Java Games: Flashcards, matching, concentration, and word search.

Identity Theft Review

AB
identity cloningencompasses all types of ID theft where someone steals and uses a person's personal data that involves fraud or deception
phishingusing emails or text messages to get access to personal information. Emails come from look-alike websites that victims regularly visit
pharminghackers redirect website traffic to a hoax site--criminals wait for victims to enter their personal information to capture personal information from victims
smishingvictims receive a text message to lure them into revaling account information or install malware
cell phone hackinghacker gains control of victim's cell phone to obtain personal information and confidential data
malwarecomputer hackers gain access or cause damage to a computer or network. The victim doesn't realize the crime has happened.
vishingusing the phone in the name of a business in an attempt to find out personal information the unsuspecting victim tells criminal personal information and details
botinternet robots used to gain control of a computer. Hackers gather passowrds, Log keystrokes and introduces viruses or malicious code onto your computer
What you should carry in your wallet or purseOnly what you need--medical insurance card, driver's license, debit card and/or credit card
Ways to prevent ID Cloninglimit amount of personal information/Review your credit card bills/obtain a copy of your credit report a least once a year/
Steps to take if you become a victim of ID theftContact your bank and credit card issuers/Call and notify banks and credit cards that were opened fraudulently/File a report with the FTC/Contact creditors involved in the ID Theft/Submit all documentation to the Rochester Police Department


Business instructor
Lourdes High School
Rochester, MN

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities