Saturday, May 11, 2019

Understanding the dangers of identity theft and how a company or Essay

rationality the dangers of individuality theft and how a company or individual can be protected from it - endeavor ExampleAs advancement in technology made access to training easier, many unprincipled people take advantage of their skills and deal sensitive development from companies and private persons online. According to the Identity stealth Resource Center, a non-profit organization based in the United States (www.idtheftcenter.org), in 2010, there were about 662 cases if information security breaches reported in the United States but the actual number whitethorn be higher(prenominal) since not many people and organizations report breaches on their information security governing body. People whose personal identity micturate been assumed by some another(prenominal) can suffer tremendous loses. Note that once somebody steals another persons identity, he or she may be able to access the bank accounts and other personal information of the victim (Abagnale, 2007). As it is, there is a big possibility that the victim may lose money and assets on the process. Aside from taking money and other assets from their victims, some identity thieves call the identity of their victims to commit crimes (Cullen, 2007). For instance, an identity theft can sue the identity of his or her victim in fraudulent online transactions so when the fraud is reported to the police, the police go after the identity theft victim. As it is, it is very important that individuals and organizations understand the kind of risks that they are in and do something to protect themselves from identity thieves. II. Ways and Means Employed by Identity Thieves to Gain Access to Important Information in that location are a number of ways to commit identity theft but the most super acid are social engineering, phishing and hacking attempts. Social engineering is committed by exploiting human psychology to gain gate to databases, computer systems and even buildings with sophisticated s ecurity system (Hadnagy, 2010). Note that instead of attacking the software or system used by a company or individual, the identity theft uses mind tricks to remember sensitive information for the people inside the building and the people who are running the databank or the system (Hadnagy, 2010). To get the information that he or she needs to gain access into the building or the database, the identity does a lot of research and identify the key persons who he or she will retrieve the needful information (Wilhelm, 2010). For instance, if the identity theft wants to gain access to a database, he or she may mock up as a computer technician or IT support person and trick an employee in the IT division to reveal passwords and codes to gain access into the system. Although the basic principles of trickery used in social engineering may heavy(a) simple, the execution of the act requires careful planning and psychological manipulation skills (Mitnick, 2003 Allsopp, 2009). When plannin g its strategies to defraud his or her victim, the identity needs to gather all the necessary information to trick the victim. To do this, he or she may access the personal information of the person targeted using existing social networks such as typebook, link up in and others (Mitnick, 2003 Wilhelm, 2010). Note that a good number of users of these online networking sites tend to give out personal information such as e-mail addresses and even tele send for numbers online which may them relatively easy preys for identity thieves (Wilhelm, 2010). From the information gathered from these social networking sites, the identity may now be able to psychologically fix the victim into giving him or her sensitive information. In most cases, the deception happens online or through the phone so the identity theft and his or her victims do not actually come face to face (Allsopp, 2009). Aside from social engineering, phishing is also commonly used by identity thieves to steal information fro m their victims. To steal information from their victims, identity theft pretends to be a reliable online entity such as a bank, a well known courier, website and the like (Abagnale, 2007).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.