Premium Essay

Ways to Prevent Online Identity Theft

In: Computers and Technology

Submitted By dalcant
Words 611
Pages 3
Ways to Prevent Online Identity Theft

Danilo V. Alcantara

Information Assurance – ISSC361

American Military University
Gary Rogers - Instructor

Ways to prevent online identity theft

Identity theft rates one of the fastest growing crimes in America today and the Internet can make it even easier for some criminals to take someone’s good name and drag it through the mud (J. Edwards, 2010). It involves criminals stealing personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out someone’s bank accounts (J. Edwards, 2010). Through financial liability with owner’s credit cards maybe limited to $50 to $500, it can take years for someone to clean up the mess online identity thieves leave behind (J. Edwards, 2010). As with any crime, an ounce of prevention may just cause the would-be identity thieves to leave someone alone and move on to an easier target (J. Edwards, 2010). First Subtopic – Cyber Education Detail – Describe computing devices capable of connecting to World Wide Web Detail – Describe the world of internet Detail – Usefulness of internet

Second Subtopic – Password Protection

Detail – Never share password or pin to anyone Detail – Never write password Detail – Create passwords difficult to break Detail – Change password often

Third Subtopic – E-mail Safety Detail – Never share personal information Detail – Do not open e-mails from unknown senders Detail – Beware of e-mail scams Detail – Use e-mail filtering software and other program’s security features Detail – Use secure messaging

Fourth Subtopic – Network Security Detail – Use of Firewall Detail – Use of Anti-virus Detail – Use of Adware, Malware and Spyware Detail – Keep Internet Browser up-to-date

Fifth...

Similar Documents

Free Essay

What Is Identity Theft

...Identity Theft and Technology http://idpromed.com/identity-theft/ http://idpromed.com/identity-theft/ Research Paper Computer Structure and Logic NT1110 Tenisha Copeland May 20, 2014 What is Identity Theft? Identity theft is when someone takes someone’s personal information such as their name, birthdate social security number, banking information, driver’s license number and other information to commit fraud or other crimes. In earlier times people had to go in your wallet write down your information, which may have taken more time and effort. These days I would like to say that 85% of identity theft happens with computers. Computers are fast making it easier to trick people into getting their information with techniques such as phishing, hacking, shoulder surfing, spam and dumpster driving. Many people today probably will say with all the new technology rapidly progressing, it makes it easier for people to steal their information. Although this may be true there are three ways to protect you and your information. Two-Step Verification Today many internet users think that having just that one password for all their online accounts is idea to remember or have quick access. Although this may be a good technique it is also dangerous and easier for a hacker to get your information. Two-step verification is just an extra step to protect you when logging in by requiring you to enter your password and then an additional password. Some websites will ask you to enter...

Words: 905 - Pages: 4

Premium Essay

Identity Theft and Fraud

...credit card in there wallet, everything else should put inside a safe. Always monitor the bank statement and etc. Checking the mail for missing account statements is another way to protect from identity theft and fraud. If someone going on vacation that person should ask the post office to hold all their mail until that person came back, to prevent identity theft and frauds. People should invest in a shredder to shred unwanted information. Use a secure website to access information, never enclose personal information by the phone. Check bank statement and credit card statement very careful each month to see any unwanted purchase. If that person sees any unwanted purchase notices their credit card immediately. Thesis: One day you receive a call from your bank, stating you had just made a purchase for a random estimate of 5,000 dollars. But you did not go on a shopping spree. Your identity just has stolen. How secure is your identity? Do you ever wonder about your identity? Ways to prevent/protect yourself from identity theft and frauds. I. One thing you should be aware about is your bank account. A. Once your ATM has been compromises change your pin right away. B. Get new ATM cards if it has been compromised. C. Contact the bank if you see any suspense in your bank account. I. Another way is keeping your social security secure in a safe. A. Do not write your Social Security card piece of paper. B. Do not give out your personal information to......

Words: 2515 - Pages: 11

Free Essay

The Threat of Fraud

...The Threat of Fraud Tracey Brewer American InterContinental University Security and Loss Prevention CRJS270-1301B-01 Jade Pumphrey March 28, 2013 Abstract Identity theft, whether on a personal or business level is a criminal act. So, for many years individuals have plotted and schemed to come up with scams to obtain personal information from other individuals or organization to either sabotage one’s reputation or obtain financial gain. Either way, this wave of criminal activity is wreaking havoc to innocent people and successful organizations everywhere. The Threat of Fraud Introduction Corporate fraud and executive identity theft are crimes that are on the rise. I don’t think corporations understand the impact this crime can have on their business. It only takes a few measures to ensure that the company is protecting against someone being able to access information that could bring the entire corporation to the ground. It can takes years to establish credit, build clientele and provide a service to the country or a community, however, it can only take the click of a mouse, that one email attachment or that one dishonest employee and your entire businesses financial data has been obtained, used or sold for the sole purpose of financial gain. Therefore, to protection your organization’s personal information. Well, it’s time to get the facts, take the necessary precautions, and start the process for what could be the first steps in protecting your......

