Identity Theft

Description

Mind Map on Identity Theft, created by yamjid on 02/05/2014.
yamjid
Mind Map by yamjid, updated more than 1 year ago
yamjid
Created by yamjid over 11 years ago
20
0

Resource summary

Identity Theft
  1. Types of Identity Theft
    1. Technology
      1. Social media
        1. Search engine
          1. Phishing
            1. Viruses
              1. Man in the Middle Attack
              2. Non Technology
                1. Bin Raiding
                  1. Card skimming
                    1. Theft of wallet/purse
                      1. Intercepting mail
                    2. Consequences
                      1. Financial
                        1. Short-term
                          1. Privacy violation
                          2. Long term
                            1. Credit score
                              1. No access to own account
                                1. Affects job prospects
                            2. Legal
                              1. Theft Act 1968
                                1. The Data Protection Act
                                  1. Fraud Act 1968
                                    1. Identity Cards Act 2006
                                    2. Ethical issues
                                      1. Accused of crime you didn't commit
                                        1. Violation of personal property (computer)
                                          1. Privacy violation
                                          2. Reasons for identity theft
                                            1. Did not destroy personal documents
                                              1. Not redirecting mail
                                                1. Doesn't have antivirus/phishing protection
                                                  1. Posted personal details on internet
                                                    1. Responding to unsolicited phonecalls
                                                    Show full summary Hide full summary

                                                    Similar

                                                    Professional, Legal, and Ethical Issues in Information Security
                                                    mfundo.falteni
                                                    Cyber Crime and Social Engineering
                                                    Laiyla ♡
                                                    ways fraudsters try to trick people out of money
                                                    tony thompson
                                                    Professional, Legal, and Ethical Issues in Information Security
                                                    إسراء سامي
                                                    Professional, Legal, and Ethical Issues in Information Security
                                                    Haziqah Amir
                                                    C1 B1 & P1 Test
                                                    jodie00
                                                    An Inspector Calls -- Themes
                                                    Sadia Aktar
                                                    THE PRESENT CONTINUOUS
                                                    neworld2030
                                                    The Circulatory System
                                                    Johnny Hammer
                                                    English Literature (Topics based on: A Christmas Carol, Macbeth, An Inspector Calls, Poetry, and Unseen Poetry)
                                                    Larissa Thomson
                                                    Účto Fífa 3/6
                                                    Bára Drahošová