Verified Document

Increased Need For Information Security Essay

Identity Theft in Modern Society Identity Theft Report Prep

The topic chosen by this student is "Identity Theft in our Contemporary Society." The reason the author chose this is because it is a topic that is becoming more and more prevalent as even major organizations like Target and TJX, among others, have been victimized over the recent years. It applies to the author's life as well as everyone else's because the only way that anyone can avoid being the victim of identity theft is to be a financial hermit and never use credit cards or any things that could hit a credit profile and that is basically impossible. Even if it were possible, even children are having their Social Security Numbers stolen and used for electricity bills or even credit accounts. Quite often, the perpetrators of this and other identify crimes are the victim's own families. This topic is universal and this is important to the author of this report because it can affect anyone….young or old, man or woman, rich or poor…or even alive or dead.

This report would cover who is affected by identity theft, how it commonly comes to pass, why it seems to be happening more and more, why information security experts are unwilling or unable to take the proper steps, whether there are enough information security professionals in the college pipelines of America and other places to keep people's information safe for years to come and how certain industries in particular are much more vulnerable than others including the medical field, any industry or businesses that warehouses credit and personal data due to business necessity and so forth. Some basic research argues that the cat is out of the proverbial bag and being able to corral said proverbial cat is easier said than done, presuming it is possible in the first place. For those that offer solutions to the problem as well as prevention tips, those will be explained and enumerated in depth as well.

Thesis

While it does not represent the physical death and...

It seems like so long ago when the TJX wireless data breach went down but not much seems to have been improved since then. Even with the rapid advancements in technology and computing power, there still seem to be some massive lapses in judgment and performance as even firms like Target, Nieman Marcus and eBay are being exposed to civil or even perhaps criminal liability due to their actions and inactions. Beyond that, there seems to be no limit to who theoretically would engage in such behavior and what places can be targeted. It can be as fairly minor as a nurse with no medical need to know looking at a celebrity's medical chart and it can be as expansive and wide-ranging as the fairly recent breach that involved Sony Online Entertainment.
Further, as noted in the topic summary, this is something that has or could affect everyone on some level or another. So much of life is centered on one's credit profile and whether it is in good sorts or not. These parts of life include securing a lease of an apartment or business building, financing a car, financing a home purchase, getting a credit card, getting a debit card, getting a bank account or getting utilities for a home or apartment turned on. Obviously, there is a price to be paid for careless behavior as it pertains to credit cards but when a person is victimized and has their credit scarred due to no fault of their own, it can literally change and hamper their lives in demonstrable ways.

Annotated Bibliography

Anderson, K. (2006). Who…

Sources used in this document:
This report is more philosophical in that it asks whether identity theft is really theft. They justify this analysis by saying that many of the concepts of identity are more abstract than tangible and this means that the questions should be asked.

TIGTA: Identity theft protection needs improvements. (2013). Journal of Accountancy, 216(4), 77-78.

This final source points to the fact that the IRS has gotten a lot better at detecting theft including false tax filings and frequently Social Security Number activity.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Information Security Is a Primary Concern
Words: 809 Length: 2 Document Type: Essay

Security Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the

Information Security Management
Words: 549 Length: 2 Document Type: Essay

Security Management Information Security Management Managing the information security at a major university is never an easy task, and especially with a team of only ten the complexities and the resource demands can sometimes make the situation seem all but impossible even on the best of days. When the former head of information security management suddenly departs as the result of an FBI arrest -- and when that arrest stems from the

Security Policy: The Information Security Environment Is
Words: 1208 Length: 4 Document Type: Essay

Security Policy: The information security environment is evolving because organizations of different sizes usually experience a steady stream of data security threats. Small and large business owners as well as IT managers are kept awake with various things like malware, hacking, botnets, and worms. These managers and business owners are usually concerned whether the network is safe and strong enough to repel attacks. Many organizations are plagued and tend to

Information Security Management
Words: 1948 Length: 7 Document Type: Conclusion

Security Management During the span of one's college career, a select number of courses become something more than a simple requirement to be satisfied to assure graduation; these are moments in a student's educational process which make the most lasting impacts. In my personal case, the lessons I have learned as part of my studies in ISSC680 will likely be remembered in those terms, as my eventual career will find

Information Security Training Program
Words: 3414 Length: 12 Document Type: Research Paper

Federal Information Security Management Act (FISMA) The Federal Information Security Management Act places emphasis on the importance of training and awareness program and states under section 3544 (b).(4).(A), (B) that "security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency of- information security risks associated with their activities; and their responsibilities in complying with agency policies and procedures

Information Security
Words: 3704 Length: 10 Document Type: Research Proposal

Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now