IST 215 Online Scams Discussion

Anonymous
timer Asked: Feb 12th, 2019
account_balance_wallet $60

Question Description

• The final written report should be submitted to the instructor before 11:59PM on March 02 (Saturday), 2019. The report should be professionally written in Word format and in APA style with about 8 double-spaced pages. A cover page is required.

-The report should include the following:

o Introduction

o the practical problems

o the background situations


* i attached the outline that you did for me


1 Running head: IDENTITY THEFT Identity Theft Institutional Affiliation Date IDENTITY THEFT 2 Abstract Cases of identity theft are on the rise throughout the world in today’s competitive world. The primary purpose of this research is to alert and make individuals aware of the meaning of identity theft, how it is happening in today’s world as well as the type of technology been used. How can someone protect themselves from identity theft? Introduction The primary study of this research regards cyber crime’s identity theft. Identity theft is defined as the act of stealing personal details belonging to other people. These include details like credit card details, numbers of social security and date of births. Consumers use the internet to make their transactions easy. In 2007, a news release by Metro said that 9 out of every ten people become victims of identity theft. The research seeks to make an animation website to direct internet users how to make use and install specific tools, technology as well as programs to prevent them from identity theft (Mercuri, 2006). Practical problems Criminals use technologies like phishing e-mails as well as liberate effective virus to many people using the internet to get their personal identities (Litan, 2004). However, there are ways that consumers can use to protect themselves from being harmed by the activities of these criminals. They can effectively use ways like Anti-virus software, avoid cookies that are unnecessary, delete unnecessary emails and stop giving the identities in instant messaging. In recent days, online fraud has greatly increased every day because of criminals having access to people’s identities. IDENTITY THEFT Background situations Identity theft is quickly spreading in the UK, the USA as well as other parts of Europe. Each day, an individual becomes a victim of such a theft. This is because the internet plays a significant role in global communication. For example, in the United States, every company, student, bankers and solicitors make use of the internet as a form of communication to make the work they do quick, easier, more reliable as well as practical. 3 IDENTITY THEFT References Litan, A. (2004). Phishing attack victims likely targets for identity theft. Mercuri, R. T. (2006). Scoping identity theft. Communications of the ACM, 49(5), 17-21. 4
1 Running head: IDENTITY THEFT Outline Institutional Affiliation Date IDENTITY THEFT Abstract: Cases of identity theft are on the rise throughout the world in today’s competitive world. The primary purpose of this research is to alert and make individuals aware of the meaning of identity theft, how it is happening in today’s world as well as the type of technology been used. How can someone protect themselves from identity theft? Introduction Practical problems Background situations 2 IDENTITY THEFT References Litan, A. (2004). Phishing attack victims likely targets for identity theft. Mercuri, R. T. (2006). Scoping identity theft. Communications of the ACM, 49(5), 17-21. 3

Tutor Answer

Marrie
School: University of Maryland

Attached.

Running head: IDENTITY THEFT

1

Identity Theft
Name
Institution

IDENTITY THEFT

2
Abstract

Cases of identity theft are on the rise throughout the world in today’s competitive world. The
primary purpose of this research is to alert and make individuals aware of the meaning of identity
theft, how it is happening in today’s world as well as the type of technology being used to
perform the fraud. The paper also looks into various ways through which identity theft can be
prevented. The paper is organized in three main parts:
The introduction, which briefly describes the main points discussed in the body of the research;
Practical problems, which highlights some examples of techniques used by hackers to steal other
people’s identities and lastly, Background situations, which explains the causes and impact of
identity theft, using examples.

IDENTITY THEFT

3
Introduction

The primary study of this research regards cyber crime’s identity theft. Identity theft is
defined as the act of stealing personal details belonging to other people. These include details
such as credit card details, numbers of social security and date of births. Consumers use the
internet to make their transactions easy. In 2007, a news release by Metro alleged that 9 out of
every ten people become victims of identity theft. The research seeks to make an animation
website to direct internet users how to make use and install specific tools, technology as well as
programs to prevent them from identity theft (Jakobsson & Myers, 2006).
Practical Problems
Criminals use technologies like phishing e-mails as well as liberate effective virus,
targeting many people using the internet so that they can get their personal identities (Jakobsson
& Myers, 2006). However, there are strategies that consumers can use to protect their private
data from being accessed to these criminals. They can effectively use measures like Anti-virus
software, avoiding unnecessary cookies, avoiding strange emails and keeping their identities
secret. In recent days, online fraud has greatly increased because of the technological abilities of
the hackers. The following are examples of hacking techniques used to obtain private data of
people by cybercriminals, and how they can be prevented.
Email Spam
Spam attack refers to the technique used by hackers to access personal data of people, by
sending fraudulent emails which upon opening, enables the cybercriminals to obtain details such
as secret passwords. In order to prevent the attackers from obtaining private data of users such as

IDENTITY THEFT

4

passwords, usernames and credit card information, users should be extremely careful about
opening strange emails that they receive (Bilge et al., 2009). They should be trained to
distinguish between trustworthy and spam messages. There are also websites that publish
messages or sources of messages that have been flagged as spam so that the users know which
ones they need to avoid. For instance,...

flag Report DMCA
Review

Anonymous
Thank you! Reasonably priced given the quality not just of the tutors but the moderators too. They were helpful and accommodating given my needs.

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors