Identity Theft First Of All, Term Paper

PAGES
4
WORDS
1334
Cite

The system that Networks Update critiques is IMAG ("Identity Managed Access Gateway") by Apere, Inc. The way it works is by an innovative way of permitting or denying access to applications that are critical to a business; the IMAG systems knows who should and who should not have access to those critical files and applications because it has "auto discovery capabilities" that immediately click into place when any attempt is made to enter into privileged files.

But what makes this system unique - in an IT world that already has firewalls and other seemingly effective preventative measures - is that, according to the Mark Rhodes-Ousley, author of the book Network Security, The Complete Reference, IMAG automatically creates and manages "...access policies based on all sources of identity information in the network," and avoids wasteful use of IT resources "for manual network access provisioning and policy management."

While the future success of innovations like IMAG is positive and hopeful but yet to be proven, there are other ongoing efforts to come up with ways to safeguard identity security for individuals. One of those efforts is the new research center - the Center for Identity Management and Information Protection - being developed at Utica College (Kiernan, 2006). According to the Chronicle of Higher Education, the center is necessary because - in the words of Thomas Longstaff, deputy director for technology at the center - there are some viable research projects ongoing and run by experts, but they're "few in number and widely scattered."

Said Longstaff: "We desperately need coordination." The executive director of the center, Gary R. Gordon, calls the center a "clearinghouse for research conducted by others" who are working on identity theft issues. The center will "shed light on practices and technologies that could block identity theft from happening in the first place," said Gordon. The annual budget at the start of the center's operation is only $500,000 - half of which comes from federal grants and the rest from two corporate sponsors, LexisNexis and IBM.

There are three academic partners as well (none of which will provide funds for the center),...

...

The article, by Vincent Kiernan, reports that "outsiders" may well have gained access to Social Security numbers and other personal information of nearly a quarter of a million students. One of those schools is Western Illinois University - where a hacker apparently accessed credit card numbers and Social Security information for 240,000 "current or former students." And at the University of Kentucky, a "thumb drive" (portable device) - which stored 6,500 Social Security numbers - was stolen from a faculty member.
And so, while law enforcement reports that a very small amount of stolen identity information is actually used by the thieves who hacked through firewalls and into protected files, it must also be emphasized that having any personal business information accessed by unknown interlopers is placing those violated at great risk.

Works Cited

Congress Daily. (2006). Reid Becomes Victim Of Identity Theft. Retrieved 29 August, 2006 from http://www.congressdaily.com.

Foust, Dean; & Ryst, Sonja. (2006). ID Theft: More Hype Than Harm. Business Week, Issue

3991, p. 34-36.

Kiernan, Vincent. (2006). New Center at Utica College will Study Identity Theft. Chronicle of Higher Education, 52(45).

Kiernan, Vincent. (2006). Two Incidents Put More Than 200,000 Students at Risk of Data Theft.

Chronicle of Higher Education, 52(43).

Networks Update. (2006). Apere Launches IMAG Security Appliance. Retrieved 29 August, 2006 from Worldwide Videotex /

http://www.marketresearch.com.

Sources Used in Documents:

Works Cited

Congress Daily. (2006). Reid Becomes Victim Of Identity Theft. Retrieved 29 August, 2006 from http://www.congressdaily.com.

Foust, Dean; & Ryst, Sonja. (2006). ID Theft: More Hype Than Harm. Business Week, Issue

3991, p. 34-36.

Kiernan, Vincent. (2006). New Center at Utica College will Study Identity Theft. Chronicle of Higher Education, 52(45).
http://www.marketresearch.com.


Cite this Document:

"Identity Theft First Of All " (2006, August 29) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/identity-theft-first-of-all-71566

"Identity Theft First Of All " 29 August 2006. Web.26 April. 2024. <
https://www.paperdue.com/essay/identity-theft-first-of-all-71566>

"Identity Theft First Of All ", 29 August 2006, Accessed.26 April. 2024,
https://www.paperdue.com/essay/identity-theft-first-of-all-71566

Related Documents

When a Social Security number is stolen, contacting the Social Security Administration can help to place a watch on its use as well (SSA 2009). This particular problem can lead to many complications, as obtaining a new Social Security Number can create many difficulties for the victim while keeping the old number might allow the thief to continue using the victim's identity (SSA 2009). Generally, though, a new number

Identity Theft Corp (ITC) is a new company specializing on the identity theft service. The company assists customers to monitor their credit report in order to identify any suspicious charge. The company will also provide the leg work to clean up the mess left behind because of the identity theft and assist customers to rebuild their credits. The objective of this proposal is to provide strategic planning and implementation for Identity

Identity Theft III Identity Theft Clean-Up and Credit Monitoring Product Solutions for the United States Market Product Description Proactive Solutions Reactive Solutions Target Market Market Analysis Potential Market Growth In previous reports various aspects of a new market expansion for a credit monitoring and other related services would be introduction crossed borders from the corporate headquarters in Canada into the United States. The move into the United States marketplace represents a new market expansion that represents an incredible

Identity Theft Is a Crime
PAGES 6 WORDS 2068

Wikipedia.org/wiki/Identity_theft. Hoar, Sean B. Identity Theft: The Crime of the New Millennium (2001). U.S. Department of Justice. Retrieved March 20, 2007 at http://www.cybercrime.gov/usamarch2001_3.htm. Has some clown taken over your good name? (2004). The Police Notebook. University of Oklahoma Police Department. Retrieved March 20, 2007 at http://www.ou.edu/oupd/idtheft.htm. Thorne, J. And Segal, a. (2006). Identity theft: The new way to rob a bank. CNN online. Retrieved March 20, 2007 at http://www.cnn.com/2006/U.S./05/18/identity.theft/index.html. New technology may increase identity

Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005) Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help

Identity Theft but He That
PAGES 10 WORDS 2933

In one case in 2000, two-20-year-olds hacked into the Lowe's credit card mainframe from a white Pontiac Grand Prix parked outside a store, synching a single laptop to the wireless system that was meant for employees to use to locate products. The hackers, obviously to blame for the crime, played on the flaws of a computer system that should not have allowed for a security breach. While the same hackers