Identity Theft

Beschreibung

Mindmap am Identity Theft, erstellt von yamjid am 05/02/2014.
yamjid
Mindmap von yamjid, aktualisiert more than 1 year ago
yamjid
Erstellt von yamjid vor fast 12 Jahre
20
0

Zusammenfassung der Ressource

Identity Theft
  1. Types of Identity Theft
    1. Technology
      1. Social media
        1. Search engine
          1. Phishing
            1. Viruses
              1. Man in the Middle Attack
              2. Non Technology
                1. Bin Raiding
                  1. Card skimming
                    1. Theft of wallet/purse
                      1. Intercepting mail
                    2. Consequences
                      1. Financial
                        1. Short-term
                          1. Privacy violation
                          2. Long term
                            1. Credit score
                              1. No access to own account
                                1. Affects job prospects
                            2. Legal
                              1. Theft Act 1968
                                1. The Data Protection Act
                                  1. Fraud Act 1968
                                    1. Identity Cards Act 2006
                                    2. Ethical issues
                                      1. Accused of crime you didn't commit
                                        1. Violation of personal property (computer)
                                          1. Privacy violation
                                          2. Reasons for identity theft
                                            1. Did not destroy personal documents
                                              1. Not redirecting mail
                                                1. Doesn't have antivirus/phishing protection
                                                  1. Posted personal details on internet
                                                    1. Responding to unsolicited phonecalls
                                                    Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                    ähnlicher Inhalt

                                                    Professional, Legal, and Ethical Issues in Information Security
                                                    mfundo.falteni
                                                    Cyber Crime and Social Engineering
                                                    Laiyla ♡
                                                    ways fraudsters try to trick people out of money
                                                    tony thompson
                                                    Professional, Legal, and Ethical Issues in Information Security
                                                    إسراء سامي
                                                    Professional, Legal, and Ethical Issues in Information Security
                                                    Haziqah Amir