Saturday, February 22, 2020

Understanding the dangers of identity theft and how a company or Essay

Understanding the dangers of identity theft and how a company or individual can be protected from it - Essay Example As advancement in technology made access to information easier, many unscrupulous people take advantage of their skills and steal sensitive information from companies and private persons online. According to the Identity Theft Resource Center, a non-profit organization based in the United States (www.idtheftcenter.org), in 2010, there were about 662 cases if information security breaches reported in the United States but the actual number may be higher since not many people and organizations report breaches on their information security system. People whose identity have been assumed by another can suffer tremendous loses. Note that once somebody steals another person’s identity, he or she may be able to access the bank accounts and other personal information of the victim (Abagnale, 2007). As it is, there is a big possibility that the victim may lose money and assets on the process. Aside from taking money and other assets from their victims, some identity thieves use the ide ntity of their victims to commit crimes (Cullen, 2007). For instance, an identity theft can sue the identity of his or her victim in fraudulent online transactions so when the fraud is reported to the police, the police go after the identity theft victim. As it is, it is very important that individuals and organizations understand the kind of risks that they are in and do something to protect themselves from identity thieves. II. Ways and Means Employed by Identity Thieves to Gain Access to Important Information There are a number of ways to commit identity theft but the most common are social engineering, phishing and hacking attempts. Social engineering is committed by exploiting human psychology to gain entry to databases, computer systems and even buildings with sophisticated security system (Hadnagy, 2010). Note that instead of attacking the software or system used by a company or individual, the identity theft uses mind tricks to retrieve sensitive information for the people i nside the building and the people who are running the databank or the system (Hadnagy, 2010). To get the information that he or she needs to gain access into the building or the database, the identity does a lot of research and identify the key persons who he or she will retrieve the needed information (Wilhelm, 2010). For instance, if the identity theft wants to gain access to a database, he or she may pose as a computer technician or IT support person and trick an employee in the IT division to divulge passwords and codes to gain access into the system. Although the basic principles of trickery used in social engineering may sound simple, the execution of the act requires careful planning and psychological manipulation skills (Mitnick, 2003; Allsopp, 2009). When planning its strategies to defraud his or her victim, the identity needs to gather all the necessary information to trick the victim. To do this, he or she may access the personal information of the person targeted using e xisting social networks such as facebook, linked in and others (Mitnick, 2003; Wilhelm, 2010). Note that a good number of users of these online networking sites tend to give out personal information such as e-mail addresses and even telephone numbers online which may them relatively easy preys for identity thieves (Wilhelm, 2010). From the information gathered from these social networking sites, the identity may now be able to psychologically manipulate the victim into giving him or her sensitive information. In most cases, the deception happens online or through the phone so the identity theft and his or her victims do not actually come face to face (Allsopp, 2009). Aside from social engineering, phishing is also commonly used by identity thieves to steal information from their victims. To steal information from their victims, identity theft pretends to be a reliable online entity such as a bank, a well known courier, website and the like (Abagnale, 2007).

Thursday, February 6, 2020

Client Brief on AngliCare Australia Research Paper

Client Brief on AngliCare Australia - Research Paper Example (AngliCare 2011). AngliCare is a social welfare organization in Western Australia that provides specialized services to all people ranging from children to the aged, some including family relationship services, foster care, adoption, employment services, community housing and development, etc. AngliCare’s Internal Environment: SWOT Analysis Strengths: The strengths of AngliCare lies in the services they provide, ranging from care for the aged, youth services, family relationship services, disability and carer services, disaster recovery, etc. also, their complete inclusion is a very strong point in their favor, meaning their non judgmental and non discriminatory acceptance of people from all walks of life. Their main motto is to care and they spread this message to all they come across. AngliCare’s organizational and services structures can also be mentioned as one of its strengths. They are comprehensive and well drafted. Weakness: AngliCare is facing issues in its asp ects, such as with some of its events, the volunteers and op shops. They need to work on resolving these to ensure they are not overshadowed by other social welfare agencies. Opportunities: AngliCare covers almost every person from every walk of life who might be facing problems. However, they do not have programs specific to women and children who have faced abuse. Designing programs for women and children in this dire state will be really helpful. Also, they can consider expanding their services to under-developed and developing countries that do not have such programs in place and require such help. India for instance, does not have social welfare programs for its unemployed or disabled. A program like this might come in handy to help these people get on their feet and help reduce other social stigmas like beggary. Threats: Being a social welfare agency, AngliCare doesn’t really face threats as such from competition. Social welfare is based in the theme of care and their o nly objective is to ensure the welfare of their people. Their threats will mainly come into the picture in terms of lack of resources and volunteers. Also, when people try to scam the agency in exchange for the resources they provide, it will create a problem for the agency. AngliCare’s External Environment: Stakeholders and Competitors In case of AngliCare, corporate partnerships provide the opportunity for companies to contribute to its work in the community.  Their programs provide physical, financial, emotional and spiritual assistance to help people in need to break the cycle of hardship. They have Corporate Care partners who assist in various ways such as sponsorship of events, workplace giving via payroll deductions for employees, encouraging people to volunteer at any of their locations and encouraging people to support them in kind, that is, via means of food, clothes and other such necessities. AngliCare, being a social welfare agency, does not really face competi tion as such from other social welfare agencies. All these agencies are non profit based and run for the benefit of people, local or otherwise. They do not judge or discriminate against the people they help out. All are equal in the eyes of god and these agencies. AngliCare’s Macro Environment: PESTEL Analysis Political Factors: AngliCare is facing political issues when it comes to its schools’ programs. More and more State, National and Overseas charities are