1,633
28
Essay, 3 pages (750 words)

Identity theft notes

??? Privacy is dead ??“ Get over it.???-What is the internet??? A basic and requirement for almost every consumer in the western culture to have.??? A computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange.??? A worldwide network of computers that can be accessed via the TPL computer network.

The Internet allows local computer users to find and use information resources on computers of other academic institutions, research institutes, private companies, government agencies and individuals.??? Is a network of networks joining together. Millions of public, private, academic, business, and government are all linked together sharing and providing each other with information essentially forming one big archive of data.??? 400 million people have alliance to either facebook or myspace. oAdvantages on the internet??? Communication:??? Can communicate with anyone anywhere in the world in a matter of a fraction of a second.

??? Send mail electronically (email) / replaced letters in majority of cases.??? See each other (webcam).??? Online chat rooms available to keep in contact with instant conversations with friends, relatives and even meet new people.??? Information:??? Internet??™s biggest advantage.??? Replaces libraries and books.

??? Up to date almost instantainiasly 24/7 worldwide. oRisks of using the internet??? Companies are hired to watch what you browse / visit on your computer and infiltrate the information to push advertisement based on your history.??? Search engines have the ability to track user searches. Information and topics on which are searched can be used to get a rough idea on the type of person is using it. This data is stored to help the company provide better services.??? Because of social networking such as facebook and myspace excessive amounts of personal data such who they are, where they live, pictures of themselves, birthdays, age, relationship status and what they up to is spread across the internet on a daily basis.

??? Having a consistent connection whether it is online or offline leads into social, anger and commonly depression issues.-Internet PrivacyoWhat is it??? Internet privacy is the desire or approval of personal data spread across the Internet.??? Involves the control in which the data is used / revealed and stored.??? Keeps one??™s personal data safe from identity theft. oIdentity theft??? Crime where people impersonate someone else.??? Mainly done for a financial gain.

??? Physical personal data is required such as social security numbers, signatures, names, phone numbers, addresses, banking and credit card information.??? With personal information gathered inline the thief could apply for loans or even new credit card accounts.??? No matter how the information is obtained the outcome is always the same.??? Disclosing a breach can harm an investigation. oRights??? The key information for identity theft is your social security number.??? A company has a six day gap before having to disclose to the public / consumers that the data has been breached.

??? Californias disclosure law doesn??™t play a role if the data is encrypted. oHow does it happen??? More ways of identity theft pop up every day.??? Key loggers, email spoofing, chat rooms, network hacking, Trojan horses, replica websites designed to trick the user into filling out / login with there legitimate data.??? Once a thief has data, computers are used to make a false identification, counterfeit checks and other documents to commit fraud. oWhat can be done??? No matter who you ask, the first thing they will say is to minimise the risk.??? Make sure you understand the extent of which your data is being stored / security and the exact intended uses before disclosing information??? Make sure the requested information is relevant. ??? Keep facebook and myspace privacy settings to only friends.

Although you can still work around these settings it is helpful to minimise personal information and photos on the Internet all together. oPublic example:??? PlayStation Network Breach??? Quotes: o??? Well, the bad guys are targeting in the cloud services, that??™s becoming clear. We??™re seeing a lot of events like this as of late where the bad guys are able to get in and compromise services and get the information that might be stored by these kinds of services. This Sony one is yet another incident in a long line that have happened over the last six months.??? – Lloyd Borrett??? What happened??? How did they handle itoOver a week later, Sony has exposed minimum information about the intrusion holding customers back from protecting themselves from identity theft, not informing them if there credentials have / had been stolen.

oSony Refused to disclose the data and extent of the breach. oCompanies get a high praise coming cleaning with the type of data and information stolen if it is done straight away. Not just a little bit of information but a lot. Sony failed.??? Customer rightsoAffected people should have been alerted straight away.??? How were they protected??? Legal battleoSony Hasn??™t broken any laws.-Recommendation. oSummary of identity theftoSummary of overall internet protectionoRecommendationhttp://arstechnica. com/gaming/news/2011/04/sonys-black-eye-is-a-pr-problem-not-a-legal-one. ars

Thank's for Your Vote!
Identity theft notes. Page 1
Identity theft notes. Page 2
Identity theft notes. Page 3
Identity theft notes. Page 4
Identity theft notes. Page 5

This work, titled "Identity theft notes" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Identity theft notes'. 4 October.

Reference

AssignBuster. (2022, October 4). Identity theft notes. Retrieved from https://assignbuster.com/identity-theft-notes/

References

AssignBuster. 2022. "Identity theft notes." October 4, 2022. https://assignbuster.com/identity-theft-notes/.

1. AssignBuster. "Identity theft notes." October 4, 2022. https://assignbuster.com/identity-theft-notes/.


Bibliography


AssignBuster. "Identity theft notes." October 4, 2022. https://assignbuster.com/identity-theft-notes/.

Work Cited

"Identity theft notes." AssignBuster, 4 Oct. 2022, assignbuster.com/identity-theft-notes/.

Get in Touch

Please, let us know if you have any ideas on improving Identity theft notes, or our service. We will be happy to hear what you think: [email protected]