StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Protecting Information Resources - Assignment Example

Cite this document
Summary
Holders should not carry their Social Security Cards in their wallets or purses. Writing one’s social security number on a…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Protecting Information Resources
Read Text Preview

Extract of sample "Protecting Information Resources"

Protecting Information Resources Two examples of a computer crime or fraud include infiltrating computer system and inserting a virus or other pollutant into a computer network.One recommendation for preventing or reducing ID theft is protecting one’s Social Security Card by refraining from carrying it when not necessary. Holders should not carry their Social Security Cards in their wallets or purses. Writing one’s social security number on a cutout paper and putting it in a wallet or purse is just as risky.

Another recommendation is safeguarding one’s PINs. ATM cards, social security cards, online bank accounts, and registration cards have personal identity numbers that on should always secure. A highly discouraged method of securing these numbers is writing them down on cutout papers and keeping them in one’s wallet or purse. Instead, one should memorize one’s PIN to prevent an identity thief from determining it.A third recommendation is analyzing one’s credit releases. To know about possible identity thefts, one should go through his or her credit reports regularly to view transactions, registrations, approvals, and any previous activity on one’s cards or accounts.

Regular analysis hinders potential harm since one detects identity theft promptly.Fourthly, shredding documents with one’s personal information or numbers is a critical and safe way of disposing it. A shredding machine is the simplest, relatively cheap, and best way to safeguard oneself from dumpster divers. One hinders identity thieves from getting personal information from one’s trash by shredding document such as preapproved cards, checks, bank declarations, and deposit slips.Lastly, checking one’s mail early lowers exposure to mail theft.

One can ask the post office to hold your mail when one has traveled for a given period. Also locking the mailbox prevents thieves from accessing mail with personal information.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Protecting Information Resources Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Protecting Information Resources Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/management/1680537-protecting-information-resources
(Protecting Information Resources Assignment Example | Topics and Well Written Essays - 250 Words)
Protecting Information Resources Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/management/1680537-protecting-information-resources.
“Protecting Information Resources Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/management/1680537-protecting-information-resources.
  • Cited: 0 times

CHECK THESE SAMPLES OF Protecting Information Resources

Three-river-sources ecological environment protection

The region's ecological environment has rapidly deteriorated and it is evident that its rivers' water level has been continually dropping; wetlands have been shrinking; some parts of the grasslands have been experiencing degradation and serious desertification; and rare wildlife resources have seriously been threatened (Cheng, 2002).... It sought to evaluate the region's management strategies on how the conflict between protection of the region's ecological environment and exploitation of the natural resources for commercial purposes can be best resolved....
13 Pages (3250 words) Essay

EMR and Other Sources of Sensitive Patient Information

The objectives which are needed to be acquired with the resources in hand.... ‘Access control to system resources': Issues related to controlling the physical devices as well as logical mechanism including computer programs (Barrows & Clayton, 1996).... Electronic medical records incline to be a part of the system of healthcare information which facilitates storage, repossession and alteration of the records.... hellip; What security policies and systems are in place to prevent unauthorized access to the EMR and other sources of sensitive patient information?...
4 Pages (1000 words) Essay

Securing and Protecting Information

Security and protecting information Instructor Institution Date Securing and protecting information Development of information security strategies protecting complex data and information across a wide network while also improving system performance as well as ensuring easy data retrieval when necessary is one of the most challenging tasks in network design (Dhillon, 2007).... The process of securing and protecting information refers to defending data and information from unauthorized access, disclosure, modification, inspection, use or destruction (Layton, 2007)....
3 Pages (750 words) Essay

A Company's Obligations to Protect Customer Information

The paper "A Company's Obligations to Protect Customer information" describes that most regulatory controls fall into three categories viz.... Leak protection tools try to monitor the traffic to identify manage the leakage of information.... Every time there is an online interaction or an online transaction the consumer has to divulge some information to the business that he or she is dealing with.... In certain financial sectors such as banking and insurance, very sensitive consumer information is handled and stored by businesses....
8 Pages (2000 words) Coursework

Lab 1Protecting Human Research Participants

Beneficence – persons are treated in an ethical manner not only by respecting their decisions and protecting them from harm, but also by making efforts to secure their well being.... Naxi experiment during World War II – the degree of harm and suffering to which human beings were subjected were unprecedented that included deadly studies and tortures....
4 Pages (1000 words) Lab Report

The Role of Information Security Policy

information systems security policies are the central repository that protects the assets of an organization by addressing threats.... This has made many organizations… Therefore, an information Systems Security strategy ensures effective procedures as well as assists for information security across the whole organization.... The size and nature of firm normally influences Regardless of all these, the essence for a security policy on information systems is unquestionable....
4 Pages (1000 words) Essay

Business Strategies

In a survey performed by The Conference Board, it turned out that 74 percent of companies had a difficult time protecting information that was confidential and mandatory for the company's existence.... In other words, the security aspect of the business can also be referred to as computer information security, wherein information held by the company is protected from misuse by another.... It goes without saying that rival companies may be interested in the information held by a company and it should be anticipated that cases such as theft of such held information may happen....
16 Pages (4000 words) Coursework

Should Abusive Parents Be Punished or Treated

This essay demonstrates that the argument for punishing abusive parent is controversial and contentious.... We clearly have great consideration for a parent who has endured the unthinkable death of a child, and it is completely proper to take into account that sympathy into a punishment decision… Punishing a parent who has severely abused or abandoned his/her child is one vital mechanism that can both result in the integration of stricter standards or legislation to safeguard children and alter our predisposition to excuse abusive parents....
9 Pages (2250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us