Verified Document

Increased Need For Information Security Essay

Identity Theft in Modern Society Identity Theft Report Prep

The topic chosen by this student is "Identity Theft in our Contemporary Society." The reason the author chose this is because it is a topic that is becoming more and more prevalent as even major organizations like Target and TJX, among others, have been victimized over the recent years. It applies to the author's life as well as everyone else's because the only way that anyone can avoid being the victim of identity theft is to be a financial hermit and never use credit cards or any things that could hit a credit profile and that is basically impossible. Even if it were possible, even children are having their Social Security Numbers stolen and used for electricity bills or even credit accounts. Quite often, the perpetrators of this and other identify crimes are the victim's own families. This topic is universal and this is important to the author of this report because it can affect anyone….young or old, man or woman, rich or poor…or even alive or dead.

This report would cover who is affected by identity theft, how it commonly comes to pass, why it seems to be happening more and more, why information security experts are unwilling or unable to take the proper steps, whether there are enough information security professionals in the college pipelines of America and other places to keep people's information safe for years to come and how certain industries in particular are much more vulnerable than others including the medical field, any industry or businesses that warehouses credit and personal data due to business necessity and so forth. Some basic research argues that the cat is out of the proverbial bag and being able to corral said proverbial cat is easier said than done, presuming it is possible in the first place. For those that offer solutions to the problem as well as prevention tips, those will be explained and enumerated in depth as well.

Thesis

While it does not represent the physical death and...

It seems like so long ago when the TJX wireless data breach went down but not much seems to have been improved since then. Even with the rapid advancements in technology and computing power, there still seem to be some massive lapses in judgment and performance as even firms like Target, Nieman Marcus and eBay are being exposed to civil or even perhaps criminal liability due to their actions and inactions. Beyond that, there seems to be no limit to who theoretically would engage in such behavior and what places can be targeted. It can be as fairly minor as a nurse with no medical need to know looking at a celebrity's medical chart and it can be as expansive and wide-ranging as the fairly recent breach that involved Sony Online Entertainment.
Further, as noted in the topic summary, this is something that has or could affect everyone on some level or another. So much of life is centered on one's credit profile and whether it is in good sorts or not. These parts of life include securing a lease of an apartment or business building, financing a car, financing a home purchase, getting a credit card, getting a debit card, getting a bank account or getting utilities for a home or apartment turned on. Obviously, there is a price to be paid for careless behavior as it pertains to credit cards but when a person is victimized and has their credit scarred due to no fault of their own, it can literally change and hamper their lives in demonstrable ways.

Annotated Bibliography

Anderson, K. (2006). Who…

Sources used in this document:
This report is more philosophical in that it asks whether identity theft is really theft. They justify this analysis by saying that many of the concepts of identity are more abstract than tangible and this means that the questions should be asked.

TIGTA: Identity theft protection needs improvements. (2013). Journal of Accountancy, 216(4), 77-78.

This final source points to the fact that the IRS has gotten a lot better at detecting theft including false tax filings and frequently Social Security Number activity.
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Security Management
Words: 549 Length: 2 Document Type: Essay

Security Management Information Security Management Managing the information security at a major university is never an easy task, and especially with a team of only ten the complexities and the resource demands can sometimes make the situation seem all but impossible even on the best of days. When the former head of information security management suddenly departs as the result of an FBI arrest -- and when that arrest stems from the

Information Security
Words: 3704 Length: 10 Document Type: Research Proposal

Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we

Information Security
Words: 2352 Length: 8 Document Type: Term Paper

Security An institution of higher learning is one of the most vulnerable places to cyber-attacks available to hackers due to the number of units operating, lackadaisical security measures and the ability of hackers to hide in plain sight. The fact that these are vulnerable systems and individuals has made it a top priority of most institutions to ensure that the people who attend the school at least have a policy

Information Security Model and Cyber Terrorism
Words: 2900 Length: 10 Document Type: Capstone Project

goals of this study are to reveal some of the common and prevailing cyber security threats. Here we plan to explore the risk that is most difficult to defend: social engineering. We seek answers to the human elements and characteristics that contribute to the frauds and how they themselves unwittingly give out information that eventually leads to difficult situations. There are many ways in which the attackers 'phish' their

Information Security and Security
Words: 1820 Length: 12 Document Type: Research Paper

Honeypot and Honeynet Emerging Technologies In the present IT environment, individuals and businesses are becoming more dependent an open network that includes the Internet where business transactions, government services and commercial activities are realized. However, the use of open network has led to the development of new information security issues and cyber threats that are being utilized by the cyber criminals. Thus, a mistrust in computer network technologies and telecommunications

Information Security Ethical Situation
Words: 1200 Length: 4 Document Type: Essay

Ethical Scenario Ethics is a term used to refer to the set of rules that help in determining right and wrong behavior during moral decision making. One of the major issues in Information Technology and Information Systems is computer ethics. This is primarily because the rapid technological advancements seem to enhance the likelihood of unethical use of computer devices and information systems. As these advancements continue to occur, it is expected

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now