.

Friday, April 26, 2019

Identity theft through the use of the internet and how businesses and Literature review

identicalness thieving through the use of the internet and how businesses and people are affected by its continuous threats - Literature review moralIn the end, the mission critical data is compromised, resulting in severe losses for organizations. Generally, the business functions and processes, which exist electronically and digitally within the organization needs to be protected. The people who use Internet, provides a lot of person-to-person information on the Internet in order to perform banking, registration, subscription, purchasing a product or service. The personal information has enormous dimensions to get extracted and become vulnerabilities. One of the most common threats in the mise en scene of misusing personal information is individualism thieving A network dictionary demonstrate the concepts of identity operator theft as Identity theft is a crime in which an imposter obtains key pieces of personal information, much(prenominal) as Social Security or drivers l icense numbers, in order to position some one and only(a) else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. In order to protect identities of the customer, organization need to protect and address identities. A good definition of identity management is illustrated in the network dictionary as Identity Management is an integrated system of business processes, policies and technologies that enable organizations to facilitate and control their users access to critical online applications and resources age protecting confidential personal and business information from unauthorized users. In the code of deferral regulations (CFR), identity theft is defined as a fraud that is conducted by using the identity information of another(prenominal) person without permission. Identity theft can alike contribute to other crimes. For instance, identify theft is undefeated in document fraud, b ank fraud, immigration fraud and in the form of burglary and robbery. Consequently, the challenges for eliminating identity theft including victimization, pique and prosecution rates, needs to be considered by the congress, as these threats are arising by the contribution of identity theft and related crimes (Finklea 2009). Online privacy policy is of great concern, when considering identity theft as privacy policies of some websites does not satisfy the users for disclosing their personal data. There is no undertaking from the website owner for securing the contents provided by the user online. This is one area, which needs research and improvement, in order to provide a mechanism of securing data privacy, policies that are apply by web services to ease privacy concerns associated with information related to their clients and adhere to legislative measures. Moreover, this also involves the undertaking for personal data usage including, what organizations would do or not with the p ersonal information of their clients. This is polar as some websites may sell personal information of their clients to cyber criminals or other competitors in hurt of cash. This personal information is substantial for online cyber criminals to extract and guess passwords and retrieve credit card numbers, once they break of serve into the email account of users. In order to eliminate identity theft appropriate measures are required. Identity theft is categorized into two domains i.e. Physical identity theft and

No comments:

Post a Comment