Hacking Essay

Decent Essays
While hacking may be more known as a single person sitting at a computer, hacking was actually started by the United States Government in 1982, when Soviet Union gas pipeline computer software was hacked by the Central Intelligence Agency resulting in an explosion of the gas line. An article written by Alec Russell of The Telegraph stated, “After securing President Reagan 's approval in January 1982, the CIA tricked the Soviet Union into acquiring software with built-in flaws.” The installed software caused the gas line to actually explode. While this type of attack was not an identity theft case, it was the first type of well-known computer attack utilizing computer software, which is the most common way identity thieves are able to commit …show more content…
Companies have written policies and procedures for how their employees use their email, what types of websites they visit and reporting guidelines for lost or stolen credentials. Another way to combat data breaches is to require third party contractors to maintain the same stringent policies protecting their credentials, due to some of the larger data breaches being caused by hackers using contractor information to slip past firewalls. Many of the attacks and data breaches of large corporations would not have occurred if their employees protected their credentials, so it shows the firewalls being developed to protect server infrastructure are working. Because hackers only make money on selling identities in bulk, stopping the large scale data breaches is the first step in combating the problem. Bankrate.com states “While the loss of a pivotal piece of personal information can cost you big-time, thieves aren 't exactly breaking the bank on any single transaction. Instead, they make money by selling in bulk. If they sell 100,000 Social Security numbers for a penny each, that 's …show more content…
Individuals should follow the same guidelines they would at work, which includes maintaining difficult passwords for online accounts like email and banking log-ins. They should keep the passwords hidden and not leave them in the open for anyone to see. They should also monitor their credit history through credit monitoring services and be vigilant of suspicious mail, involving newly created accounts, coming to their home. Any documents with personal information like applications, credit/debit cards, tax information and bills should be shredded or destroyed before being thrown in the trash. People can also subscribe to services which monitor someone’s identity and history for suspicious activity. While these services may quickly catch an act of identity theft, people must weigh the cost of the service versus the ability to monitor their own identity. The Federal Trade Commission states, “Many companies refer to their services as identity theft protection services. In fact, no service can protect you from having your personal information stolen. What these companies offer are monitoring and recovery services. Monitoring services watch for signs that an identity thief may be using your personal information. Recovery services help you deal with the effects of identity theft after it

Related Documents

  • Improved Essays

    Nt1310 Unit 5 Paper

    • 415 Words
    • 2 Pages

    "If you're looking for malware you won't see breaches using legitimate credentials," Kurtz explained. Simply put, hackers are stealing login information and using those credentials to access applications and sensitive data. As a result, it's hard to identify when organizations are breached, and many have lost data, only to discover those intrusions months and years later. 2.5.2 Lateral hacker movement/breach containment: Once cybercriminals find their way inside corporate networks, they're moving laterally between applications until they find the most sensitive and valuable data. " Cryptographic isolation and end-to-end encryption prevents lateral movement.…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the article Identity theft it talks about how vital protecting clients information private is, but there is often breaches that cannot be prevented (Kess, S., Grimaldi, J. R., & Revels, J. J. (2017). Identity Theft. CPA Journal, 87(1), 66-68.). The article also goes on to state that being prepared is the best cure for identity theft, even though it is now considered to be a fact of life there are many steps that can be taken along the road of recovery (Kess, S., Grimaldi, J. R., & Revels, J. J. (2017).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    Strengthen your passwords. Use random combinations of letters, numbers and special characters. Create different passwords for each account and change them frequently. 3. Check your credit reports.…

    • 264 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hrm/531 Week 2

    • 636 Words
    • 3 Pages

    Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    First of all, hackers are people who use the internet to gain access to other people’s private information with a malicious intent. They will attack innocent people and take their information for many reasons. Davis says that their behavior is anonymous and unethical. Identity theft is a form of hacking where people steal important information such as social security numbers, identification numbers, and credit cards. They can…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Massive amounts of data being collected are causing extremely high risks of identity theft. When…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Data breach has been rising in the United States and in other countries as well, leaving customers vulnerable to identity theft. Customers also can get their credit history damaged. Thousands of people are affected by this situation more frequently when they make their purchases online as well as in the stores when using credit cards. Since the use of credit cards is the most convenient way to pay for a purchase for customers, scammers take advantage of it to commit their frauds.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    “A recent Government Accountability Office (GAO) report found the number of information-security incidents in which personal information was involved has more than doubled over the last few years, exceeding 25,000 in fiscal 2013” (“Privacy”). That means that every day there are approximately 68.5 incidents where personal information is stolen from major holders of sensitive data, such as credit card information, social security numbers, and usernames and passwords. So through the use of a virus, bug (a flaw in the software being used), and malware, thieves are able to gain access to…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Introduction According to http://searchsecurity.techtarget.com/definition/data-breach , “A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.” Many people experienced a data breach if they shopped in Target stores between November 27 and December 15, 2013. According to Washington Post, more than 70 million customers not only might have had their personal information compromised but also their card data stolen.…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    As consumers, we trust corporations with private information like phone numbers, home addresses, SSID numbers, and in some cases interests or search history. Facebook and Google, which are tech giants, sells out your history to companies like Target to advertise merchandise on the internet that is personally tailored to you. Target and other well known stores have been hacked for customer information. A few easy rules to follow to prevent getting hacked are not shopping online and pay with cash as much as possible. According to Lee Rainie, an expert in research in internet, science and technology if one cannot, they are among “91% of Americans who say they do not have control of their personal information online”(Rainie 7).…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Identity theft is defined as “The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases” (Definition). It is one of those things that people believe could never happen to them. They don’t think it’s that big of a deal and then become careless when it comes to sharing personal information on and offline and when they are online shopping. However, identity theft is a very serious and very real thing that affects approximately 12,157,400 Americans annually (Identity Theft). The next few paragraphs will discuss how an identity can be stolen, how an individual should take action if they believe their identity has been stolen,…

    • 1168 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    According to the authors, the main argument to protect a person from identity theft is to do annual credit reports and to never carry a Social Security card. The main point of this article is to provide the reader with ways to protect the individual from identity theft. I know that there are currently so many ways for an individual to have their identity stolen through various means, like phishing, harmful viruses that attach to a computer device, and skimmers. In this article, the authors provide a survey. On the survey, it is stated that many people do not take advantage of free credit reports and many people carry personal information that could bring harm on themselves if ever stolen and used for identity theft.…

    • 286 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays

Related Topics