Identity Theft

Description

Mind Map on Identity Theft, created by yamjid on 05/02/2014.
yamjid
Mind Map by yamjid, updated more than 1 year ago
yamjid
Created by yamjid almost 12 years ago
20
0

Resource summary

Identity Theft
  1. Types of Identity Theft
    1. Technology
      1. Social media
        1. Search engine
          1. Phishing
            1. Viruses
              1. Man in the Middle Attack
              2. Non Technology
                1. Bin Raiding
                  1. Card skimming
                    1. Theft of wallet/purse
                      1. Intercepting mail
                    2. Consequences
                      1. Financial
                        1. Short-term
                          1. Privacy violation
                          2. Long term
                            1. Credit score
                              1. No access to own account
                                1. Affects job prospects
                            2. Legal
                              1. Theft Act 1968
                                1. The Data Protection Act
                                  1. Fraud Act 1968
                                    1. Identity Cards Act 2006
                                    2. Ethical issues
                                      1. Accused of crime you didn't commit
                                        1. Violation of personal property (computer)
                                          1. Privacy violation
                                          2. Reasons for identity theft
                                            1. Did not destroy personal documents
                                              1. Not redirecting mail
                                                1. Doesn't have antivirus/phishing protection
                                                  1. Posted personal details on internet
                                                    1. Responding to unsolicited phonecalls
                                                    Show full summary Hide full summary

                                                    Similar

                                                    Professional, Legal, and Ethical Issues in Information Security
                                                    mfundo.falteni
                                                    Cyber Crime and Social Engineering
                                                    Laiyla ♡
                                                    ways fraudsters try to trick people out of money
                                                    tony thompson
                                                    Professional, Legal, and Ethical Issues in Information Security
                                                    إسراء سامي
                                                    Professional, Legal, and Ethical Issues in Information Security
                                                    Haziqah Amir