Identity theft

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 15 of 50 - About 500 Essays
  • Improved Essays

    Case Study John Brennan

    • 423 Words
    • 2 Pages

    1. Introduction Last year on October 12, Director of Central Intelligence of America (CIA) John Brennan’s American On-Line (AOL) e-mail account was hacked by a probable high school student. News of the incident was first reported by the New York Post after the teenager established communication with the newspaper the week before. Data breach activity took place against Brennan by the teenager who was social engineering to take control of Brennan’s AOL e-mail account. The hacker wasn’t working…

    • 423 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Introduction The rise of the internet has led to the creation of an industry based solely in gathering and selling mass amounts of user data. The companies who work in this industry are called data brokers. This term can be used to describe companies that only work in this business, such as Epsilon or Acxiom, but it can also be used to describe other companies that collect data like Facebook and Google. They collect and distribute information on consumers, and lately a lot of that collecting…

    • 2318 Words
    • 10 Pages
    Superior Essays
  • Improved Essays

    Freedom Of Expression

    • 1472 Words
    • 6 Pages

    Freedom of Expression or Freedom of Invasion? From hieroglyphics, the printing press, to the computer, the concept of communication has been an integral part of society in order to express and spread ideas. With the vast advancements in technology and social media tools, communication has evolved into a far more immediate, efficient method for greater involvement in activities locally and globally. Clay Shirky, in “The Political Power of Social Media: Technology, the Public Sphere, and Political…

    • 1472 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In Feed, symbols play a large part in portraying the theme of consumerism. They allow for more insight on how corporations can use their power to control most of the population. The most important symbol shown in the book is the Feed itself. Would having a computer connected to your brain that is constantly spamming you with advertisements cause you to buy whatever you see? The Feed is basically a computer that is attached to your brain. Many of the people in the book received it immediately…

    • 412 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    privacy. State lawmakers have dealt with an array of privacy issues related to online activities. This web page documents state laws in a limited number of areas: website privacy policies, privacy of online book downloads and reader browsing information, personal information held by Internet service providers, online marketing of certain products directed to minors, and employee email monitoring. Additional digital privacy resources also are available from NCSL. In addition, other types of state…

    • 1793 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    Computer Forensics

    • 327 Words
    • 2 Pages

    Computer forensics plays a vital role in recovering and revealing the hidden clues. A very famous case is the BTK Killer where investigators had assisted the police to discover a serial killer, Dennis Rader, through a floppy disk that Dennis sent to the police. Investigators found within the documents implicated an author name "Dennis" at "Christ Lutheran Church". This evidence helped to lead to the serial killer's arrest. Sound like watching CSI? Yes, it is. By now, you should realise how wide…

    • 327 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Cookie Proliferation

    • 298 Words
    • 2 Pages

    How is our information being accessed? If you feel uncomfortable knowing how easy it access your internet history, there are more serious cases where computers have been hacked into, and the user has been completely unaware of the illegal activity happening at the time. What methods are being used to get this information? Well it’s quite easy actually. Here are just a few threats that put our internet privacy at risk: Cookie proliferation: The invisible cookie software agents that track your…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Enlgish Research Paper

    • 533 Words
    • 3 Pages

    As the world increases its dependence on technology, it is inevitable that this technology is brought into voting machines. Electronic voting machines are a relatively new invention which allow voters to vote via a computer rather than a ballot sheet. Some people are uncomfortable with electronic voting machines either because of fear that they can be hacked or because of lack of electronic literacy; however, electronic voting machines should be used because of their easier and more secure vote…

    • 533 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Home Depot appropriately handled its data breach crisis through the company’s quick acting with an initial statement to the general public and through crisis management emails sent to its customers. In Home Depot’s initial statement spokeswoman Paula Drake reassured their customers that the company had been actively working with forensics and security teams since they had become aware of a potential breach (Li, 2014). According to W. Timothy Coombs, Ph.D. in his research paper Crisis Management…

    • 393 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Y2K Crisis

    • 1120 Words
    • 5 Pages

    Having an effective security system for your organization is one of the most critical issues that the government and businesses face in this new era of technology. Technology has become the pivotal point of everything; it is a part of daily lives. There was a time where your cellphone was just a phone, now it’s a portable computer that is able to monitor your movement and health status (Jones & Aiken, 2014). In a world where millions of computers are connected to the Internet and one time,…

    • 1120 Words
    • 5 Pages
    Improved Essays
  • Page 1 12 13 14 15 16 17 18 19 50