Security And Loss Prevention Course Work

Published: 2021-06-22 00:43:57
essay essay

Category: Education, Students, Students, Internet, Crime

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
Security and Loss Prevention
The first step will be reviewing the school’s security controls over computer operating system and networks. This is because most identity thieves steal personal information from computer networks by hacking, diverting personal emails to obtain individuals’ emails and using malware programs to steal information. Secondly I will interview university staff to identify potential identity thieves among them. As much as there may be strong security controls around computer systems, they will not deter identity thieves within the organization. Recent studies show that more than fifty percent of identity frauds occur in the victims’ workplace by fraudulent employees who steal credit card numbers, social security card numbers and other important information from their co-workers . Lastly I will interview the University professors on their awareness of how to detect and prevent identity fraud. Their level of awareness is important in assessing their risk of falling victims of identity theft.
It is difficult to completely stop identity theft because the culprits always come up with new ways of beating established anti-identity theft measures. However, the possibility of its occurrence can be minimized. Some of measures that can be taken to minimize identity theft include keeping computer operating systems and networks fully protected against security vulnerability and frequently performing system scans with up-to-date antivirus software to protect against malware and hacking . School professors should be advised not to divulge personal information to strangers unnecessarily. They should shred all documents that contain personal information such as bank statements, as soon as they are done with them. It is also advisable to directly log onto websites rather than using links provided on emails. Lastly, all incidents of identity theft should be reported to the Federal Trade Commission and at to the police so that the culprits are prosecuted. This will act as a deterrent to prospective offenders. Identity theft is a criminal offence under the Identity Theft and Assumption Deterrence Act of 1998. For example in Fort Worth, Texas, an identity thief, Billy Coat, was sentenced to 25 years in prison for identity theft in 2007 .
References
Hoffman, S. K., & McGinley, T. G. (2009). Identity theft: a reference handbook (revised ed.). Chicago: ABC-CLIO.
Loberg, K. (2008). Identity theft: how to protect your name, your credit and your vital information-- and what to do when someone hijacks any of these. New York: Silver Lake Publishing.
Vacca, J. R. (2003). Identity theft (illustrated ed.). New York: Prentice Hall Professional.

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read