Thursday, June 20, 2019

Computer Crime & Identity Theft Essay Example | Topics and Well Written Essays - 2750 words

computer Crime & Identity Theft - Essay ExampleFor the purposes of this paper, the crabby computer crime will be concentrated in the area of identity theft and the impact it has both mortalally and economically on the someone and society. What is Identity Theft? The encyclopedic definition of identity theft is the use of another persons identity, i.e. financial, personal, geographic or another source, to commit histrion or other types of misrepresentation. By utilise another persons social security number, drivers license number, date of birth, address, online information one may open bank accounts, pass for loans and credit cards, get a cell phone and so on. In addition to financial loss that can result from identity theft, by using anothers identity the credit history and even the legal history of the victim can be damaged in the extreme. (Identity Theft, 2007) harmonise to the Identity Theft and Assumption Act of 1998, identity theft (ID theft), occurs when someone is knowi ngly transferring or using, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, in the unlawful activity that constitutes a violation of federal law. It is a federal crime. (Alt, 2007, p. 67)Until recently all Computer Crime was difficult to prosecute for a number of reasons. One of the biggest problems is that large companies often refuse to publicize their involvement when someone has hacked into their system and stolen data or damaged programs and information. By revealing that their systems have been compromised a company may subject itself to a loss of consumer confidence and potentially lose many clients, depending on the product or service they offer. The company may also be subjected to lawsuits from clients who claim that there was no due diligence performed as regards the security of their information. It is estimated that surrounded by twenty-five and fifty percent of all business have experienced some sort of intrusion or breach of security of their computer networks.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.