StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Understanding the dangers of identity theft and how a company or individual can be protected from it - Essay Example

Cite this document
Summary
As advancement in technology made access to information easier, many unscrupulous people take advantage of their skills and steal sensitive information from companies and private persons online…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Understanding the dangers of identity theft and how a company or individual can be protected from it
Read Text Preview

Extract of sample "Understanding the dangers of identity theft and how a company or individual can be protected from it"

?Understanding the Dangers of Identity Theft and how a company or individual can be protected from it I. Introduction As advancement in technology made access to information easier, many unscrupulous people take advantage of their skills and steal sensitive information from companies and private persons online. According to the Identity Theft Resource Center, a non-profit organization based in the United States (www.idtheftcenter.org), in 2010, there were about 662 cases if information security breaches reported in the United States but the actual number may be higher since not many people and organizations report breaches on their information security system. People whose identity have been assumed by another can suffer tremendous loses. Note that once somebody steals another person’s identity, he or she may be able to access the bank accounts and other personal information of the victim (Abagnale, 2007). As it is, there is a big possibility that the victim may lose money and assets on the process. Aside from taking money and other assets from their victims, some identity thieves use the identity of their victims to commit crimes (Cullen, 2007). For instance, an identity theft can sue the identity of his or her victim in fraudulent online transactions so when the fraud is reported to the police, the police go after the identity theft victim. As it is, it is very important that individuals and organizations understand the kind of risks that they are in and do something to protect themselves from identity thieves. II. Ways and Means Employed by Identity Thieves to Gain Access to Important Information There are a number of ways to commit identity theft but the most common are social engineering, phishing and hacking attempts. Social engineering is committed by exploiting human psychology to gain entry to databases, computer systems and even buildings with sophisticated security system (Hadnagy, 2010). Note that instead of attacking the software or system used by a company or individual, the identity theft uses mind tricks to retrieve sensitive information for the people inside the building and the people who are running the databank or the system (Hadnagy, 2010). To get the information that he or she needs to gain access into the building or the database, the identity does a lot of research and identify the key persons who he or she will retrieve the needed information (Wilhelm, 2010). For instance, if the identity theft wants to gain access to a database, he or she may pose as a computer technician or IT support person and trick an employee in the IT division to divulge passwords and codes to gain access into the system. Although the basic principles of trickery used in social engineering may sound simple, the execution of the act requires careful planning and psychological manipulation skills (Mitnick, 2003; Allsopp, 2009). When planning its strategies to defraud his or her victim, the identity needs to gather all the necessary information to trick the victim. To do this, he or she may access the personal information of the person targeted using existing social networks such as facebook, linked in and others (Mitnick, 2003; Wilhelm, 2010). Note that a good number of users of these online networking sites tend to give out personal information such as e-mail addresses and even telephone numbers online which may them relatively easy preys for identity thieves (Wilhelm, 2010). From the information gathered from these social networking sites, the identity may now be able to psychologically manipulate the victim into giving him or her sensitive information. In most cases, the deception happens online or through the phone so the identity theft and his or her victims do not actually come face to face (Allsopp, 2009). Aside from social engineering, phishing is also commonly used by identity thieves to steal information from their victims. To steal information from their victims, identity theft pretends to be a reliable online entity such as a bank, a well known courier, website and the like (Abagnale, 2007). Phishing is usually done through emails and online instant messages which carries a replica of the design and logo of the company that the identity theft is supposed to represent (Abagnale, 2007; Cullen, 2007). For instance, an identity them may use the logo and designs of paypal in an email to capture the passwords of some unsuspecting clients. Once the clients click on the link provided in the email, they will be diverted to another site which look similar to paypal. Since the site look legitimate to the unsuspecting eye, many clients automatically type their password into the page to open their accounts. The keystrokes of the victims are monitored by the identity theft so he or she now gains access to the paypal account of the victim. Another commonly used method of stealing identity is through computer hacking. This method of getting sensitive information from unsuspecting people online has been a major problem for many companies and individuals for the past several years (Street, 2010). Computer systems that are connected to the internet are the most vulnerable to hackers (Street, 2010). The most common approaches to computer hacking are network enumeration, vulnerability analysis and exploitation (Street, 2010). Network enumeration is a way of gathering information about the