Professional Documents
Culture Documents
PREVENTION
BY YUGANTAR RANA, SRINIDHI DULAM, SUSHANT
SUBRAMANIAN, SUHANI BHARTIYA.
PREVENTION METHODS OF
IDENTITY THEFT
•Our personal data is everywhere and providing information
like passwords and account numbers to access online accounts
is something many of us do daily. Unfortunately, whenever we
supply our PII(Personal Identifiable Information), we are taking
some level of risk that a criminal could steal and misuse it. But
there are ways to reduce the likelihood of identity theft.
•These are some prevention methods of identity theft:
•sign up for an identity theft protection service.
•Don’t access personal or financial data with public Wi-Fi
•Use a password, lock code or encryption
•If you’re not sure about the source, don’t use the link or open
the attachment.
•Use an up-to-date Security Software
BIOMETRICS
Enter biometrics—a new way of verifying your identity that uses
physical and behavioral traits, not easily hackable passwords.
• A step beyond two-factor authorization—which uses a
password and secondary confirmation—biometric
authorization uses things like fingerprints, facial recognition
or voice recognition to verify your identity.
• But even biometrics have their cons: -
- It’s not foolproof
- Biometric Data can be stolen
- It requires high security standards
- There can be legal limitations
• How to prevent theft of Biometric Data
- Keep your software updated
- Always be aware of who is collecting your biometric data
- Opt out if you don't want to use biometrics
Cyber Forensics
Cyber forensics is the practise of gathering, retaining and analysing computer-related data for
investigative purposes in a manner that maintains the integrity of the data.
Through the digital forensics investigation process including : Identification, Preservation,
Analysis and Presentation (IPAP) it is used in criminal investigations to identify what happened,
how it happened, when it happened and the people involved.