Identity Theft Jwu

Identity Theft Jwu

  • Submitted By: mmpanico
  • Date Submitted: 04/03/2011 7:08 AM
  • Category: Business
  • Words: 2206
  • Page: 9
  • Views: 433

Methods of Identity Theft
Identity theft has been a rising problem; people of all ages, ethnicities and social classes are targeted. Knowing what to look for to protect yourself from being victimized and what actions to take if you believe you already have been a victim can help keep you and your personal information safe and secure from others viewing pleasure.
There are several creative methods of identity theft; the techniques used to obtain a person’s information may vary from such things as technology, fraud or theft just to find out personal information that they can use to their own benefit. The simplest method of identity theft is shoulder surfing. Shoulder surfing is when a thief will look over a persons shoulder when making transactions at places like an ATM so try and see someone’s pin number. It is likely that some thieves may use recording devices to record the key tone of what someone has entered into the machine.
But over the years technology has dramatically grown, giving thieves more opportunities to steal other people’s personal information. Releasing personal information on the Internet can be very dangerous when not done correctly and can do serious damage. Here are some of the ways technology is used to steal individual’s identities. Hacking can be very dangerous and damaging to an individual if they have not properly secured their computer a hacker can easily can access to all of the information that is stored on the computer.
File sharing can be dangerous because when individuals are sharing their music with others on the Internet it also allows those people to access other files on their computer. By reading RFID, radio frequency identification. RFID tags are found on certain credit cards and other types of cards. Thieves build RFID readers that if in proper range can detect the information off of someone’s card, whether it is by Internet, telephone or simple mishandling of personal information. Phishing and...

Similar Essays