Words: 1599 - Pages: 7

Premium Essay

Case Study 2

...1. What types of technology could big retailers use to prevent identity thieves from purchasing merchandise? Big retailers should implement a secure authentication technology to protect themselves from identity thieves or any other unauthorized persons making purchases. Authentication should be layered, utilizing two or more factors, consisting of something the authorized user knows, something they physically have, and/or something they “are” or biometrics (Baltzan, 2012). Some multi-factor authentication technologies include security tokens (hard or soft), mobile authentication (including digital certificates), and biometric means (finger print, facial recognition) (Rouse, n.d.). 2. What can organizations do to protect themselves from hackers looking to steal account data? In order to protect themselves and account data from hackers, organizations should, first, ensure that employees are trained and educated on the information security plan and that information security policies are in place and strictly enforced (Baltzan, 2012). Secondly, the organization should utilize prevention and resistance technologies such as “content filtering, encryption, and firewalls” (Baltzan, 2012, p. 151). 3. Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and read people’s email? Why or why not? Ethics are relative to one’s culture and societal norms. Therefore, when the members...

Words: 547 - Pages: 3

Free Essay

Identity Theft

...Identity Theft: Fastest Growing Crime Tracy A. Baggett DeVry University Keller Graduate School of Management Identity Theft; Fastest Growing Crime Imagine waking up to news that you had accumulated hundreds of thousands in debt after someone used your identity for unauthorized purchases. This is exactly what happened to John Harrison, a Connecticut salesman. Jerry Phillips, the twenty year old who stole John Harrison’s identity went on a shopping spree that included purchases to Home Depot, JC Penny, Sears, Lowes and even bought two cars from Ford, a Kawasaki and a Harley. In just four months Jerry Phillips was able to accumulate $ 265,000 in purchases. Jerry Phillips was later arrested and imprisoned for three years. He even went as far as to apologize to John Harrison saying, “Sorry. You know, I wish I could make it up to you.” John Harrison felt that the nightmare was over with the criminal behind bars and even verbally acknowledging his regret over the crime. But despite all of this and a letter from the Justice Department confirming that John Harrison was a victim, he still found himself owing $140,000 to different creditors. How about waking up in the middle of the night realizing that federal agents just entered your home with guns pointed certainly qualifies as one of the most horrifying ordeals in anyone’s life. This is exactly what happened to Carlos Gomez, a UPS driver accused of being involved in a million dollar money laundering operation headed by a......

Words: 3754 - Pages: 16

Premium Essay

Identity Theft and Protection of Ppi

...Identity theft is one of the fastest growing crimes in the United States. From empty bank accounts to ruined credit reports, there are numerous ways that an identity thief could hurt you. While identity theft is not new, the advent of the internet has given thieves new ways of using your personal data as their own for their benefit. According to Javelin Strategy and Research (2014), in 2013, over l3 million people were victims of some type of identity fraud. This showed an increase of more than half of a million people becoming victims. Considering the fact that more and more of our lives involve the internet through social media, online banking, and online shopping, it is up to us to protect ourselves while using online resources so that our information stays safe. Identity theft occurs when thieves use a victim’s personal or financial information to obtain money from the victim. This can happen in multiple ways. One of the more common ways criminals can steal your identity is by sending phishing emails. These emails pose as a retailer or bank and ask you for personal information such as your username and password or credit card information. Some emails provide a link that redirects the user to a fake login page. When the victim enters their information, it is captured and used to take over the victim’s online banking page or Amazon account. To prevent this, it is important for people to recognize the stop signs of a fraudulent email. Firstly, be wary of any email that......

Words: 1277 - Pages: 6

Free Essay

Mgt 426 Week 2 Team Assignment

...technology come new challenges. One of those new challenges is identity theft. Identity theft can happen through the internet, ATM, emails, or even a phone. Identity theft can happen when any person(s) takes an individual’s information, such as their Social Security number, or even banking information for financial gain. “Close to 100 million Americans have their personal information placed at risk of theft each year when records in databases are lost, stolen or accessed by unauthorized individuals” (Information systems and technology, n.d.). Identity theft not only costs the person, whose identity is stolen, time and money but also costs the banking industry time and money. There are so many ways that thieves can access your information whether it is your credit cards, savings accounts or checking accounts. Banks spend countless hours trying to find the most ways to fight and prevent identity theft. Banks must constantly update their computer software and use programs that will not only send red flags to the banks but will also block the use of the information or cards. Team B has chosen to see what changes SunTrust Bank needs to make to combat identity theft or improve on what is already in place. Continuous Versus the Discontinuous Changes SunTrust Bank currently offers 24 hour around the clock monitoring for identity thief. To provide additional identity theft protection, SunTrust has partnered with the Identity Theft Assistance Center (ITAC), a non-profit agency that......

