• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Identity theft

Extracts from this document...


Identity theft On the internet Computers have completely revolutionised the way we live and work. They have evolved just as people have. They are great, for data processing and for word processing. The possibilities of the things we can achieve with computers are endless. But just when things couldn't have got any better, the Internet came along. This is a superhighway of information, stored in millions of different servers around the globe, which can be accessed at the touch of a button. Their have been huge developments such as e-mail which can be accessed from anywhere in the world. You can even go to the super market from the safety of your home! But it's not all good news. As the internet and computers have developed and become more complex, so have the criminals that use them. ...read more.


In some scenarios cars are even bought. The thieves have also been known to sell the information that they obtain to other people. A fifty-seven year old woman, named Sandi Cullers, who lives in New York City, had $250,000 stolen from her, after thieves obtained her social security number and date of birth. They used this money to buy clothing, electronics, and other expensive merchandise, in 2002. A police Lt. Mark Johnson said; "Identity theft, that claims 50,000 new victims each year, occurs when someone gains control of personal information to commit fraud, for economic gain. The crime has grown quickly in recent years because of the internet, thieves have devised elaborate schemes to persuade people to give them personal information ".The ways in which we can prevent this from happening are by enforcing encryption on top of unsecured websites where private credentials are submitted, and implementing a more secure connection to the internet by installing a firewall on everyone's computer. ...read more.


Finally I would like to conclude by saying that I strongly believe that computer development companies such as Microsoft who create the operating systems which we use every single day, in all different working environments, for all different purposes, should integrate a security defence system, which will target any malicious and suspicious hacker or software, trying to access the person's computer. In this software, the person or company responsible for planting this 'spying software' would be traced from anywhere in the world and then their I.P (internet protocol which is assigned specifically to each individual computer or server in the world) would be sent to a special security server, and then they could be traced and prosecuted, which would finally put an end to identity theft, on the internet. By David Burns ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Will a Cyber Café in Wakefield be successful?

    To broaden my target market I will make it possible for customers who are not as interested in computers to visit for food/drink purposes only. It will offer a quiet, relaxing place for people to come and unwind. This would help me appeal to older customers.

  2. Proposals to introduce a national identity card in the UK have always generated hot ...

    But the 'rules' have changed from what they were fifty years ago and the debate must now take into consideration a number of factors, among which is information technology and its use in our present society. Nothing epitomizes modern life better than computers.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work