EBK BUSINESS DRIVEN TECHNOLOGY
EBK BUSINESS DRIVEN TECHNOLOGY
7th Edition
ISBN: 8220103675451
Author: BALTZAN
Publisher: YUZU
Expert Solution & Answer
Book Icon
Chapter B, Problem B6.5MBD

Explanation of Solution

Posting Social Security Number (SSN) in advertisements:

  • No. This number is the major key for personal information.
    • Don’t share this data with a person whom does not know.
    • Consider the SSN is being misused by a hacker; the data that is used by the hacker is furnished by the victim.
    • So, the victim is totally liable for the data that is being misused.
  • Reasons:
    • Identity theft in financial activities
      • If a hacker uses SSN of any person, then the given person is a victim of financial identity theft.
      • The hacker may fill out wrong applications for loans, credit cards or bank accounts in give user name or take the amount from that accounts.
    • Identity theft in government
      • The hacker may use user personal information in communications with the government.
      • Consider an example is tax related identify theft.
        • Hacker uses any person SSN to file an income tax return in given person name to call that a tax repayment.
    • Problems in criminal activities
    • Problems in medical activities
      • A hacker might give any person private information such as SSN in medical emergency; then it affecting that person healthcare treatment negatively.
    • Problems in utility
      • The problem in utility services such as phone, water, gas and cable services.
      • Here the criminals may use user SSN and other personal data to open utility service agreements on current accounts...

Blurred answer
Students have asked these similar questions
Which of the following is true about the hack against the credit reporting company Equifax? (Choose 2) O The attack was considered an act of cyberwarfare. Hackers were targeting personal information such as credit card numbers. The attack affected US citizens as well as Canadians and Britons. The attack was motivated by hackers taking revenge on the credit agency. The attack was the work of insider hackers.
What exactly does the word "identity theft" mean? What can happen if you are a victim of identity theft?
Explain challenge–response authentication. Its security is not immediately apparent.

Chapter B Solutions

EBK BUSINESS DRIVEN TECHNOLOGY

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning