Tuesday, June 11, 2019

Identity theft through the use of the internet and how businesses and Literature review

Identity stealing through the use of the internet and how artes and people atomic number 18 affected by its continuous threats - Literature round ExampleIn the end, the mission critical data is compromised, resulting in severe losses for organizations. Generally, the business functions and processes, which exist electronically and digitally within the organization require to be valueed. The people who use Internet, provides a lot of in the flesh(predicate) selective information on the Internet in order to perform banking, registration, subscription, purchasing a ingathering or service. The personal information has enormous dimensions to get make pureed and become vulnerabilities. One of the most common threats in the context of misusing personal information is identity stealth A network dictionary demonstrate the concepts of Identity theft as Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or drivers licens e numbers, in order to impersonate someone else. The information cannister be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. In order to protect identities of the customer, organization need to protect and manage identities. A good definition of identity management is illustrated in the network dictionary as Identity Management is an integrated system of business processes, policies and technologies that enable organizations to facilitate and control their substance abusers access to critical online applications and resources while protecting confidential personal and business information from unauthorized users. In the code of recess regulations (CFR), identity theft is defined as a fraud that is conducted by using the identity information of another person without permission. Identity theft can also contribute to other crimes. For instance, identify theft is successful in document fraud, bank fraud, immi gration fraud and in the form of burglary and robbery. Consequently, the challenges for eliminating identity theft including victimization, offending and prosecution rates, needs to be considered by the congress, as these threats are arising by the contribution of identity theft and related crimes (Finklea 2009). Online privacy policy is of large(p) concern, when considering identity theft as privacy policies of some websites does not satisfy the users for disclosing their personal data. There is no undertaking from the website owner for securing the contents provided by the user online. This is one area, which needs research and improvement, in order to provide a mechanism of securing data privacy, policies that are implemented by web services to easing privacy concerns associated with information related to their clients and adhere to legislative measures. Moreover, this also involves the undertaking for personal data usage including, what organizations would do or not with the personal information of their clients. This is crucial as some websites may sell personal information of their clients to cyber criminals or other competitors in terms of cash. This personal information is substantial for online cyber criminals to extract and guess passwords and retrieve credit card numbers, once they break into the email account of users. In order to eliminate identity theft appropriate measures are required. Identity theft is categorized into two domains i.e. Physical identity theft and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.