Activity 3 - Valdez

You might also like

You are on page 1of 2

NAME: Valdez, Andrea Marie R.

SCORE
SECTION: BFR 50
:

Read additional articles about the lesson and answer the following questions.

1. What is the most commonly committed type of identity theft in the word? In the
Philippines? What makes it easy to commit? 10 points

- The most typical type of identity theft that occurring in the world and at the same time in the
Philippines is credit card fraud. This is when an unidentified person using a portion of your
identity — your credit card information — to make fraudulent purchases or to access cash
advances. It’s an issue that can affect the whole part of consumer credit industry. The cases
about credit card fraud are hard to prevent that is why the thieves are taking an advantage
to it. They’re making synthetic identities to hide their real identity when performing a crime
and also they’re using a combination of real data and fabricated information. It is easy to
commit credit card fraud because there’s a lot of ways how to perform it such as the thief
lures you to a fraudulent website where you are tricked into providing your card number,
they might steal your credit card, they might digs in your trash to look for some receipts or
card statements with your card number in it, or they might put an hidden camera at the ATM
machine. Then after that the thief will use your credit card information for fraudulent
purchases.

2. How can other crimes such as extortion and money laundering be facilitated
through identity theft? 10 points.

- Concealing the real identity of the criminal is a must when committing a crime such as
extortion and money laundering. The fraudsters are using only the identity of the victim and
not their existing accounts or real identity. Impersonating a different person becomes easier
with the more information the criminals has collected from stolen data, as well as public and
social information. The information they collected can be used to threaten someone so that
they can obtain money or property and can also be used to open new bank accounts, apply
for credit cards and loans and even new corporations. This activity can continue until the
victim is alerted by a credit monitoring notification or the fraudster gets caught.

3. Which internet-facilitated method of identity fraud do you consider most


sophisticated and difficult to be spotted by authorities? Justify your answer.  15
points

- Personally, I consider Trojan horse as the most sophisticated and difficult to be spotted by
authorities since it is often disguised as a legitimate program, but in reality it allows hackers
to spy on your online activities, access and copy files from your hard drive, modify and
delete your data, hamper the performance of your computer, and even steal your personal
information. There are a lot of attacks that happening in Trojan horse but the most
sophisticated is the Zeus Trojan. It is a piece of malware used increasingly by criminals to
obtain huge quantities of sensitive information from thousands of compromised computers
around the world. As I’ve read some reliable articles about this, there are a lot of computer
experts who gives a warning about the Trojan horse. The authorities will definitely need to
fight this because it can affect thousand computers around the world so probably it will be
very difficult for them to narrow and search it. Some of these hackers are professionals and
also used secure software which is proxy servers that can be able to hide their locations and
they will remain anonymous. In order to bring a case to a successful conclusion, it takes a
lot of hours in research and cyber forensic analysis, which includes identifying, preserving,
retrieving, analyzing and presenting data as a form of evidence. 

4. What methods can be employed by companies to ensure that “insiders” cannot


enter the company or that no employee can become one? 15 points

- Before they hire employees for their company they must need a very meticulous background
research about the applicants so that they already know if the hired person is an insider or
not. They need to educate their employees such as providing training and resources that
must overview the significance of cyber security. They need to encrypt a data that the cyber
security tactics disguises data as it’s shared across networks, which makes it extremely
difficult to hack. They must update regularly all the software and devices so that the hacker
aren’t able to identify the vulnerabilities and cannot gain an access to the system of the
company. Partner with a security vendor that offers managed network services which can
helps them to control the performance and security of their business networks with 24/7
management, change control, monitoring and network operations support. Enable two-
factor-verification and use complex passwords to add a second layer of security and
reconfirm a user’s identity every time they log in. Change passwords every six months and
make sure they contain upper and lowercase letters, numbers and symbols. And the
simplest ways is to install antivirus software to protect their business from attacks.

You might also like