Take steps to protect your financial and online identity. Lisa Bock discusses ways scammers obtain information to steal an identity, and reviews some of the signs of identity theft and medical identity theft. In addition, Lisa illustrates how cybercriminals use Facebook cloning to gain information or money from your friends.
- [Voiceover] Your personal information…is a valuable commodity.…As a result, you should take steps to protect…your financial and online identity.…Scammers and hackers have many tricks…in order to obtain information and steal an identity.…Once someone has stolen information on an individual,…many events can take place.…The outcome will depend on what the thief stole.…Be aware of some of the signs of identity theft.…
A compromised credit card will have…bogus charges on that card.…A stolen social security number can result…in the thief filing a tax return in your name…and getting your refund.…An illegal immigrant has used…the social security number to get a job.…In that case, the IRS might notify you…that you have reported income from an unknown employer.…Or they have received more than one tax return in your name.…Or you're receiving calls from debt collectors…about unknown debts.…
Be aware of some of the signs of medical identity theft.…This is also a serious issue.…Some signs include, medical providers bill you…
In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks.
Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Visualizing the victim
- Recognizing an attack
- Using charm, power, and influence
- Manipulating with social media
- Preventing insider attacks
- Stealing identities
- Pen testing with social engineering
- Taking countermeasures