Lecture.docx

  • Uploaded by: Karen Mae Escalante Dela Cruz
  • 0
  • 0
  • October 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Lecture.docx as PDF for free.

More details

  • Words: 193
  • Pages: 1
LECTURE#2 PRIVACY ON THE WEB IDENTIFY THEFT

EMAIL SPAM RRIVACY AND THE INTERNET THEATS

MALWARES

PRIVACY ETHICS

A . IDENTIFY THEFT PESONAL IDENTIFYING INFORMATION PERSONAL IDENTIFYING INFORMATION PESONAL IDETIFIAL INFORMATION ------>INFORMATION THAT CAN KAD SOMEONE TO TO LOCATE OR CONTACT A PERSON Ex: NAME

EMAIL ADDRESS

RESIDENTAL ADDRESS

TELEPHONE NO.

DRIVER LICENSE

CREDITCARD NO.

SOCIAL SECURITY NO. BIRTHDATE. THE FF. ARE SOMEWAYS GETS YOUR PERSONAL DATA 1. RECORD THEFT/DATA BREACHES - INFORMATION IS OBTAINED BY STANDING PAPERS AND COMPUTER RECORDS 2. SHOULDER SURFING-INFORMATION IS OBTAINED BY LOOKING OVER SOMEONES SHOULDER DURING A BANK TRANSACTION 3. DECEPTION-INFORMATION IS GIVEN OUR TO A PRESON POSING AS A FRIEND,COLLEGUE OR AN EMPLOYEROVET THE PHONE 4. DUMPSTER DIWNG- INFORMATION IS FOUND BY CHECKING THE GARBAGE OF OFFICES. 5. STEALING MAIL- STEALING OF MAILS THAT CONTAINS BANK TRANSACTION 6. STEALING WALLET-STEALING OF WALLET THAT CONTAINS GREAT CRADS,IDENTIFICATION AND ETC. 7. INTERNET-THE INTERNET MAKE IT EASY FOR CRIMINALS TO OBTAINED PERSONAL DATA. 8. SKIMMING-CREDIT CARD SWIPED IN A DEVICE THAT COPIES THE DATA STORED SUCH AS NAME AND CREDIT CARD NUMBER 9. PHISHING-AN EMAIL SCAM THAT ARE MABY TO BEILIEVE RECIPIENTS THAT THE EMAIL IS FROM A LEGITEWATE BUSSINESS.

More Documents from "Karen Mae Escalante Dela Cruz"