Monday, May 13, 2019

Identity Theft Essay Example | Topics and Well Written Essays - 750 words

identity Theft - Essay ExampleIt has become necessary for people to be adequately educated near the risks involved and the necessary preventive measures. individuality theft is a crime in which an imposter tries to represent to be someone else by means of using some key identification data of the victim. This whitethorn include t remainderer security numbers, credit card numbers etc. When communicating online it becomes even easier to come forth to be someone else since the communication is not face to face but online and the distance between the dickens persons or parties gives advantage to the criminal. The crime may be committed to seek monetary or social or any other form of benefit. Recovery from an identity theft may be easier in certain cases of sm all thefts involving individuals but it may become very grave if reput optioned organizations are victimized and they end up spending large sums in repairing the damage cause to their goodwill (World Privacy Forum, 2012). Th e crime is very change and innovated in the present day. The old-fashioned methods of rummaging through the rubbish bins or picking pockets have been replaced by software, viruses and computer programming scripts. Computer viruses have proved to be efficient ways of committing identity theft in which all possible identity material of any person or organization may be extracted and put to use in another part of the world and the victim remains oblivious to such(prenominal) activities. Identity theft may range from simply posing to be someone else to more lethal actions such as financial identity theft, child identity theft, medical checkup identity theft to seek medical care or drugs while pretending to be someone else or identity cloning in which the criminal assumes the complete identity of a victim in daily life (Compton, 2012). The identity thieves operate online usually work by tricking you into providing your personal information to them through various methods such as phis hing, luring with business opportunities, money scams or fix fraud alerts. Phishing involves an email sent to a victim which redirects him to a fake website where you are required to fill up a signup form with your personal information. Similarly job probability forms are sent and personal information is extracted. Fake fraud alert emails are sent which expect to be legitimate mail from the victims bank. The victim is informed that someone has tried to fraudulently access his bankers bill so he must send certain personal information for verification (Federal Trade Commission, 2006) now the society is very susceptible to falling for such tricks of criminals since the spoofed websites developed by criminals are so like to the original ones that an average person undersidenot identify and differentiate between the real and fake. A simple change of address form may be filled up by someone and the utility bills of the victim will end up somewhere else resulting in nonpayment of a charge and a dark credit report. Furthermore, the personal data commonly available on social networking websites may be used by criminals to communicate with a victims contacts and seek financial benefits while pretending to be him. An ATM or a credit/debit card may be duplicated and money drawn from a victims account. and then it is clear that every individual and organization must educate itself and others about the seriousness of the implications this crime can have. To address the crimes of identity theft, all countries and states

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.