Business Driven Technology
Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
Expert Solution & Answer
Book Icon
Chapter B, Problem B6.5MBD

Explanation of Solution

Posting Social Security Number (SSN) in advertisements:

  • No. This number is the major key for personal information.
    • Don’t share this data with a person whom does not know.
    • Consider the SSN is being misused by a hacker; the data that is used by the hacker is furnished by the victim.
    • So, the victim is totally liable for the data that is being misused.
  • Reasons:
    • Identity theft in financial activities
      • If a hacker uses SSN of any person, then the given person is a victim of financial identity theft.
      • The hacker may fill out wrong applications for loans, credit cards or bank accounts in give user name or take the amount from that accounts.
    • Identity theft in government
      • The hacker may use user personal information in communications with the government.
      • Consider an example is tax related identify theft.
        • Hacker uses any person SSN to file an income tax return in given person name to call that a tax repayment.
    • Problems in criminal activities
    • Problems in medical activities
      • A hacker might give any person private information such as SSN in medical emergency; then it affecting that person healthcare treatment negatively.
    • Problems in utility
      • The problem in utility services such as phone, water, gas and cable services.
      • Here the criminals may use user SSN and other personal data to open utility service agreements on current accounts...

Blurred answer
Students have asked these similar questions
Which of the following is true about the hack against the credit reporting company Equifax? (Choose 2) O The attack was considered an act of cyberwarfare. Hackers were targeting personal information such as credit card numbers. The attack affected US citizens as well as Canadians and Britons. The attack was motivated by hackers taking revenge on the credit agency. The attack was the work of insider hackers.
What exactly does the word "identity theft" mean? What can happen if you are a victim of identity theft?
Eli Lilly and Company Threat: Phishing attacks are a significant threat to pharmaceutical companies like Eli Lilly. Cybercriminals may attempt to impersonate the company to steal sensitive research or personal information. Vulnerability: Employees may inadvertently fall victim to phishing emails, clicking on malicious links or downloading harmful attachments. Threat Action: Cybercriminals send convincing-looking emails that appear to be from trusted sources, tricking employees into revealing sensitive information. Vulnerability Mitigation Techniques: Employee Training: Regular training and awareness programs can educate employees about the dangers of phishing and how to recognize phishing attempts. Email Filtering: Implement advanced email filtering systems to identify and quarantine phishing emails before they reach employee inboxes. Multi-Factor Authentication (MFA): Require MFA for accessing sensitive systems and data to prevent unauthorized access. Cummins Inc.…

Chapter B Solutions

Business Driven Technology

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning