Identity Theft Informative Essay

Identity theft is a prevalent issue in today’s digital world. When a malicious actor gains someone’s personal information, it can wreak havoc on the target’s life. “Identity theft occurs when a hacker gains entry to a database and copies a person’s social security number, address, and credit data” (Wempen). Identity theft can happen to anyone and it is important to be vigilant about the information given out online and even in person. Personal information should only be given out to trusted and secure websites and companies and even then, sometimes that is not enough to prevent identity theft.

Types of Identity Theft

Identity theft is everywhere. From cyber identity theft to in-person theft, theft can occur anywhere you are in person or online. Some of the common types of identity theft include financial identity theft, tax identity theft, and medical identity theft. Financial identity theft is the most common type of theft and is “when someone uses another person’s information for financial gain. For instance, a fraudster may use your bank account or credit card numbers to steal money or make purchases or use your Social Security number to open a new credit card” (Equifax). Tax identity theft is when someone uses information gained in malicious ways to steal your tax refunds by submitting a tax return to get that refund. Medical identity theft occurs when a thief uses your personal information to visit the doctor.

How to Prevent Identity Theft

Despite identity theft being so widespread in today’s society, there are steps anyone can take to help prevent identity theft. Some of the ways include being vigilant and aware of how you share your information, checking on your personal information, such as credit checks and monitors, and using strong passwords. Being vigilant includes asking questions when someone is requesting your personal information, such as a social security number. “Ask these questions before you give them your Social Security number: Why do you need it? How will you protect it? Can you use a different identifier? Can you use just the last four digits of my Social Security number?” (Federal Trade Commission). Another way to prevent theft is to regularly check your credit. This can be a great way to spot unauthorized uses of your credit. There are a few ways to check your credit including checking yourself with many websites, some free and some for a fee, and paying for a service to monitor your credit for you. Finally, it is important to always use strong passwords. The stronger the password, the harder it is for hackers to gain entry into accounts. Adding two-factor authentication adds another layer of security to an already strong password. By adding two-factor authentication the hacker may know a password, but they cannot gain entry into accounts because two-factor authentication sends a notification or includes another, separate login to log into the account.

Identity Theft on Social Media Essay

The virtual world has become widely popular not only among teenagers but also among adults and professionals. Social media may be perceived as a progressive improvement in communication, yet it can leave consumers vulnerable – especially to identity theft. Social media users are at risk of having their photos and personal information stolen sometimes, in a matter of seconds. According to the FBI’s Internet Crime Complaint Center, identity theft “occurs when someone appropriates another’s personal information without their knowledge to commit theft or fraud”, whether for medical, financial, or criminal use. This crime has surfaced recently but has been an issue long before the Internet came into existence. Previously, identity thieves had to physically intrude on peoples’ conversations and watch them hoping to pick up some private information. For example, they could look over the shoulder of their victim when they were entering their credit card number, a method known as “shoulder surfing” (McAfee). With increased usage of social media, criminals have much more opportunity now to perpetuate fraud online. Social media has unfortunately become a breeding ground for identity thieves since security breaches have become a rising concern, the trust in social platform providers that users have makes them ripe for theft and the anonymity that comes with social media provides identity thieves with cover for their activities.

Social networking sites are becoming even more susceptible to security breaches and that comes with the potential of putting even greater consumers at risk of exposure. The Identity Theft Resource Center (ITRC) defines a security breach as “an incident in which an individual name plus a Social Security number, Driver’s License number, medical record or financial record (credit/debit cards included) is potentially put at risk because of exposure.” It only takes one identity thief to illegally retrieve millions of data points to endanger the privacy of consumers. While social networking sites ensure consumers’ safety, they are not immune to attacks on their technology. Since 2005, the ITRC has been tracking security breaches while looking for patterns that may better help educate consumers on the need to protect personal information. The biggest security breach was reported by the ITRC to be Facebook in which 50 million user accounts were accessed by unknown attackers. Not only did some of these victims suffer costly damages financially, but according to the International Journal of Computer Science and Network Security, 70% of them face issues with trying to resolve such things as credit cards being opened fraudulently in their name.

Social media has given attackers a huge incentive to invade people’s information because of the vast information found in their databases. The more accounts there are on a database, the more victims are vulnerable to identity theft. Therefore, the increased usage of social media and the internet, in general, has made the virtual world exposed to unwanted intruders because virtually anything digital can be accessed online. Social platform providers may not be responsible for these attacks, however, they are guilty of coaxing consumers into oversharing confidential information and then not adequately protecting that information. Consumers’ trust in social platform providers has increased to such an extent that they feel secure enough to expose their name, their personality, and even their location which can lead to extortion and corruption.

Users overshare information online with limited concern for who can see it and this lack of awareness leads to being taken advantage of. Based on personal information, social media sites can also generate revenues with targeted advertising. For this reason, social media platforms encourage users to provide as much detail as possible while offering limited government oversight or protection of privacy. Instagram, for example, compromises the privacy of users in its collection of as much data as possible. According to their Privacy Policy, the data collected includes user-provided information, data on how people use Instagram through cookies, analytics from third parties showing the websites users visit, and access to the user’s contact list. Although the purpose of this data is to improve the effectiveness of the application, the monetary benefit from targeted ads may be the real reason. Either way, these private insights thrill identity thieves.

A study conducted by Bradford Reyns analyzed the context in which users might have been victimized. The results of his study proved that “individuals who use the Internet for banking and emailing are approximately 50 percent more likely to be victims than others” (Reyns). Through Instagram’s collection of data activity, identity thieves, as well as the public, are provided information about a user’s daily activity. Due to the wide range of victims available, identity thieves can opt to target a victim based on their whereabouts and actions. The increased rate of identity theft is partly due to consumers’ trust in social media platform providers and their lack of concern as to who they might be interacting with. Social media allows people to interact with each other on a digital level, but identity thieves abuse the advantage of anonymity that comes with social media by impersonating others. For example, a social media account can be associated with an actual person, an impersonator, or an automated computer that generates random accounts – often referred to as a “bot”. When creating a new account on a social networking site, a criminal can create a fake name, a fake profile picture, and a fake online persona. This takes away the authenticity of all profiles, yet criminals still manage to often infiltrate their victim’s inner circle.

One attack consists of “the automated identity theft of existing user profiles and sending of friend requests to the contacts of the cloned victim. By establishing a friendship relationship with the contacts of a victim, the attacker can access the sensitive personal information provided by them.” (Balzarotti). Social media has expanded the method of identity theft attacks since anyone can create a fake account and manage it from the comfort of their home. Impersonating someone with a close relationship with the victim allows the criminal to even more easily access a substantial amount of the victim’s information. This attack often works because the contacted users trust and accept the friend request. Thus, social media allows perpetrators easier access to private data as they can impersonate people and gather information that way. This is even more dangerous because it means that not only does a victim have to be wary but must also be concerned that their friends will divulge information. Identity theft is a growing crime affecting millions of people a year.

The consequences of these crimes touch the lives of victims, costing them time and money-consuming measures of precautions and identity recovery actions. Identity theft nowadays seems to be a part of social media. The benefits of social media are great, however, hackers, lack of awareness, and placing too much trust in social media platforms are becoming a real issue. What used to be a physical crime has evolved into an online one. Since the introduction of social networking sites, identity theft has increased due to an increase in security breaches, social media platforms misleading consumers about data collection for targeted ads and the overall sense of anonymity found with each social media account.

Works Cited

    1. Balzarotti, Davide; Bilge, Leyla; Kirda, Engin; Strufe, Thorsten. “All your contacts are belonging to us: automated identity theft attacks on social networks”, April 2009, pp.551-560. https://dl.acm.org/citation.cfm?id=1526784
    2. “Data Breaches”. Identity Theft Resource Center. www.idtheftcenter.org/data-breaches/ Accessed January 13, 2019 “Internet Crime Schemes: Identity Theft”. Federal Bureau of Investigation Internet Crime Complaint Center. www.ic3.gov/crimeschemes.aspx#item-9 Accessed January 11, 2019
    3. Reyns, Bradford W. “Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory beyond Direct-Contact Offenses”. Journal of Research in Crime and Delinquency, Vol. 50, November 2011, pp 216-238. https://doi.org/10.1177/0022427811425539
    4. Soomro, Tariq Rahim; Irshad, Shareen. “Identity Theft and Social Media”. International Journal of Computer Science and Network Security, Vol.18 No.1, January 2018, pp 43-55. http://paper.ijcsns.org/07_book/201801/20180106.pdf
    5. “What is Shoulder Surfing?”. McAfee. May 4, 2015. securingtomorrow.mcafee.com/consumer/identity-protection/what-is-shoulder-surfing/ Accessed January 13, 2019
    6. “What You Need To Know About Instagram’s Privacy Policy”. Identity Guard, June 2018 www.identityguard.com/news-insights/need-know-Instagrams-privacy-policy/ Accessed January 13, 2019 

 

Essay Speech on Cyber Security

Introduction:

Ladies and gentlemen,

Today, I stand before you to shed light on a matter of utmost significance in our modern society: cyber security. In an age where technology reigns supreme and our lives are increasingly interconnected through digital platforms, it is crucial that we understand the importance of protecting our digital assets, personal information, and overall cyber well-being. This informative essay aims to provide an overview of cyber security, its significance, and the steps we can take to safeguard ourselves in the digital landscape.

Body:

Understanding Cyber Security:

Cyber security refers to the practices, measures, and technologies designed to protect computers, networks, and data from unauthorized access, attacks, and damage. It encompasses various aspects, including data protection, network security, information confidentiality, and user privacy.

The Significance of Cyber Security:

  1. Protection against Cyber Threats: The digital world is rife with cyber threats such as hacking, malware, phishing, and identity theft. Cyber security measures serve as a defense mechanism against these malicious activities, preventing unauthorized access and potential harm to individuals, organizations, and even governments.
  2. Preserving Confidentiality: In an era where sensitive information is stored and transmitted electronically, maintaining confidentiality is paramount. Cyber security ensures that personal data, financial records, and intellectual property remain secure, preventing unauthorized disclosure and potential damage.
  3. Safeguarding Critical Infrastructure: Our reliance on technology extends to critical infrastructure systems, such as power grids, transportation networks, and healthcare facilities. A breach in these systems can have severe consequences. Cyber security safeguards these infrastructures, protecting public safety and maintaining the smooth functioning of essential services.

Key Components of Cyber Security:

  1. Network Security: Implementing firewalls, intrusion detection systems, and secure network configurations to prevent unauthorized access and monitor network traffic for potential threats.
  2. Data Encryption: Encrypting sensitive information to render it unreadable by unauthorized individuals, ensuring data confidentiality.
  3. User Authentication: Employing strong passwords, multi-factor authentication, and biometric verification methods to verify the identity of users and prevent unauthorized access.
  4. Security Awareness and Education: Promoting cyber security awareness among individuals, organizations, and communities through training programs and educational initiatives. Educating users about common cyber threats and safe online practices is vital in maintaining a secure digital environment.

Steps to Enhance Cyber Security:

  1. Regular Software Updates: Keeping software and operating systems up to date with the latest security patches and fixes to address vulnerabilities.
  2. Strong Passwords and Account Security: Using complex passwords, avoiding password reuse, and enabling two-factor authentication to strengthen account security.
  3. Vigilance Against Phishing: Being cautious of suspicious emails, links, and attachments to avoid falling victim to phishing attempts.
  4. Backup and Recovery: Regularly backing up data to external storage devices or cloud platforms to ensure data availability and recovery in case of a cyber attack or system failure.

Conclusion:

In a world driven by technology, cyber security has become an essential aspect of our daily lives. By understanding the significance of cyber security, implementing best practices, and promoting awareness, we can protect ourselves, our information, and our digital infrastructure from the ever-present cyber threats. Let us embrace a proactive approach, championing cyber security as a shared responsibility and working towards creating a safer and more secure digital world.

Essay on Why Is Privacy Important in Social Media

Identity theft and misuse a significant effects of social media on cybernetics. Most social media platforms do not concentrate much on their user privacy. Besides, most social media platforms require their user to enter some of their confidential information to sign in. A significant number of users are ignorant about how the info can be relevant to cyber criminals. Hence they willingly tend to enter. Since most platforms do not take into account the security of their user’s details, the info is left available to other users. The cybercriminal can easily access that information of their target.

The cybercriminal can use that information to carry out other criminal activities such as phishing, for self-gain. They can also sell or create new identities for other criminals. Therefore, it is easier for other perpetrators to commit unlawful activities and conceal them from law enforcement agencies. According to the researcher, there has been an even increase in the number of cases of identity theft and misuse every year. Social media networks are a significant cause of this increase.

