Hackers: Identity Theft and Personal Information Essay

Submitted By mofitch0493
Words: 2440
Pages: 10

To steal one’s identity is a scam that has been around over the passage of time, but to take on someone’s identity through intangible manners is a new phenomenon of this century. In today’s society we face a threat with the usage of online activity. Internet users have placed themselves in a vulnerable position. These frequent users are susceptible to “hackers” obtaining personal information with the intent to exploit. Countless of internet users are having their information stolen through online activity and in the processes billions of dollars are being loss. Things that one would find to important and personal such as a credit card number or social security number are being stolen and misused. With the progression of technology these hackers are obtaining information and practicing fraudulent behavior through other mediums besides the computer, such as smart phones, tablets, and other portable devices. Unfortunately, our law has been very blasé about the situation and has yet to take severe action. There are certain steps that a concerned citizen can take to protect one’s self of fraudulent activity. Being aware of your settings and who views your personal information can save you the risk of being victimized. You may also want to protect your computer through the use of firewall programs. Only you, the online internet user can protect yourself from identity thieves, by regulating and constantly monitoring your online activity. Technological advancement will only broaden the playground for devious users.

Introduction Identity theft is of rising concern for people in the United States that was estimated to cost Americans 1.52 billion dollars in 2012. According to OECD, identity theft occurs when a party acquires, transfers, posses or used personal information of a natural or legal person in an unauthorized manner, with the intent to commit, or in connection with, fraud or other crimes (OECD). Identity thieves therefore indiscriminately act to jeopardize security of individuals or institutions from every background. Whether the target is a business, corporations, or a government institution, online identity theft debilitates people’s trust to using online form safely.
People have become vulnerable to online hackers as a result of the technological advancement. The great progress of computer technology in the past decades created a cyber commercial environment that requires people to provide personal information to conduct transactions. Consequently, online identity thieves are able to exploit weaknesses they find in computer networks or systems of any organization. There are many ways perpetrators obtain people’s information illegally online while the most commonly used is through malware, spam, phishing, and hacking. Hacking, in particular, attracts savvy individuals to participate in accordance for political or financial gain while others simply undertake the act as a challenge. Wrongdoers are successful as long as they master basic computer skills necessary to breach into insecure networks.
Several government and organizational bodies have acted in efforts to mitigate the issue. Previous improvements attempted to address the problem have put forth principles intended to strengthen frameworks to deter fraud. Other principles have also served to fight online identity theft by suggesting ways to solidify frameworks to better protect data networks and in extending awareness programs for people. The purpose of this paper is to analyze standards practiced in the past, provide enhancements to previous principles, and recommend suited precautionary steps to prevent such theft.
The Problems of Identity Theft Approximately 15 million United States residents have their identities used fraudulently each year with financial losses totaling upwards of $50 billion, according to identitytheift.info. There are a number of issues contributing to the growth of the unlawful act of stealing another individual’s