ID Theft Review

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

T/F: Over half of child ID theft victims know the person who stole their information

True

2
New cards

T/F: Point-of-sale credit card fraud (in-person) is much more popular today than card-not-present fraud.

False

3
New cards

T/F: Connie Volkos testified in front of Congress to advocate for ID fraud victims

False

4
New cards

T/F: Approx $10 million was lost in 2024 due to ID theft crimes.

False

5
New cards

T/F: EMV tech is more secure than a magnetic stripe when used in-person

True

6
New cards

T/F: It wasn’t until 2021 that the law recognized ID theft victims as actual victims.

False

7
New cards

T/F: If you believe your SSN has been compromised, you should file a report with the SSA to get a new number.

False

8
New cards

T/F: If you choose "credit" at the register when using a debit card, you do not have fraud protection

False

9
New cards

T/F: ID cloning means you change your physical appearance to try to become the other person.

False

10
New cards

Every US citizen is entitled to a free credit report every week from each of the 3 credit bureaus.

True

11
New cards

T/F: All hackers are bad.

False

12
New cards

T/F: Connie Volkos served a 10-year sentence for ID fraud and cloning.

False

13
New cards

Some ID theft victims will receive restitution for the time spent trying to fix their identity.

True

14
New cards

T/F: On a website, "https" and "http" are the exact same thing.

15
New cards

Only careless people become victims of a data breach

False

16
New cards

 Elementary school kids cannot be victims of ID theft because they aren't 18.

False

17
New cards

T/F: Info held on the dark web is often illegally obtained through ID theft.

True

18
New cards

T/F: If you conduct business & bank online, you are likely going to be a victim of ID theft at some point.

True

19
New cards

T/F: One of the challenges w/ cyber ID theft is the perpetrators are usually really smart and stay ahead of "the law".

True

20
New cards

T/F: Credit monitoring services are all free.

False

21
New cards

Stealing the identity of a dead person

Ghosting

22
New cards

The part of the internet where illegal/unethical sales take place. (Where personal info is sold, such as SSNs)

Dark web

23
New cards

Software that hides in the background and watches all of your online activities

Spyware

24
New cards

A way to scramble data using computer algorithms to prevent unauthorized access to data or sensitive information

Encryption

25
New cards

When a hacker infiltrates an ecommerce checkout page and records banking and/or card info

Form Jacking

26
New cards

Someone who hacks for good. (Searching for weaknesses in a computer system in order to prevent data breaches, etc.)

White hat hacker

27
New cards

A fake email that looks legit that is used to obtain another’s personal information

Phishing

28
New cards

A specific form of spyware that simply records the keys you type and where you type them

Keylogging

29
New cards

Someone who hacks for nefarious purposes such as identity theft

Black hat hacker

30
New cards

stealing someone else’s personal data

Identity theft

31
New cards

A type of credit card fraud in which the victim’s account numbers are copied and transferred using a small device

Skimming

32
New cards

A combo of “malicious” & “software”, it's software created with the specific intent to cause disruption or damage.

Malware

33
New cards

A form of phishing in which someone tries to trick you into giving them your private information via SMS message

Smishing

34
New cards

When someone opens multiple accts, gets a driver’s license, and presents themselves as another person in every way

ID cloning

35
New cards

The part of the internet that doesn't come up when you Google something and is a "safe" place for our info

Deep web

36
New cards

Using someone’s stolen personal information to open accounts

ID fraud

37
New cards

When someone takes over some else’s bank/credit accounts

Account takeover

38
New cards

 “Phishing without a lure”- A malicious code is installed onto a device to misdirect users onto illegit sites

Pharming

39
New cards

When a hacker lies in wait for someone to make a mistake then attacks a system on the same day it is discovered

Zero-Day Exploit

40
New cards

An incident wherein info is stolen or taken from a system without the knowledge/authorization of the system's owner

Data Breach

41
New cards

Someone who hacks then reports the hack to the owners. They often offer info in exchange for $. (Extortion)

Grey hat Hacker

42
New cards

Which division of fed investigates and handles cases:

FTC (federal trade commission)

43
New cards

Whats the website to get credit report

annualceditreport.com

44
New cards

According to liflock how often is identity stole

every 22 seconds

45
New cards

What are three things to do to protect yourself

shred documents, new/unique passwords, and monitor credit reports

46
New cards

What are 3 ways thieves can obtain infor

skimming, daya breach, and stealing mail

47
New cards

In the movie where did connie get info

at the mortgage and loan APPLICATION

48
New cards

If id is stolen what can you immediately do

close all accounts, call police, report to credit bureau

49
New cards

What do following terms mean theft, fraud, cloning

Theft: STEALING of information

Fraud: USING of said information

Cloning: TAKING OVER someone’s full identity

50
New cards

3 ways connie used michelles info

bought the car, got an apartment, liposuction