click below
click below
Normal Size Small Size show me how
identity theft
spyware | one type of malware that can monitor or control your computer use. |
dumpster diving | cybersecurity is the process of investigating an individual or organization's trash to retrieve information that could be used to compromise network resources or plan a cyberattack. |
firewall | A barrier designed to help protect your personal, private information from being stolen by criminals |
forgery | a crime that could lead to identity theft because it starts with using someone else's signature to steal money, goods, or personal information. |
fraud | someone using another individual's personal information without consent, often to obtain a benefit. |
identity theft | happens when someone steals your personal information to commit fraud. The identity thief may use your information to apply for credit, file taxes, or get medical services. |
peer-to-peer P2P | a mechanism through which the user can transfer funds from his bank account to another individual's account via the digital medium i.e. Internet or a mobile device. |
phishing | a type of online scam that targets consumers by sending them an e-mail that appears to be from a well-known source |
shoulder surfing | a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder. |
snail mail | letters or messages that are not sent by email, but in the mail |
scams | the scammer tricks you into handing over your personal information. |
anti virus software | a program designed to detect and remove viruses and other kinds of malicious software from your computer or laptop. |
better business bureau | The BBB's mission is to promote “marketplace trust,” which it does by grading companies and by facilitating the resolution of consumer complaints. |
federal trade commission | it supports the criminal investigation and prosecution of identity theft by serving as a clearinghouse for identity theft reports |
equifax | fraud department, sells credit monitoring nd fraud prevention services |
transunion | uses truly identity to protect infomation |
experian | helps you investigate fraudulent info on your credit report |
internal revenue service | the U.S. federal agency that oversees the collection of taxes—primarily income taxes—and the enforcement of tax laws. |
solicitations | A consent solicitation is a process by which a security issuer proposes changes to the terms of the security agreement. |
spam | irrelevant or inappropriate messages sent on the internet to a large number of recipients. |