operations of the intended targets to make it easier for the theft to hack into the system and steal important information (Street, 2010). Vulnerability analysis, on the other hand, work by scanning the computer network for possible weaknesses which can be exploited to gain access into the system (Street, 2010). There are different types of tools that are used by hackers to gain access into the system, namely, vulnerability scanners, port scanners, packet sniffers, password crackers, rootkits, social engineering, keyloggers, viruses, worms, Trojan horses and others (Wilhelm, 2010). These tools can be used independently or may be used in combination with each other. For instance, vulnerability scanners and port scanners are usually used by hackers to gain entry into the system by using the weaknesses that are inherent in the system itself. Once the identity theft accesses the system, it may use a rootkit to conceal the breach in the system. Note that rootkits are designed to blend into the background and it can take on any program form to hide itself in the system so it is often difficult for most people to spot this type of bug (Blunden, 2009). Moreover, some sophisticated rootkits are designed to subvert standard computer security to prevent itself from being discovered and removed from the system (Blunden, 2009). III. Computer Security and the Laws Punishing Identity Theft In an era where people rely on computers to transact business from all over the world, having a secure computer network is very important. At present, there are a number of ways for individuals and companies to protect themselves from identity thieves. There are a number of anti-virus and anti-malware software available online and most of these software are quite reliable (Cullen, 2007). Companies, establishments, government agencies and other organizations that keep records of its costumers and members now use strong encryption to protect the personal information stored in its databank (Cullen, 2007). Also, there are some companies that require the use of biometric information to identify the users of their system (Cullen, 2007). However, although the use of biometrics is one way of effectively thwarting identity thieves, this technology has its limitations so we cannot really be hundred percent sure that the system is foul-proof (Cullen, 2007). Aside from software and security measures that are used to deter identity thief, there are many laws that protect individuals and companies from identity thieves. In the United Kingdom, the Data Protection Act 1998 punishes people and organizations that knowingly and unlawfully transfer or use information for any purposes. Other countries like the United States, Canada, France and others also have their own laws and regulations regarding identity thief. Yet, despite the many security measures employed by individuals and organizations to protect the integrity of their system, there are still instances when hackers and thieves find their way inside the system and steal important information. Note that even the strongest computer network security system can still be compromised. This only shows that in one way or another, we are all vulnerable to identity thief so we need to be eternally vigilant to prevent any untoward incidents. IV. Conclusion Identity thief is a problem that may not go away in the near future. As individuals and organizations strengthen their defenses against social engineering, phishing, hacking and other illegal activities that are used discover sensitive and personal data, identity thieves are also constantly looking for ways to steal personal information and use this information to their advantage. Given this situation, we all need to take extra precautions in storing personal information especially when we are connected to the internet. Setting up firewalls and installing anti-virus software is very important especially when you have sensitive information stored in your computer. Aside from using firewalls and anti-virus, it is also very important to be careful when it comes to selecting password for your files. References 1. Abagnale, F. W., 2007. Stealing Your Life: The Ultimate Identity Theft Prevention Plan. Broadway Books 2. Allsopp, W., 2009. Unauthorised Access: Physical Penetration Testing For IT Security Teams. 1st ed. Wiley 3. Blunden, B., 2009. The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System. 1 ed Jones & Bartlett 4. Cullen,T., 2007. The Wall Street Journal. Complete Identity Theft Guidebook: How to Protect Yourself from the Most Pervasive Crime in America (Wall Street Journal Identity Theft Guidebook: How to Protect). Three Rivers Press 5. Hadnagy, C., 2010. Social Engineering: The Art of Human Hacking. 1st ed. Wiley 6. Mitic, S., 2009. Stopping Identity Theft: 10 Easy Steps to Security. 1st ed. NOLO 7. Mitnick, K., 2003. The Art of Deception: Controlling the Human Element of Security. 1st ed. Wiley 8. Street, J., 2010. Dissecting the Hack: The F0rb1dd3n Network, Revised Edition. Revised Ed. Syngress. 9. Welsh, A., 2004. The Identity Theft Protection Guide: Safeguard Your Family Protect Your Privacy Recover a Stolen Identity. 1st ed., St. Martin’s Griffin 10. Wilhelm, T., 2010. Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques. Syngress Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Understanding the dangers of identity theft and how a company or Essay”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1411965-understanding-the-dangers-of-identity-theft-and-how-a-company-or-individual-can-be-protected-from-it
(Understanding the Dangers of Identity Theft and How a Company or Essay)
https://studentshare.org/environmental-studies/1411965-understanding-the-dangers-of-identity-theft-and-how-a-company-or-individual-can-be-protected-from-it.
“Understanding the Dangers of Identity Theft and How a Company or Essay”, n.d. https://studentshare.org/environmental-studies/1411965-understanding-the-dangers-of-identity-theft-and-how-a-company-or-individual-can-be-protected-from-it.
  • Cited: 0 times

