Java Games: Flashcards, matching, concentration, and word search.

Unit 7 How do thieves obtain personal information

AB
StealingInformation is taken from a purse or wallet, personnel records from a workplace, tax information, bank or credit card statements, or pre-approved credit card offers from the mail.
Diverting MailThieves can complete a change of address form and have the victim’s bills and statements mailed to a different location.
“Dumpster Diving”Personal information is discarded and thieves remove it from the trash.
SkimmingThieves attach a device to card processors to steal credit and debit card information
PhishingThieves use a form of electronic communication (usually email) to pretend to be a company or depository institution in order to get the victim to give up their personal information.
PretextingThieves use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.
SpywareSoftware installed on the victim’s computer, without their knowledge or consent, that monitors internet use, sends pop up ads, re-directs the computer to other sites, and tracks key strokes.
HackingInformation is stolen by breaking into a computer system.



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities