Identity Theft and Credit Card Fraud

Get Started. It's Free
or sign up with your email address
Identity Theft and Credit Card Fraud by Mind Map: Identity Theft and Credit Card Fraud

1. Steps to Protect from:

1.1. Identity Theft

1.1.1. Step of protecting from identity theft 1. Mixing up the password. Example; alphabet,numbers,symbol 2. Avoid clicking from shady website or links. Example; Identity thieves routinely use emails and websites that look similar to your bank, credit card company and if the link isnt from legitmate company, avoid click on it. 3. Avoid public wifi 4. Update your software regularly 5. Use two factor authentication

1.1.2. What is identity theft Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases. Identity theft is committed in many different ways and its victims are typically left with damage to their credit, finances, and reputation.

1.2. Credit Card Fraud

1.2.1. What is Credit Card Fraud ? Credit card fraud is a fraud committed by using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services, or to make payment to another account which is controlled by a criminal

1.2.2. What to do next on stolen or lost Credit Card ? 1. Contact the Credit Card Issuer 2. Change the Login Information 3. Monitor the Credit Card Statement 4. Protect from future credit card fraud.

2. How can you distinguish between an e-mail that is a phishing attempt and an e-mail from a legitimate business

2.1. Email from a legitimate business

2.1.1. 1. Having a legit logo comes with authentication security

2.1.2. 2. An official e-mail name from the legit business

2.1.3. 3. Provide an customer service/assistance.

2.1.4. 4. Provide a name, position,company's name and phone number.

2.2. Email that is a phishing

2.2.1. 1. The message is sent from a public email domain No legitimate organisation will send emails from an address that ends ‘’. Most organisations, except some small operations, will have their own email domain and company accounts

2.2.2. 2. It includes suspicious attachments or links It will either be an infected attachment that you’re asked to download or a link to a website.

2.2.3. 3. Poor Spelling and Grammar Phishing emails might also use strange punctuation or misplaced capital letters.

2.2.4. 4. The email asks you to confirm personal information Emails requesting you to confirm personal information that you would never usually provide, such as banking details or login credentials.