The ability to track users is another effect of social media networks on cybercrime. The evolution of social media platforms has led to the emergence of features that allow their users to update their status frequently. Besides, most platforms ask the users to add information about their current and previous residence, and schools attended, among others. Users can also see and show their emotions on posts from other users regardless of their knowledge or friendship. If a user pins his current location and activity, likes and dislikes among others on his status, a cybercriminal can easily keep track of him. Also, through the users’ posts, such as photos, videos, and contexts, and the emotions the user shows on other users’ posts, computer criminals can effortlessly gather relevant information, analyze it, and predict their target next events. Using these predictions, the criminals can commit other more severe cyber-attacks. They can also sell that information to other criminals. Therefore, other perpetrators can pose a security threat to either the user or to other family members and friends.

Cyberterrorism is another serious effect of social media on cybercrime. Social media networks are meant to unite people around the globe. However, social media networks facilitate cyberterrorism. Terrorists, with the help of cybercriminals, exploit social media to accomplish several objectives, create unity disorder, generate financial income, acquire new identities, and data mining. Cybercriminals create new accounts on social media platforms, such as Facebook, using fake identities. They then send a friend request to as many users as possible within the area of the target. They can then use those accounts to mail graphics and contexts which can cause panic and distrust among people, hence distracting unity and facilitating terrorist attacks.

Moreover, cybercriminals steal the personal information of other social media users and use it to create new identities for the terrorists. They also use their data mining competency to pinch confidential information, such as credit card information, and use it to forge characters. They can then use the fake credit cards to make purchases and withdraw cash from the bank accounts of other social media users, to finance terrorism.

Property stalking is also a severe social media issue relating to cybercrime. Social media facilitates the transmission of harmful programs such as computer viruses malware, and ransomware, among others. Cybercriminals create such programs and attach them to posts and ads in such a way that if a social media platform user clicks, downloads, or opens a link with those malicious files, their computer gets affected.

The criminals create different files with different aims, sabotage, data mining, or financial gain. In most cases, criminals use ransomware for monetary gain. Ransomware conceals essential information from the computer owner. Therefore, the owner has to pay for the decryption of his data. On the other hand, cybercriminals use social media platforms to send malicious software that assists them in data mining and vandalism. They use the software to crack or hack into their targets’ computers.

Cyber-stalking and defamation is also a cybercrime that closely relates to social media. People consider social media as a better way to speak their minds. However, cybercriminals take it as a way to deliver defamatory content. In this case, criminals use defamatory materials to cyber-stalk their targets. Cyber-stalking refers to the use of the internet, and social media networks, as a medium of sending threatening materials to frighten or harass the recipient. The cybercriminals may create defamatory content on their target. They may then contact the target threatening to post these contents on the social media platforms. Here, the victim is forced to do as the criminals instruct them to do. Mostly, these criminals target reputable persons such as politicians.

The threat from using third-party applications is the impact of social media on the cybercrime that commonly affects youth. Almost every social media platform requires their users to enter their personal information while signing in. Some of these platforms have secure users’ data privacy. Hence, it is difficult for the intruders to access that info. Cybercriminals use third-party applications to access the information they need. Third-party applications may include games, and music apps, among others. They seek permission to access users’ data from social media platforms. Some of these applications may download malware. The cybercriminals may, therefore, use this malware to steal the relevant information they need when the user grants permission.

Privacy infringement also affects cybercrime. Most social media platforms give their user the privilege to choose the level of privacy of their personal information. When the user sets the default setting as public, the info is left accessible to everyone. Therefore, it is easy for criminals to access that information.

The users’ trust in social media networking site operators and strangers poses a potent effect of social media on cybercrime. Personal information and the content users post on social media are usually accessible to the operators. The gen can be available to the operators even after deletion. Some of these operators are not trustworthy. They can misuse or trade users’ data. Some users also offer trust to strangers quickly. Accepting friend requests from unknown people exposes a user to cyber-crime,

In conclusion, social media is the principal cause of the widespread cybercrime. It is changing to a gold mine of cybercriminals. It is not only a data mining site but also a market site where criminals trade information illegally. Its security vulnerability and users’ ignorance make it more favorable for cyber-crime.