Sample Essay on:
Guarding Against Identity Theft

Here is the synopsis of our sample research paper on Guarding Against Identity Theft. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

A 14 page paper discussing identity theft in the electronic environment and what IT personnel can do to decrease incidence associated with e-commerce and other applications. Includes a 1-page outline Bibliography lists 10 sources.

Page Count:

14 pages (~225 words per page)

File: CC6_KSitIDtheftSec.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

IP addresses. C. Goals and Objectives. D. Program and policy design. 1. Inherent risk in the electronic environment. 2. Risk management. 3. Selecting measurement criteria. E. Action Plan. F. Monitoring. G. Evaluation. H. Conclusion. Introduction The convenience of electronic information storage and use also opens that information to being used in unauthorized and even fraudulent ways. As organizations continue to escalate security measures intended to protect customers privacy and information, hackers and other white-collar criminals also are working to overcome those security measures. The end result is that organizations must continually monitor, upgrade and improve their ability to ensure protection of the information they hold. The purpose here is to assess the extent to which identity theft can reach and to propose in general terms risk management measures intended to counter efforts to gain unauthorized access. Identity Theft The electronic environment appears to be quite anonymous, but in reality it is anything but. Jackson, Locke and Shannon (2001) report on the use of "spyware" on the computer of a colleague, a program installed on the colleagues computer when he was out of the office specifically for the purpose of having the software loaded onto his computer and being spied on for a short time by coworkers. Jackson (2001) was able not only to gain access to all of his colleagues personal information, but also was able to disguise his own Internet identity by using his colleagues. Thus Jackson (2001) could have wreaked havoc at one or more Internet sites, and the only traceable trail would lead back to the colleague. Jackson (2001) would have been able to do this by visiting any number ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now