misused during the period of April 2021 to March 2022. CPO Magazine Issue 2022
  • 3. Are you really protected enough on cyberspace?
  • 4. Jeffrey Weiner: Criminal Defense Attorneys (2022) Why People Commit Identity Theft Financial Gain Revenge To hide other Crime
  • 5. It includes receipt, or expectation of receipt, of anything of value, including the receipt of other copyrighted works. Financial Gain
  • 6. I don’t even have a Girlfriend, Misfortune strikes, I was also robbed!
  • 7. Money is one of the reason why people commit identity theft. They prefer steal than work to earn in a good way.
  • 8. the action of inflicting hurt or harm on someone for an injury or wrong suffered at their hands. Revenge
  • 9. Not all sins are met with "Sorry"
  • 10. Most people seek vendetta, they must have their own profits on it. They desperately wanted a payback to that specific individual who’ve ruined his/her existence.
  • 11. To hide other Crime It’s an offense which is not reported to the police and hence not registered as an offense.
  • 12. Tranquility is the biggest ever crime committed
  • 13. The world’s mysteries remained unsolved due to raw information to resolve the specific incident or worst case, the witnesses suppressed their voices so that it’ll not expose the true findings.
  • 14. Earlier Question; Are you really protected enough on cyberspace? How can be you so sure?
  • 15. How can be you so sure? BE A CLEVER INDIVIDUAL (Neil J. Rubenking & Jill Duffy - 12 Simple Things You Can Do to Be More Secure Online) • Use Unique Passwords for Every Login, • Use Multi-factor Authentication, • Use Different Email Addresses for Every, Different Kinds of Accounts, • Don’t Fall Prey to Click Bait or Phishing Scams; and • Protect Your Social Media Privacy.
  • 16. 🅸🅽🆃🅴🆁🅽🅴🆃 Rejumble the following word: 🅽🅴🆃🅸🆃🅽🅴🆁
  • 17. To conclude, this comes with a Famous Quote; “Use the internet wisely for not just the petty enjoyment of your senses, but for the development of your mind as well.” Abhijit Naskar
  • 18. Once again, this has been your Group Presenter, Gerardo P. Casino Jr., Fel Jedd Adrian Dacula, & Denise Anne Paulette Cabeltes, sharing today that, ”Your safety is our concern.”
  • 19. References: 1. NewsBytes.PH May 2020 2. National Council on Identity Theft Protection 2021 3. CPO Magazine Oct 2022 4. Why People Commit Identity Theft Feb 2022 5. PCMag Aug 2022