1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
T/F: Over half of child ID theft victims know the person who stole their information
True
T/F: Point-of-sale credit card fraud (in-person) is much more popular today than card-not-present fraud.
False
T/F: Connie Volkos testified in front of Congress to advocate for ID fraud victims
False
T/F: Approx $10 million was lost in 2024 due to ID theft crimes.
False
T/F: EMV tech is more secure than a magnetic stripe when used in-person
True
T/F: It wasn’t until 2021 that the law recognized ID theft victims as actual victims.
False
T/F: If you believe your SSN has been compromised, you should file a report with the SSA to get a new number.
False
T/F: If you choose "credit" at the register when using a debit card, you do not have fraud protection
False
T/F: ID cloning means you change your physical appearance to try to become the other person.
False
Every US citizen is entitled to a free credit report every week from each of the 3 credit bureaus.
True
T/F: All hackers are bad.
False
T/F: Connie Volkos served a 10-year sentence for ID fraud and cloning.
False
Some ID theft victims will receive restitution for the time spent trying to fix their identity.
True
T/F: On a website, "https" and "http" are the exact same thing.
Only careless people become victims of a data breach
False
Elementary school kids cannot be victims of ID theft because they aren't 18.
False
T/F: Info held on the dark web is often illegally obtained through ID theft.
True
T/F: If you conduct business & bank online, you are likely going to be a victim of ID theft at some point.
True
T/F: One of the challenges w/ cyber ID theft is the perpetrators are usually really smart and stay ahead of "the law".
True
T/F: Credit monitoring services are all free.
False
Stealing the identity of a dead person
Ghosting
The part of the internet where illegal/unethical sales take place. (Where personal info is sold, such as SSNs)
Dark web
Software that hides in the background and watches all of your online activities
Spyware
A way to scramble data using computer algorithms to prevent unauthorized access to data or sensitive information
Encryption
When a hacker infiltrates an ecommerce checkout page and records banking and/or card info
Form Jacking
Someone who hacks for good. (Searching for weaknesses in a computer system in order to prevent data breaches, etc.)
White hat hacker
A fake email that looks legit that is used to obtain another’s personal information
Phishing
A specific form of spyware that simply records the keys you type and where you type them
Keylogging
Someone who hacks for nefarious purposes such as identity theft
Black hat hacker
stealing someone else’s personal data
Identity theft
A type of credit card fraud in which the victim’s account numbers are copied and transferred using a small device
Skimming
A combo of “malicious” & “software”, it's software created with the specific intent to cause disruption or damage.
Malware
A form of phishing in which someone tries to trick you into giving them your private information via SMS message
Smishing
When someone opens multiple accts, gets a driver’s license, and presents themselves as another person in every way
ID cloning
The part of the internet that doesn't come up when you Google something and is a "safe" place for our info
Deep web
Using someone’s stolen personal information to open accounts
ID fraud
When someone takes over some else’s bank/credit accounts
Account takeover
“Phishing without a lure”- A malicious code is installed onto a device to misdirect users onto illegit sites
Pharming
When a hacker lies in wait for someone to make a mistake then attacks a system on the same day it is discovered
Zero-Day Exploit
An incident wherein info is stolen or taken from a system without the knowledge/authorization of the system's owner
Data Breach
Someone who hacks then reports the hack to the owners. They often offer info in exchange for $. (Extortion)
Grey hat Hacker
Which division of fed investigates and handles cases:
FTC (federal trade commission)
Whats the website to get credit report
annualceditreport.com
According to liflock how often is identity stole
every 22 seconds
What are three things to do to protect yourself
shred documents, new/unique passwords, and monitor credit reports
What are 3 ways thieves can obtain infor
skimming, daya breach, and stealing mail
In the movie where did connie get info
at the mortgage and loan APPLICATION
If id is stolen what can you immediately do
close all accounts, call police, report to credit bureau
What do following terms mean theft, fraud, cloning
Theft: STEALING of information
Fraud: USING of said information
Cloning: TAKING OVER someone’s full identity
3 ways connie used michelles info
bought the car, got an apartment, liposuction