4.2 short answer

docx

School

Indiana Wesleyan University, Marion *

*We aren’t endorsed by this school

Course

320

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by abjzumur

Report
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information 4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information 4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information a. Was there enough personal information returned that could potentially be used for identity theft? Explain why or why not. Ans: There are several ways that scammers can steal your identity, including in person, online, through social media, and by phone. Scammers may Steal your wallet or purse to get ID, credit, or bank cards and go through your trash to retrieve bank statements or tax documents. They can install skimmers at ATMs,
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information cash registers, and fuel pumps to digitally steal information from your bank card. Another option is getting personal information from your phone when you use public Wi-Fi and use “phishing” to get information from you through fraudulent email, texts, or phone calls. They also can look through your social media accounts to find identifying information in posts or photos. Or they may ask you for personal information in online quizzes and surveys. When this information is stolen, “it could significantly impact a user’s finances. A cybercriminal can use financial information for simple malicious activities such as paying bills, performing fraudulent online transactions, and transferring money from victims’ bank accounts. More dedicated cybercriminals and groups may even create counterfeit credit cards for their use” (Payne, 2019). b. What is the security implication of having a webmail account compromised regarding a social networking website? Ans: Every cyber-attack against a user has a goal. Generally, account compromise is only the first step. The second phase is where the attacker achieves their purpose: steal data, destroy data, or install malware on the network. This phase may require privilege escalation depending on the environment and the account’s authorization level. If you think your account has been compromised, you have options. You can take several steps to eliminate the threat and recover your account. Data breach forensics should only be done by a professional. But you can take several steps to contain and eradicate the immediate danger. This starts with regaining access to
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information your account and changing your password. Then, you should report the compromise to the proper authorities. c. What security feature should you always look for in any website that will ask for personal information to share with others? Ans: When visiting a website that asks for sensitive information such as credit card numbers or your social security number, the first step you can take to securing your privacy is creating a strong password . Equally important is verifying that any information you enter on this site is transmitted and stored correctly. Once your information is entered online, it is sent as plain text for anyone to intercept. To avoid this, ensure the website is encrypted over a secure connection. One such sign to look for is in the URL of the website. A fast website’s URL should begin with “https” rather than “http”. The “s” at the end of “http” stands for secure and uses an SSL (Secure Sockets Layer) connection. Your information will be encrypted before being sent to a server. d. What implications can social networking sites have for job applicants, and what is the risk of combining your family and friends with business contacts and associates? Ans: Most of us know that social media can impact our chances of being hired for a job; as a candidate, your social media pages may determine if you are even asked to interview for a position. CareerBuilder recently surveyed over 2,000 hiring managers and human resource professionals and found that 51% of employers who did their due diligence and used social media to research a candidate have not engaged candidates due to the content on their social media pages.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information The risk of combining your family and personal friends with your business contacts and associates is that it can lead to conflicts of interest, blurred boundaries, and potential harm to personal and professional relationships . Reference What is a compromised Account? Types, meaning & more | Proofpoint US. (2023, October 25). Proofpoint. https://www.proofpoint.com/us/threat-reference/compromised-account#:~:text=An %20account%20is%20compromised%20when,Ransomware
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information Impacts of social media on every employment level | Business Talent Solutions. (n.d.). https://businesstalentsolutions.com/impacts-of-social-media-on-every-employment-level/ Payne, K. (2019, February 9). What do Hackers do with Your Stolen Identity? Timesharing Today. https://timesharingtoday.com/2019/02/09/what-do-hackers-do-with-your-stolen-identity/