CHECK THESE SAMPLES OF Understanding the dangers of identity theft and how a company or individual can be protected from it

Online Identity Theft: The Crime of the Future

No other theft can be accomplished quite as easily as online identity theft; no names, no faces, and no fingerprints left behind. … This classification of theft is becoming a largely recognized and yet troublingly unstoppable crime that is actually increasing in occurrence rather than the other way around, even though certain prevention methods are beginning to be taken against it.... In order to truly understand the crime of online identity theft, the following points must be thoroughly discussed:What electronic/online identity theft isWhat the problems are that are associated with online identity theft, and why it has been possibleWhat the prevention methods - past, present and future - are, and how they have (or how they will) work to deter against the surging epidemical crime of online identity theft....
34 Pages (8500 words) Essay

Identity Theft and Retail Shopping

One of the primary dangers being confronted is the issue of identity theft and information mining being conducted on reputable as well as questionable sites (Wolfinbarger & Gilly, 2003).... identity theft and related offenses such as credit card fraud, spamming, phishing, hacking and viruses are problems that affects everyone who uses a computer or relies on an organization that does so.... A proactive approach must be taken toward identity theft and these This begins with understanding the various reasons why this problem remains relatively under-appreciated and what drives some people to engage in this sort of activity....
11 Pages (2750 words) Research Paper

Strategic Capabilities of UAE Police to Combat Card Fraud

Credit Card Fraud is a species of payment card fraud, defined thus: "Payment card fraud is a generic term used to describe a range of offences involving theft and fraudulent use of payment card account data.... The various types of credit card fraud and the manner by which they are carried out are related, The various methods and techniques by which credit crime fraud is countermanded or mitigated are also presented, pursuant to the theory of situational crime prevention from the viewpoint of the individual, business firms, and the crime enforcement authorities....
80 Pages (20000 words) Essay

Credit Card Fraud Issue

Credit Card Fraud is aspecies of payment card fraud, defined thus: "Payment card fraud is a generic term used to describe a range of offences involving theft and fraudulent use of payment card account data.... The various methods and techniques by which credit crime fraud is countermanded or mitigated are also presented, pursuant to the theory of situational crime prevention from the viewpoint of the individual, business firms, and the crime enforcement authorities....
80 Pages (20000 words) Essay

The Terms Which Are Important for Lawyers

To obtain a patent the creation has to be new; has to involve an original step; has the capability of being applied industrially; So computer programs can be protected by patent indirectly if they are part of an application which includes other elements patentable in their own right.... Such can be when there is a mistake, insanity, intoxication or compulsion while performing the act.... Several of the crimes cause wrong or harm and so can be called torts....
16 Pages (4000 words) Assignment

Economic Change Effect Frauds

In addition to, still amid those that are noticed, a great figure of cases would never be accounted, permitting them to stay concealed from the public eye.... We inquired peoples to contrast the stage of fraud they meet up throughout the 12 months previous the review (from near the beginning 2008 throughout early on 2009) to the figure of frauds they have seen or practiced in former years.... To obtain a pulsation on how the economy is touching fraud tendencies, the ACFE left to the professionals who are in the ditches hostility fraud on an everyday basis....
16 Pages (4000 words) Research Paper

Victimization of People in Power

This research paper "Victimization of People in Power" presents the combination of identity theft and similar crimes that result in the victimization of influential and rich people that has taken the shape of an epidemic despite the existence of laws for controlling this menace.... According to a study, the maiden name of a mother can be located through search procedures that are relatively easy and the information acquired in this manner is more than perfect (Schreft 2007, p....
16 Pages (4000 words) Research Paper

Database Security Controls

This paper is about a database as a collection of data that is stored in large disks and units and can be accessed easily with the help of software.... As new software is present with innovative technology for a database, the risk to secure the data from malicious sources is also a prime concern of the administration and the IT Department of any organization (Natan, 2005; Loch & Carr, 1992).... However, we can see that with all the changes and innovations, the risk on security of the databases is a new challenge and constant concern for everybody in our time....
12 Pages (3000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us