08 Identity Theft Flashcards
(7 cards)
Which of the followig is a recommended step that individuals should take to protect themselves from identity theft?
A. Use passwords that are at least eight characters long
B. Create unique answers for security questions
C. Limit personal information shared on social media
D. All of the above
D. All of the above
The following are some of the steps that individuals can take to protect their personal information and prevent identity theft:
- Do not give out government identification numbers unless absolutely necessary.
- Do not carry government identification cards (or numbers) in purses or wallets.
- Create complex passwords or passphrases that are at least eight characters in Length and contain upper- and lowercase letters, numbers, and symbols.
- Do not reuse passwords. Use a different password for every website, account, or device.
- Never send personal information, such as a password or government identification number, via email. Reputable organizations will not request personal information by email.
- When available, use biometric authentication (e.g., fingerprints, voice recognition).
- Create unique answers for security questions. Do not choose answers containing personal information that is publicly available (e.g., name of high school, mother’s maiden name).
- Protect computers with strong and regularly updated firewall and antivirus software, and promptly install all security updates and patches.
- Avoid suspicious websites.
- Delete messages from unknown senders without opening them.
- Only download software from trusted websites.
- Avoid using unsecured, public Wi-Fi networks.
- Limit the amount of personal information shared on social media.
- Use software to permanently erase all data from hard drives before disposing of computers, Smartphones, copiers, printers, and other electronic devices.
- Secure physical mailboxes with a lock, check physical mail regularly, and instruct the post office to suspend mail during vacations.
- Shred all sensitive documents.
- Opt out of unsolicited offers for pre-approved credit cards or other lines of credit.
- Pay attention to billing cycles and review all bills and statements
- Check credit reports regularly.
All of the following are methods of identity theft prevention recommended for businesses EXCEPT:
A. Conducting background checks on prospective employees when permitted by law to do so
B. Restricting the use of laptops to those employees who need them to do their jobs
C. Performing audits of information-handling practices only when required to do so by regulators
D. Limiting employees’ access to customers’ personal information
C. Performing audits of information-handling practices only when required to do so by regulators
The following are some of the steps that businesses can take to protect personal information and prevent identity theft:
- Limit the personal information collected from customers. For example, do not collect customers’ government identification numbers unless there is a legal requirement to do so.
- Restrict employees’ access to the personal information of customers and co-workers.
- Use network-security tools to monitor who accesses personal information.
- Do not retain personal information for longer than necessary.
- Adopt an information-handling policy that governs how personal information is stored, protected, and disposed of. Strictly enforce the policy, and discipline employees who violate it.
- Conduct regular employee training regarding the company’s information-handling policy and best practices for preventing identity theft.
- Ensure the security of buildings by using locks, access codes, and other security features.
- Keep physical documents containing personal information in locked rooms or locked file cabinets.
- Secure all computer networks and electronic information.
- Use encryption to protect all personal information stored by the company or sent to third parties. Encryption should also be used to protect information sent over the company’s wireless network.
- Restrict the use of laptops to those employees who need them to do their jobs.
- Require employees to use complex passwords or passphrases.
- Where permitted by law, perform background checks on prospective employees.
- Thoroughly investigate contractors and vendors before hiring them.
- Do not use government identification numbers as employee identification numbers or print them on pay checks.
- Perform regular audits of information-handling practices, network security, and other internal controls.
- Create a data breach response plan.
Which of the following is an example of the piggybacking method used to gain access to restricted areas?
A. Following behind an individual who has been cleared for access into a restricted area
B. Taking advantage of a legitimate computer user’s active session when the user attends to other business while still logged on
C. Pretending to be a member of a large crowd authorised to enter a restricted area
D. All of the above
C. Pretending to be a member of a large crowd authorised to enter a restricted area
Piggybacking is a method used to gain access to restricted areas, including computer systems, in which the fraudster exploits another person’s access capability like pretending to be a member of a large crowd of people authorised to enter a restricted area.
Which of the following are types of Identity Theft?
A. Criminal Identity Theft
B. Financial Identity Theft
C. Tax Identity Theft
D. All of the above
D. All of the above
Following are the types of identity theft:
- Financial Identity Theft
- Criminal Identity Theft
- Medical Identity Theft
- Insurance Identity Theft
- Tax Identity Theft
- Employment Identity Theft
- Business Identity Theft
Use of short message series to trick targets is known as Smishing.
A. True
B. False
A. True
Use of short message series to trick targets is known as Smishing.
Fraudster leave malware infected USB flash drives, CD-ROMs or similar items in places where people will find them such as parking lots. What type of identity theft is it?
A. Phishing
B. Pharming
C. Baiting
D. Dumpster Diving
C. Baiting
Baiting is a type of identity theft where fraudster leave malware infected USB flash drives, CD-ROMs or similar items in places where people will find them such as parking lots. Items often have a label designed to elicit curiosity or greed in victims.
Which is the type of identity theft where telephone calls or voice messages are used to trick targets into revealing personal or business information?
A. Computer hacking
B. Vishing
C. Piggybacking
D. Smishing
B. Vishing
Vishing is also known as voice phishing, where telephone calls or voice messages are used to trick targets into revealing personal or business information.