Term Paper on "Internet Vulnerability in Today's Fast Paced"
Term Paper 4 pages (1376 words) Sources: 4 Style: MLA
[EXCERPT] . . . .
Internet VulnerabilityIn today's fast paced Internet society, there is great risk for consumers in terms of the loss of their personal identity, their loss of privacy, and fraud. With each online transaction, email, blog posting, and online search for information, consumers open themselves for a variety of criminal action against them, often unwittingly. In addition to the criminal activities practiced online, there are several legal, yet questionable activities by a variety of companies and even the government that can endanger one's privacy and identity (Rheingold, 186). While the Internet certainly introduces several privacy and identity theft issues, however, informed consumers can protect themselves against such losses.
This paper discusses the vulnerability of citizens and consumers in terms of Internet transactions, examining both criminal activities as well as legitimate, yet privacy endangering activities. In addition, this paper will discuss ways in which consumers can protect themselves against such activities. Through this examination, this discussion can assist consumers in avoiding the possible problems related to Internet communications.
One major problem in relation to internet usage is identity theft. According to the U.S. Department of Justice, identity theft can be thought of as "all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain" (USDOJ, online). Identity theft can often involve the theft of one's bank account, credit card, telephone calling card, and social security numbers, as well as other identifying data. This t
download full paper ⤓
In the current era, the Internet has become a primary area of concern in relation to identity theft. For criminals looking to gain personal information, the Internet provides a wealth of opportunity through online shopping, stored personal information, online banking, and even through chat rooms and other forms of interactive communication. Often, unknowing consumers provide information directly to criminals without even being aware.
One technique criminals use involves a form of fraudulent email called 'phishing'. Phishing, also called carding or brand spoofing, uses fake emails claiming to come from legitimate companies and banking institutions, such as Citibank, eBay, PayPal, Best Buy, and other companies. The message often includes company logos, standard formatting, and disclaimers. Often, the emails include a link to a website, and ask the recipient to log into the website and 'confirm' personal information such as account numbers, passwords, and credit card numbers. However, the link provided in the email takes consumers to a fraudulent website, where tracking programs log information entered by consumers, and send the information to the criminal individuals (Bielski, 9).
Another method of identity theft involves hacking, or the illegal breach of a company's database information to obtain stored customer files. Criminals can locate loopholes in particular ISP's, or Internet Service Providers, and obtain access to stored consumer credit cards, account numbers, social security numbers, addresses, and other information. This can then be used to authorize illegal bank transactions, credit card transactions, obtain loans, and even reroute associated paperwork. Such identity theft, according to some researchers, affects 20% of consumers (Bielski, 9).
While identity theft by the criminal population is an issue when accessing websites, there is also risk even in storing personal information on home computers. Certain computer programs, easily hidden in fraudulent emails and website downloads, can contain Trojans and viruses that open a system to hackers. Once in the system, these individuals can then access any personal information stored on the system which contain user names and passwords, as well as banking information and other personal data (Sinrod, 16).
A recent study revealed over 90% of broadband users sampled had computer systems infected with Spyware. Spyware, a common term in today's society, is software that appears on a system through websites and downloaded files, and tracks online behavior. Results of this tracking… READ MORE
Quoted Instructions for "Internet Vulnerability in Today's Fast Paced" Assignment:
Write an informative essay about the vulnerability of the average citizen to invasion of privacy, identify theft and fraud (phishing expiditions, for example) as a result of our dependence on Internet banking, commerce, shopping, etc.
Disinformocracy by Howard Rheingold
(Challeging Perspectives by Deborah H. Holdstein) P182-192
Have to have clear thesis statement.
How to Reference "Internet Vulnerability in Today's Fast Paced" Term Paper in a Bibliography
“Internet Vulnerability in Today's Fast Paced.” A1-TermPaper.com, 2006, https://www.a1-termpaper.com/topics/essay/internet-vulnerability-today-fast/3997749. Accessed 5 Oct 2024.
Related Term Papers:
Adolescent's Awareness and Their Lack of Implementing Term Paper
ADOLESCENT'S AWARENESS and THEIR LACK of IMPLEMENTING INFORMATION SECURITY and ONLINE PRIVACY REGULATIONS of (82525) 83436
AN ANALYTICAL ASSESSMENT of ADOLESCENT'S AWARENESS and THEIR LACK of IMPLEMENTING INFORMATION SECURITY and… read more
Term Paper 40 pages (11261 words) Sources: 30 Style: APA Topic: Computers / IT / Internet
Aetiology and Management of Cancer Understanding Essay
Aetiology and Management of Cancer
Understanding the aetiology and management of cancer in Biopsychosocial perspective
Cancer is one of the most common diseases in the world today and unfortunately, there… read more
Essay 15 pages (4918 words) Sources: 15 Topic: Disease / Virus / Disorder / Injury
Data Capture via SSL & https Decryption Dissertation
SL/https De-Encryption
SSL/https is widely used as is generally considered to be a secure method of encryption for the transmission of sensitive information across the Internet. But… read more
Dissertation 63 pages (17577 words) Sources: 47 Topic: Computers / IT / Internet
Country Report of India Research Paper
Globalization and National Differences in Political Economy
India is in the process of transforming from a developing country to a developed one. In spite of dire problems such as overpopulation,… read more
Research Paper 10 pages (3446 words) Sources: 1+ Topic: Asian History / Asia
Risk Management and Analysis Process and Policy Before Technology Research Proposal
released by the FBI and the Computer Security Institute (CSI), over 70% of all attacks on sensitive data and resources reported by organizations occurred from within the organization itself. Implementing… read more
Research Proposal 65 pages (17274 words) Sources: 40 Style: MLA Topic: Computers / IT / Internet
Sat, Oct 5, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!