.

Tuesday, May 7, 2019

Identity Theft Essay Example | Topics and Well Written Essays - 1500 words

Identity Theft - try on ExampleIt can start with lost or stolen wallets, stolen mail, a data breach, computer virus, phishing scams etc (ITRC, 2012). In the reliable scenario, inter make is the extensively used medium for much(prenominal) crimes. Hackers globally are carrying show up copious activities to buy the identity of persons for their personal goals or for the interests of some other stakeholders who pay them. Identity theft is too carried out by persons due to their personal rivalries and also by some countries against their rival countries. Many countries are enmeshed in stealing the personal learning of the high level officials of other countries in order to watch over their check on the rivals. When it comes to net income and cyber technologies, tactics like computer viruses, hacking computer networks, obtaining the personal information most the victims from social networking sites and using them to figure out their secret codes, observing the victims typing t heir personal passwords on ordinary systems, abducting their personal information from web browser logs using spywares, installing malwares on the victims computer, credit card cloning etc. are used for identity theft. The prime reason for wherefore net profit identity theft is widely practised by criminals is that they can carry out crimes on some others identity or rifle someones accounts in a safer way such that it will be not very easy to figure out the real culprits or the person whose identity they have used for conducting the crime. Internet has grown in such a way that heap carry out many of their activities like banking, shopping, bill payments etc. through internet. Social networking sites like facebook, twitter, Google rundown etc. have become widely societal that they have emanated as a part of the passing(a) lives of the proletariat. Email has outraged the habit of sending written mails from people. Email is today a vital vogue of sending messages among persons t o organizations to governments. All these have set up a platform for the cyber criminals for their easy patrolling on the net and it has become an easy task for hackers to steal the personal information of others. The Internet Crime Complaint nerve center of FBI has listed out the current and ongoing internet trends and schemes in carrying out cyber crimes. They are-auction fraud, auction fraud-Romania, counterfeit narrators check, credit card fraud, debt elimination, parcel courier email scheme, employment or business opportunities, escrow operate fraud, internet extortion, investment fraud, lotteries, Nigerian letter or 419, phishing or spoofing, ponzi or pyramid, reshipping, spam, third party receiver of funds (Internet Crime Complaint Center, n. d). Kevin J. Connolly (2004, p. 348-49) in his book Internet Security and Privacy describes the privacy rights of internet users and the ways to safeguard their private information. He says the primary worry of a person when he brows es the internet is lack of privacy. Lack of privacy protection can help a stranger to collect information about the consumers activities. The user should be aware about the information provided to a website. User should also be aware of the privacy policies of the websites or online services concerned. Connolly (2004, p. 348-49) points out that users often do not sustentation to go through the privacy notices and

No comments:

Post a Comment