Words: 1442 - Pages: 6

Premium Essay

Nt1110

... Identity Theft “But he that filches from me my good name/ Robs me of that which not enriches him/ And make me poor indeed.” Shakespeare, Othello, Act 3 Scene 3 For as long as people have created civilizations there has been some sort of identity theft. Identity theft is when someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, usually for economic gain. Your name, birth date, address, Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data can be used, for identity theft if they were to fall in the wrong hand, for personal profit at your expense. That bad part is that in the past it was not even a crime. In October 30, 1998 through the enactment of the Identity Theft and Assumption Deterrence Act of 1998, 18 USC & 1028 (a) (7). This Act states that identity theft occurs when a person: “knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law.” There are several ways a thief can steal your identity. And there are also just as many way to prevent it too. Here are some ways thieves steal your identity and ways to prevent them. Your identity can be......

Words: 1213 - Pages: 5

Premium Essay

Identity Theft in Online Business

...…...1 2. Theory and Concept……………………………………………………….…. .3 3. Key Findings……………………………………………………………………..4 3.1 Issues of Online Identity Theft …………………………………………...4 3.2 Trends of Online Identity Theft……………………………………………5 4. Case Study………………………………………………………………………..7 4.1 Background…………………………………………………………………..8 4.2 Analysis……………………………………………………………………….8 5. Recommendations and Conclusions……………………………………..…9 Executive Summary Identity theft make a lot of customers and organisations suffer serious loss both financially and emotionally. It is necessary to build acknowledge of identity theft to protect the interest of customers and organisations. This report finds the different methods and trends of identity theft and gives some advices for protection. A case study of TJX breach case shows the harm of identity theft in an organisation. 1. Introduction The internet technology has greatly changed the world in which human live since 1990s. Nowadays, internet has gone deep into people’s daily life and its high productivity, efficiency and convince make people deeply rely on it. Online business and social network have become the most important contributions of internet. As the growth of e-commerce and number of users of social networking websites, the target of identity theft has broadened. In e-commerce, identity theft threats not only the customers’ information and property safety but also the interest of corporate. On the social......

Words: 2731 - Pages: 11

Free Essay

Internet Fraud

...system of networks which emerged from the research was known as the "Internet. (2) The Internet is constantly developing, becoming a greater power each day and it has affected our world in various negative and positive ways. The internet serves as an important data base worldwide. It is the greatest source of information, news, entertainment, education and even local and global interactions such as sales and trade are performed through the internet making life so much easier and hustle free. Computers are emerging almost in every aspect of our lives usually they are making everything very convenient for us, permitting us to shop from home, research information, work online, and communicate with our friends, family and acquaintances all around the world with speed. As technology continues to improve more benefits and disadvantages start to evolve. Internet access is no longer a luxury but is now a necessity. Although the internet has been a great help it also has a great disadvantage which is the easy access to personal information. Since most if not all organizations and businesses use the internet, their records that hold customers personal information are all available online and with the correct knowledge hackers and thieves make their way into other peoples accounts and...

Words: 1347 - Pages: 6

Premium Essay

Aa Afaff

...Preventing Data Security Breaches And Identity Thefts Information Technology Essay Current online marketing strategies deliver immense benefits to the modern global firm by way of better market reach, cheap and convenient transaction possessing, multiple online payment options and real time consumer data management. Marked benefits are commonly discernible in the area of internet based business-to-business or B2B, and business-to-consumer or B2C e-commerce models. These online commerce models rely on digital marketing for their success, which in turn in essentially a remarkable success of information technology and data management techniques. However, the growth of digital marketing is getting severely affected by the misuse of technology by criminals and unscrupulous persons in various ways. Such misuse of technology encompasses identity theft, data loss and other data security breaches. Increasing information security breaches and cases of identity theft in recent times threaten the marketing of products and services either online or offline like never before. This paper attempts to understand issues and outcomes of identity theft, data loss and security breaches on the present and future global marketing environment by examining several secondary sources of information. 2. What is identity theft? We can help you to write your essay! Professional essay writers Our writers can help get your essay back on track, take a look at our services to learn more about how we......

