Underline Information Security

Improved Essays
In the article, “All It Takes To Buy A Stolen Password On The Internet Is 55 Cents”, it indicates how simple it is to hijack someone’s entire digital identity. There was a report done by Intel Security Group's McAfee Labs which found an online streaming video that provides login credentials that could be bought for only fifty-five cents. The report investigated the world of buying and selling stolen digital information online. Everything from financial data and online services to a person's entire digital identity can be bought and attained by anyone. These researchers monitored various websites and chat rooms and found out that stolen credit card information is sold for five to eight dollars for a basic U.S. card number and twenty-five to …show more content…
This issue with hackers obtaining peoples’ accounts and credit card numbers violates the confidentially principle. I recently learned that achieving the goal of confidentiality means that only appropriately authorized entities can get access to resources. Without the people knowing, hackers are selling their private information to anyone. Also, with the hackers having access to the account, they can change the information, and the potential for extensive financial harm rises dramatically for the victim. This now becomes an integrity problem, because the whole goal of integrity is the prevention of unauthorized alteration of data regardless of accidental or malicious intent. This article caught my eye because very recently, my mother told me that her credit card information had been stolen. She mentioned that her credit card had been declined when she was trying to buy something at a store. She was very confused as to why that happened because she rarely ever uses her credit card; she usually only uses her debit card. So she called her credit card company and they told her that there was a charge for $500 for circus tickets. At the time, I did not realize how easy it is for someone to obtain such private information. After reading this article, I now know that anyone can buy that information if they really wanted to, and many people, like my mother, are potential targets for these crimes. And this does not just apply to bank accounts and credit card information, this could be anything that you have on your computer. Cyber criminals can program viruses that attack your computer. These viruses can delete documents on a computer, or an attacker could pretend to be someone else and obtain information from you over the

Related Documents

  • Improved Essays

    First of all, hackers are people who use the internet to gain access to other people’s private information with a malicious intent. They will attack innocent people and take their information for many reasons. Davis says that their behavior is anonymous and unethical. Identity theft is a form of hacking where people steal important information such as social security numbers, identification numbers, and credit cards. They can…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    People that buy products or services online need to feel that their financial and personal information they have given to businesses is secure. Legal consequences of data privacy breaches: A company that stores personal data on their computers systems have a legal obligation to keep that data secure. If personal data is stolen during a cyber-attack and the company can be show to have been negligent in terms of keeping the personal data secure. Then the company could face prosecution under the Data Protection Act and receive a large fine. Malware With these the attacker can use malware to gain or change data malware is software specifically designed to gain access or damage a computer without the user from knowing there are various types of malware such:…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Identity theft can occur when unauthorized people gain access to confidential and sensitive records. Data loss is a major…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Massive amounts of data being collected are causing extremely high risks of identity theft. When…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Data breach has been rising in the United States and in other countries as well, leaving customers vulnerable to identity theft. Customers also can get their credit history damaged. Thousands of people are affected by this situation more frequently when they make their purchases online as well as in the stores when using credit cards. Since the use of credit cards is the most convenient way to pay for a purchase for customers, scammers take advantage of it to commit their frauds.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    1. Better security iOS 9 will incorporate more password alternatives, and you can choose in what you need to utilize a four-digit numeric code or a custom six-digit numeric code, or a custom alphanumeric code. So it is upto you what is your inclinations. 2. New video controls…

    • 446 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    “A recent Government Accountability Office (GAO) report found the number of information-security incidents in which personal information was involved has more than doubled over the last few years, exceeding 25,000 in fiscal 2013” (“Privacy”). That means that every day there are approximately 68.5 incidents where personal information is stolen from major holders of sensitive data, such as credit card information, social security numbers, and usernames and passwords. So through the use of a virus, bug (a flaw in the software being used), and malware, thieves are able to gain access to…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Fraud Under Section 1030

    • 674 Words
    • 3 Pages

    Following the recent events an individual gained unauthorized access and committed fraud against a financial institution causing damage in loss of highly sensitive data. In accordance with The Computer Fraud and Abuse Act Section 1030, whoever having knowingly accessed a computer without authorization or exceeding authorized access shall be punished. Punishment Under Section 1030 subsection A number 7, whoever with intent to extort from person, firm, association, educational institution, financial institution, government entity, or other legal entity, any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to…

    • 674 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Office of Personal Management was established by Theodore Roosevelt is considered to be the father of the cutting edge merit-based administration. Merit is a term which means the value of quality of something or someone. Merit selection ensures that selection is based only on a person's ability to perform the work. Merit selection aims to choose the best person for the job, resulting in a quality workforce. OPM's history, which started with the Civil Service Act in 1883 and formally renamed to the Civil Service Commission.…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    As consumers, we trust corporations with private information like phone numbers, home addresses, SSID numbers, and in some cases interests or search history. Facebook and Google, which are tech giants, sells out your history to companies like Target to advertise merchandise on the internet that is personally tailored to you. Target and other well known stores have been hacked for customer information. A few easy rules to follow to prevent getting hacked are not shopping online and pay with cash as much as possible. According to Lee Rainie, an expert in research in internet, science and technology if one cannot, they are among “91% of Americans who say they do not have control of their personal information online”(Rainie 7).…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    “This automatically makes me feel more susceptible to being victimized again.” However, there are responsibilities for individuals as well. “Monitor your information, just because it looks like a purchase you would make, verify that you actually did make that purchase,” Haas said. “And you can also get a credit freeze.”…

    • 808 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Over the years, America and other nations all over the world have gone through many changes. One of those changes involves the evolution of technology. Technology has become so advanced that there is literally a more advanced way to handling daily operations. From automatic cash registers to intelligence gathering, technology has inevitably played an essential role in the way the countries all over the world have advanced. Unfortunately with that success, there are more opportunities for hackers to override those systems in order to steal information from unsuspecting users who have entrusted their most private information into the computer system.…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    What exactly is cybersecurity? Cybersecurity, also referred to as Information Technology Security, centers on guarding networks, computer systems, and critical data from unauthorized access, alteration or damage by hackers or perhaps even disgruntled employees. Thorough cyber breaches transpire all too often in today’s corporate world. Attackers or also known as “hackers” simply evade conventional security implementations to steal essential data and to disrupt company operations. “Price Waterhouse Coopers (PWC) recent report – the Global State of Information Security Survey: 2015 – shows that, last year, organizations have reported financial hits up to 93% more costly than 2013” (Zaharia, 2015).…

    • 732 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Credit Card Fraud Case Study

    • 2744 Words
    • 11 Pages

    3.1 Introduction Fraud is one of the most crucial ethical concerns in the credit card industry (Delamaire, Abdon, & Pointon, 2009). Fraud can occur with any type of credit products, such as personal loans, home loans, and in retails. Delamaire, Abdon, & Pointon (2009) defines fraud as means of obtaining services, goods and/or money in a dishonorable manner, and is a growing problem globally. Fraud deals with issues concerning criminal cases that are difficult to classify (Delamaire, Abdon, & Pointon, 2009). According to Bertke (2013) fraudsters have long posed a threat to perform fraudulent activities in retail outlets and the rise of mobile devices and other technologies are now serving as a gateway for fraudsters looking to take advantage…

    • 2744 Words
    • 11 Pages
    Great Essays