4.2 short answer
docx
keyboard_arrow_up
School
Indiana Wesleyan University, Marion *
*We aren’t endorsed by this school
Course
320
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by abjzumur
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information
a.
Was there enough personal information returned that could potentially be used for identity
theft? Explain why or why not.
Ans: There are several ways that scammers can steal your identity, including in person, online, through
social media, and by phone. Scammers may Steal your wallet or purse to get ID, credit, or bank cards and
go through your trash to retrieve bank statements or tax documents. They can install skimmers at ATMs,
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information
cash registers, and fuel pumps to digitally steal information from your bank card. Another option is
getting personal information from your phone when you use public Wi-Fi and use “phishing” to get
information from you through fraudulent email, texts, or phone calls. They also can look through your
social media accounts to find identifying information in posts or photos. Or they may ask you for
personal information in online quizzes and surveys.
When this information is stolen, “it could significantly impact a user’s finances. A cybercriminal can use
financial information for simple malicious activities such as paying bills, performing fraudulent online
transactions, and transferring money from victims’ bank accounts. More dedicated cybercriminals and
groups may even create counterfeit credit cards for their use” (Payne, 2019).
b.
What is the security implication of having a webmail account compromised regarding a social
networking website?
Ans: Every cyber-attack against a user has a goal. Generally, account compromise is only the first
step. The second phase is where the attacker achieves their purpose: steal data, destroy data, or
install malware on the network. This phase may require privilege escalation depending on the
environment and the account’s authorization level. If you think your account has been
compromised, you have options. You can take several steps to eliminate the threat and recover
your account. Data breach forensics should only be done by a professional. But you can take
several steps to contain and eradicate the immediate danger. This starts with regaining access to
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information
your account and changing your password. Then, you should report the compromise to the
proper authorities.
c.
What security feature should you always look for in any website that will ask for personal
information to share with others?
Ans:
When visiting a website that asks for sensitive information such as credit card numbers or
your social security number, the first step you can take to securing your privacy is
creating a
strong password
. Equally important is verifying that any information you enter on this site is
transmitted and stored correctly. Once your information is entered online, it is sent as plain text
for anyone to intercept. To avoid this, ensure the website is encrypted over a secure connection.
One such sign to look for is in the URL of the website. A fast website’s URL should begin with
“https” rather than “http”. The “s” at the end of “http” stands for secure and uses an SSL (Secure
Sockets Layer) connection. Your information will be encrypted before being sent to a server.
d.
What implications can social networking sites have for job applicants, and what is the risk of
combining your family and friends with business contacts and associates?
Ans:
Most of us know that social media can impact our chances of being hired for a job; as a
candidate, your social media pages may determine if you are even asked to interview for a
position. CareerBuilder recently surveyed over 2,000 hiring managers and human resource
professionals and found that 51% of employers who did their due diligence and used social
media to research a candidate have not engaged candidates due to the content on their social
media pages.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information
The risk of combining your family and personal friends with your business contacts and
associates is that
it can lead to conflicts of interest, blurred boundaries, and potential harm to
personal and professional relationships
.
Reference
What is a compromised Account? Types, meaning & more | Proofpoint US. (2023, October 25).
Proofpoint.
https://www.proofpoint.com/us/threat-reference/compromised-account#:~:text=An
%20account%20is%20compromised%20when,Ransomware
4.2 Short Answer: Engage in Internet Research to Obtain Useful Personal Information
Impacts of social media on every employment level | Business Talent Solutions.
(n.d.).
https://businesstalentsolutions.com/impacts-of-social-media-on-every-employment-level/
Payne, K. (2019, February 9). What do Hackers do with Your Stolen Identity? Timesharing
Today.
https://timesharingtoday.com/2019/02/09/what-do-hackers-do-with-your-stolen-identity/