Digital Footprints Nw3C

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

mobile device security

privacy settings change with software and app updates, potentially exposing persona info during upgrades or when new features are added -recheck config settings after every OS system upgrade and installation to review what PII certain applications have access to when they are installed or upgraded solutions: 1. password protection 2. two-factor authentication 3. connecting to secure networks 4. allowing auto-updates for "apps" and software 5. turning off Wi-FI and Bluetooth when not in use 6. back-up personal info to secure hard drive (to keep if wiped!) 7. delete unwanted apps + check app permissions 8. unsubscribe to unwanted newsletters (helps prevent chance of getting phished) 9. delete old files; gives back valuable space 10. get rid of unwanted browser extensions (malicious browser extensions can track internet activity) 11. consider a VPN: public WiFI has a host of potential cybercrime risks; public networks aren't secure and can expose personal info; using VPN offers secure, untraceable connection wherever you use public wifi) 12. adjust social media settings+review privacy settings of them 13. safe profiles: read end user license agreement (EULA) to ID what's being collected 14. safe computing: avoid open/unsecured networks, utilize VPN/proxy services, don't access personal sites on work devices, use separate devices, understand what the app can be collecting) all help prevent personal information from being compromised

Cybercrime Support Network

provides a checklist of things that you can do right now to defend your cyberself against hackers, scams, malware, and other cyber attacks

Opting out of and monitoring data aggregator sites ?

should be done regularly

spoofs and fakes

social media accounts created by a user as a multiplier to voice misinfo/disinfo: 1. fake accounts pretending to be a person who does not exist 2. fake accounts pretending to be a person other than themselves (law enforcement is prone/target of these, especially when they're involved in controversial or high-profile cases)

_____ ______ social media accounts are created by a user as a multiplier to voice misinfo/disinfo

spoofed and faked

top 10 data aggregators (and how to opt out)

1. acxiom 2. been verified 3. info tracer 4. intelius 5. lexisnexis 6. mylife 7. radaris 8. spokeo 9.truepeoplesearch 10. whitepages

examples of major credit bureaus

1. equifax 2. experian 3. TransUnion 4. Innovis 5. Chex 6 NCTUE

In the event that your data is compromised, you should take the following actions:

1. report: report incident to agency or another agency capable of investigating cybercrime 2. determine the threat: determine what info was exploited, seriousness of threat, and point of compromise 3. remove info: work w/ law enforcement to remove info from website/app 4. monitor safety: monitor financial accounts, set up fraud alerts, change login/passwords for all online accounts, stay cognizant of physical safety

in terms of digital officer safety, what is not considered best practice?

using one device for work and personal use and avoiding VPNs/proxy networks

if your data has been compromised, what should you do?

1. report: report incident to agency or another agency capable of investigating cybercrime 2. determine the threat: determine what info was exploited, seriousness of threat, and point of compromise 3. remove info: work w/ law enforcement to remove info from website/app 4. monitor safety: monitor financial accounts, set up fraud alerts, change login/passwords for all online accounts, stay cognizant of physical safety

examples of credit bureaus

Equifax, Experian, TransUnion

doxing (blended-attack strategy affects law enforcment on a personal level when persp exploit and/or harass family members and friends)

act of publicly releasing a person's identifying info: 1. full name 2. dob 3. phone numbers 4. pictures typically retrieved from social networking site profiles

Plainview Project

collects/posts Facebook comments made by current/former law enforcement officers that they feel have undermined public trust

The _________________ provides a checklist of things that you can do rn to defend your cyerself against hackers, scams, malware, and other cyber attacks

cybercrime support network

_____ _____________ compile comprehensive information from government and public records, such as court filings, real property, telephone directories, recorded liens and mortgages, marriage and death records, retailers, and social media platforms

data brokers

credit freezes/fraud alerts

do free credit check at annualcreditreport.com next, start freezing credit and setting up fraud alerts (check, freeze, set up alerts)

______________ is the act of publicly releasing a person's identifying information (PII), including full name, date of birth, address, phone numbers, and pictures typically retrieved from social networking site profiles.

doxing

How to be safe on social media

follow strict privacy settings maintain strong passwords utilize secure networks

effects of spoofed/fake accounts

how fake social media accounts can affect your: personal: 1. ruin personal reputation 2. destroy family relationships 3. destroy personal relationships professional: 1. getting you fired 2. having criminal charges filed against you 3. create risk of being sued investigative (how it can affect your investigations): 1. misleading info 2. disinfo

what is considered personally identifiable information (PII)?

name, SSN, street address

Opting Out

one way to begin removing personal info is to ID and verify sites where personal data is provided and follow opt-out procedures (of top data aggregator sites)

what is a digital footprint?

one's unique set of digital activities, actions, and communications that leave a data trace on the Internet or on a computer or other digital device and can identify the particular user or device

Digital Footprint

one's unique set of digital activities, actions, and communications that leave a data trace on the internet or on a computer/other digital device and can ID the particular user or device

Data Brokers

personal info can be collected and exposed on the internet through these (Family tree now, spokeo, and white pages) routinely compile comprehensive info from government and public records like court filings, real property, telephone directories, etc. -info from brokers is sold/provided for free to anyone with an Internet connection, and info may be out of date or innacurae

PII

personally identifiable info: -name: full name, maiden name, mothers maiden name, alias -personal identification numbers (passport number, SSN, drivers license #, taxpayer id #, patient ID #, financial account/cc number) -address info -asset info (IP, Media Access Control (MAC) address or other host-specific persistent static identifier that consistenly links to a particular person or small, well-defined group of people -telephone #s -personal characteristics like a photo image (x-rays, fingerprints, biometrics, voice signature) -info ID personally owned property, vehicle regi # or title #) -birth, race, religion, weight, activities, geographical indicators, employment info, medical info, education info, financial info) (info about an indiviudal linked to the above info)


Ensembles d'études connexes

Chapter 28 Head-to-Toe Assessment

View Set

Adult Health II Quiz 2: Heart Failure / Infectious & Inflammatory Cardiac Disorders

View Set

Ch. 8: Commercial Property Insurance

View Set

AP Euro Chapter 16 correct answers

View Set

Steps In Pre-Service Procedure, Basic Table Setup

View Set