Words: 3128 - Pages: 13

Free Essay

Crime Theories

...The fast growth of technology is creating more and more threats to our society in a number of ways. It is threatening individuals by letting cybercriminals gain access to sensitive information that can cause harm to innocent people. It is also creating threats to our younger generations that are unable to cope with the high emotions of social media sites. Individuals are being lured by fake profiles or fake people who would do harm to them. Computer crimes are on the rise. Law enforcements and agencies are doing everything they can to prevent the spread of these crimes. They have created special task divisions to protect our society better. New laws have been put to place to protect U.S citizens better. The four categories of crime: the computer as a target, the computer as an instrument, the computer as incidental to a crime, and crimes associated with prevalence of computer show that everyone can fall victim to some cybercrime. The computer as a target The computer as a target in cybercrime is what today’s society fears. Examples that are considered the computer being a target are denial of service attack, data alteration, and intrusion. Denial of service is when cyber criminals deny users to access to a machine or network. An example of this is when Yahoo was hacked into, and users could not open the website for a couple of hours until Yahoo had fixed the issue. Yahoo’s denial of service attack is a great example because it showed society that even big......

Words: 2182 - Pages: 9

Premium Essay

How Identity Theft Affect the Culture of Our Society

...How Identity Theft Affect the Culture of our Society Sections I, II, III and IV Rodrekus Baskin DeVry University How Identity Fraud and Theft Impact the Culture of Our Society Section I Identity theft affects millions of Americans every day. Scam artists and hackers lay in wait for an unsuspecting person to get caught up their scheme through ignorance or naivety so they can take full advantage of their personal information to do as they desire with it. Problem is, it infiltrates and depreciates the integral infrastructure of our society which creates a cultural lapse through the declination of economic and cultural growth and double jeopardizes an already unstable system to the brink of its destruction. To understand how identity theft works or happens, one need to know and understand what identity theft is, the different forms of identity theft, cyber security and the impact on its victims, the methods used by identity thieves to obtain identifying information about their victims, and preventive solutions. How Identity Theft Affect the Culture of Our Society A single mother looking forward to advancing her financial situation comes across what appears to be the opportunity she has been waiting for. A real estate agent has provided her with the fortune of owning her own home and without skepticism of any impending dangers or foul play, even though he displayed what appeared to be proper credentials, she relinquished all of her personal data...

Words: 5785 - Pages: 24

Free Essay

Identity Theft Report

...centuries, the term ‘identity theft’ has meant many things. People have pretended to be other when committing crimes to avoid sentencing. Identities have been stolen in order to obtain certain medical care or drugs that would be unavailable otherwise. In this day and age, identity theft has become synonymous with finances. Thieves all over the world are using various methods to gain access to your money; and they’re more successful at it now than ever before. According to a 2013 Javelin report, 13.1 million people in the United States suffered financially because of identity fraud. According to multiple reports, that number is expected to rise in 2014 and beyond. As we get smarter about how financial identity theft is committed, criminals become smarter about gaining our sensitive information. When we became good about shredding old credits cards and bank statements, they used e-mail and phone schemes to coax us into giving our information to them. Companies invest millions of dollars into new technologies meant to keep criminals out of databases, and criminals simply bypass these obstacles with combinations of cutting-edge and archaic techniques. It’s a vicious cycle that seems to have no end. So how can we as consumers protect ourselves from these identity thieves? Consumers must take a more active role in their financial lives, especially when it comes to online transactions. People often rely on stores and banks to protect their identities online. This is a huge......

Words: 4801 - Pages: 20

Premium Essay

Privacy in the 21st Century

... Outline I. Introduction: In today’s world with the identity theft and fraudulent accounts being created on a daily basis, a person might ask there self if privacy in the 21st century might be possible. People put their privacy in jeopardy without even realizing it by using social networking websites. Social networking is a good tool as long as you use it responsibly by protecting yourself and maintaining security. II. Identity theft defined Ways that thieves steal identity a. Dumpster diving b. Phishing c. ATM Skimmers II. Dangers of social networking a. Stalking/cyber stalking b. Impersonation c. cyber bullying III. Ways to prevent identity theft and maintain security a. Monitor credit report with fraud alert b. Do not share personal information c. Shop on websites with secure seal d. Use privacy settings on social network cites IIII Conclusion In today’s world with the identity theft and fraudulent accounts being created on a daily basis, a person might ask there self if privacy in the 21st century might be possible. People put their privacy in jeopardy without even realizing it by using social networking websites. Social networking is a good tool as long as you use it responsibly by protecting yourself and maintaining security. Identity theft is a form of stealing someone’s identity in which someone pretends to...

Words: 650 - Pages: 3