Verified Document

Identity Theft First Of All, Term Paper

The system that Networks Update critiques is IMAG ("Identity Managed Access Gateway") by Apere, Inc. The way it works is by an innovative way of permitting or denying access to applications that are critical to a business; the IMAG systems knows who should and who should not have access to those critical files and applications because it has "auto discovery capabilities" that immediately click into place when any attempt is made to enter into privileged files.

But what makes this system unique - in an IT world that already has firewalls and other seemingly effective preventative measures - is that, according to the Mark Rhodes-Ousley, author of the book Network Security, The Complete Reference, IMAG automatically creates and manages "...access policies based on all sources of identity information in the network," and avoids wasteful use of IT resources "for manual network access provisioning and policy management."

While the future success of innovations like IMAG is positive and hopeful but yet to be proven, there are other ongoing efforts to come up with ways to safeguard identity security for individuals. One of those efforts is the new research center - the Center for Identity Management and Information Protection - being developed at Utica College (Kiernan, 2006). According to the Chronicle of Higher Education, the center is necessary because - in the words of Thomas Longstaff, deputy director for technology at the center - there are some viable research projects ongoing and run by experts, but they're "few in number and widely scattered."

Said Longstaff: "We desperately need coordination." The executive director of the center, Gary R. Gordon, calls the center a "clearinghouse for research conducted by others" who are working on identity theft issues. The center will "shed light on practices and technologies that could block identity theft from happening in the first place," said Gordon. The annual budget at the start of the center's operation is only $500,000 - half of which comes from federal grants and the rest from two corporate sponsors, LexisNexis and IBM.

There are three academic partners as well (none of which will provide funds for the center),...

The article, by Vincent Kiernan, reports that "outsiders" may well have gained access to Social Security numbers and other personal information of nearly a quarter of a million students. One of those schools is Western Illinois University - where a hacker apparently accessed credit card numbers and Social Security information for 240,000 "current or former students." And at the University of Kentucky, a "thumb drive" (portable device) - which stored 6,500 Social Security numbers - was stolen from a faculty member.
And so, while law enforcement reports that a very small amount of stolen identity information is actually used by the thieves who hacked through firewalls and into protected files, it must also be emphasized that having any personal business information accessed by unknown interlopers is placing those violated at great risk.

Works Cited

Congress Daily. (2006). Reid Becomes Victim Of Identity Theft. Retrieved 29 August, 2006 from http://www.congressdaily.com.

Foust, Dean; & Ryst, Sonja. (2006). ID Theft: More Hype Than Harm. Business Week, Issue

3991, p. 34-36.

Kiernan, Vincent. (2006). New Center at Utica College will Study Identity Theft. Chronicle of Higher Education, 52(45).

Kiernan, Vincent. (2006). Two Incidents Put More Than 200,000 Students at Risk of Data Theft.

Chronicle of Higher Education, 52(43).

Networks Update. (2006). Apere Launches IMAG Security Appliance. Retrieved 29 August, 2006 from Worldwide Videotex /

http://www.marketresearch.com.

Sources used in this document:
Works Cited

Congress Daily. (2006). Reid Becomes Victim Of Identity Theft. Retrieved 29 August, 2006 from http://www.congressdaily.com.

Foust, Dean; & Ryst, Sonja. (2006). ID Theft: More Hype Than Harm. Business Week, Issue

3991, p. 34-36.

Kiernan, Vincent. (2006). New Center at Utica College will Study Identity Theft. Chronicle of Higher Education, 52(45).
http://www.marketresearch.com.
Cite this Document:
Copy Bibliography Citation

Related Documents

Identity Theft Prevention, Detection, and
Words: 958 Length: 3 Document Type: Essay

When a Social Security number is stolen, contacting the Social Security Administration can help to place a watch on its use as well (SSA 2009). This particular problem can lead to many complications, as obtaining a new Social Security Number can create many difficulties for the victim while keeping the old number might allow the thief to continue using the victim's identity (SSA 2009). Generally, though, a new number

Identity Theft Corp Itc Is a New
Words: 2972 Length: 10 Document Type: Essay

Identity Theft Corp (ITC) is a new company specializing on the identity theft service. The company assists customers to monitor their credit report in order to identify any suspicious charge. The company will also provide the leg work to clean up the mess left behind because of the identity theft and assist customers to rebuild their credits. The objective of this proposal is to provide strategic planning and implementation for Identity

Identity Theft III Identity Theft Clean-Up and
Words: 1375 Length: 5 Document Type: Essay

Identity Theft III Identity Theft Clean-Up and Credit Monitoring Product Solutions for the United States Market Product Description Proactive Solutions Reactive Solutions Target Market Market Analysis Potential Market Growth In previous reports various aspects of a new market expansion for a credit monitoring and other related services would be introduction crossed borders from the corporate headquarters in Canada into the United States. The move into the United States marketplace represents a new market expansion that represents an incredible

Identity Theft Is a Crime
Words: 2068 Length: 6 Document Type: Term Paper

Wikipedia.org/wiki/Identity_theft. Hoar, Sean B. Identity Theft: The Crime of the New Millennium (2001). U.S. Department of Justice. Retrieved March 20, 2007 at http://www.cybercrime.gov/usamarch2001_3.htm. Has some clown taken over your good name? (2004). The Police Notebook. University of Oklahoma Police Department. Retrieved March 20, 2007 at http://www.ou.edu/oupd/idtheft.htm. Thorne, J. And Segal, a. (2006). Identity theft: The new way to rob a bank. CNN online. Retrieved March 20, 2007 at http://www.cnn.com/2006/U.S./05/18/identity.theft/index.html. New technology may increase identity

Identity Theft Using the Knowledge
Words: 2712 Length: 8 Document Type: Thesis

Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005) Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help

Identity Theft
Words: 2926 Length: 10 Document Type: Term Paper

Identity Theft: Managing the Risk Management What's New for the Future of Identity Theft Prevention In this paper I examine the basics of identity theft in today's age of widespread and accessible information. The fundamental problem is that while information technologies continue to make aspects of our lives as simple as "point and click," they tend to make certain forms of crime equally simple. The internet, in particular, makes information not only

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now