Term Paper on "Internet Vulnerability in Today's Fast Paced"

Term Paper 4 pages (1376 words) Sources: 4 Style: MLA

[EXCERPT] . . . .

Internet Vulnerability

In today's fast paced Internet society, there is great risk for consumers in terms of the loss of their personal identity, their loss of privacy, and fraud. With each online transaction, email, blog posting, and online search for information, consumers open themselves for a variety of criminal action against them, often unwittingly. In addition to the criminal activities practiced online, there are several legal, yet questionable activities by a variety of companies and even the government that can endanger one's privacy and identity (Rheingold, 186). While the Internet certainly introduces several privacy and identity theft issues, however, informed consumers can protect themselves against such losses.

This paper discusses the vulnerability of citizens and consumers in terms of Internet transactions, examining both criminal activities as well as legitimate, yet privacy endangering activities. In addition, this paper will discuss ways in which consumers can protect themselves against such activities. Through this examination, this discussion can assist consumers in avoiding the possible problems related to Internet communications.

One major problem in relation to internet usage is identity theft. According to the U.S. Department of Justice, identity theft can be thought of as "all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain" (USDOJ, online). Identity theft can often involve the theft of one's bank account, credit card, telephone calling card, and social security numbers, as well as other identifying data. This t
Continue scrolling to

download full paper
heft can result in unauthorized bank withdrawals, credit transactions, and even loans, vehicle purchases, and other high priced debts that the consumer is unaware are being created. Ultimately, these types of identity theft issues result in large out-of-pocket expenses, not only to pay off unauthorized debt, but also in legal fees, fines, late fees, and other associated payments (USDOJ, online).

In the current era, the Internet has become a primary area of concern in relation to identity theft. For criminals looking to gain personal information, the Internet provides a wealth of opportunity through online shopping, stored personal information, online banking, and even through chat rooms and other forms of interactive communication. Often, unknowing consumers provide information directly to criminals without even being aware.

One technique criminals use involves a form of fraudulent email called 'phishing'. Phishing, also called carding or brand spoofing, uses fake emails claiming to come from legitimate companies and banking institutions, such as Citibank, eBay, PayPal, Best Buy, and other companies. The message often includes company logos, standard formatting, and disclaimers. Often, the emails include a link to a website, and ask the recipient to log into the website and 'confirm' personal information such as account numbers, passwords, and credit card numbers. However, the link provided in the email takes consumers to a fraudulent website, where tracking programs log information entered by consumers, and send the information to the criminal individuals (Bielski, 9).

Another method of identity theft involves hacking, or the illegal breach of a company's database information to obtain stored customer files. Criminals can locate loopholes in particular ISP's, or Internet Service Providers, and obtain access to stored consumer credit cards, account numbers, social security numbers, addresses, and other information. This can then be used to authorize illegal bank transactions, credit card transactions, obtain loans, and even reroute associated paperwork. Such identity theft, according to some researchers, affects 20% of consumers (Bielski, 9).

While identity theft by the criminal population is an issue when accessing websites, there is also risk even in storing personal information on home computers. Certain computer programs, easily hidden in fraudulent emails and website downloads, can contain Trojans and viruses that open a system to hackers. Once in the system, these individuals can then access any personal information stored on the system which contain user names and passwords, as well as banking information and other personal data (Sinrod, 16).

A recent study revealed over 90% of broadband users sampled had computer systems infected with Spyware. Spyware, a common term in today's society, is software that appears on a system through websites and downloaded files, and tracks online behavior. Results of this tracking… READ MORE

Quoted Instructions for "Internet Vulnerability in Today's Fast Paced" Assignment:

Write an informative essay about the vulnerability of the average citizen to invasion of privacy, identify theft and fraud (phishing expiditions, for example) as a result of our dependence on Internet banking, commerce, shopping, etc.

Disinformocracy by Howard Rheingold

(Challeging Perspectives by Deborah H. Holdstein) P182-192

Have to have clear thesis statement.

How to Reference "Internet Vulnerability in Today's Fast Paced" Term Paper in a Bibliography

Internet Vulnerability in Today's Fast Paced.” A1-TermPaper.com, 2006, https://www.a1-termpaper.com/topics/essay/internet-vulnerability-today-fast/3997749. Accessed 5 Oct 2024.

Internet Vulnerability in Today's Fast Paced (2006). Retrieved from https://www.a1-termpaper.com/topics/essay/internet-vulnerability-today-fast/3997749
A1-TermPaper.com. (2006). Internet Vulnerability in Today's Fast Paced. [online] Available at: https://www.a1-termpaper.com/topics/essay/internet-vulnerability-today-fast/3997749 [Accessed 5 Oct, 2024].
”Internet Vulnerability in Today's Fast Paced” 2006. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/internet-vulnerability-today-fast/3997749.
”Internet Vulnerability in Today's Fast Paced” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/internet-vulnerability-today-fast/3997749.
[1] ”Internet Vulnerability in Today's Fast Paced”, A1-TermPaper.com, 2006. [Online]. Available: https://www.a1-termpaper.com/topics/essay/internet-vulnerability-today-fast/3997749. [Accessed: 5-Oct-2024].
1. Internet Vulnerability in Today's Fast Paced [Internet]. A1-TermPaper.com. 2006 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/internet-vulnerability-today-fast/3997749
1. Internet Vulnerability in Today's Fast Paced. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/internet-vulnerability-today-fast/3997749. Published 2006. Accessed October 5, 2024.

Related Term Papers:

Adolescent's Awareness and Their Lack of Implementing Term Paper

Paper Icon

ADOLESCENT'S AWARENESS and THEIR LACK of IMPLEMENTING INFORMATION SECURITY and ONLINE PRIVACY REGULATIONS of (82525) 83436

AN ANALYTICAL ASSESSMENT of ADOLESCENT'S AWARENESS and THEIR LACK of IMPLEMENTING INFORMATION SECURITY and… read more

Term Paper 40 pages (11261 words) Sources: 30 Style: APA Topic: Computers / IT / Internet


Aetiology and Management of Cancer Understanding Essay

Paper Icon

Aetiology and Management of Cancer

Understanding the aetiology and management of cancer in Biopsychosocial perspective

Cancer is one of the most common diseases in the world today and unfortunately, there… read more

Essay 15 pages (4918 words) Sources: 15 Topic: Disease / Virus / Disorder / Injury


Data Capture via SSL & https Decryption Dissertation

Paper Icon

SL/https De-Encryption



SSL/https is widely used as is generally considered to be a secure method of encryption for the transmission of sensitive information across the Internet. But… read more

Dissertation 63 pages (17577 words) Sources: 47 Topic: Computers / IT / Internet


Country Report of India Research Paper

Paper Icon

Globalization and National Differences in Political Economy

India is in the process of transforming from a developing country to a developed one. In spite of dire problems such as overpopulation,… read more

Research Paper 10 pages (3446 words) Sources: 1+ Topic: Asian History / Asia


Risk Management and Analysis Process and Policy Before Technology Research Proposal

Paper Icon

released by the FBI and the Computer Security Institute (CSI), over 70% of all attacks on sensitive data and resources reported by organizations occurred from within the organization itself. Implementing… read more

Research Proposal 65 pages (17274 words) Sources: 40 Style: MLA Topic: Computers / IT / Internet


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!