Preview

Nt1310 Unit 3 Assignment 1 Term Paper

Satisfactory Essays
Open Document
Open Document
418 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Assignment 1 Term Paper
1. What is a security feature you should always look for in any Web site that will ask for personal information to share with others? The trusted site feature. It ensures that the sites which provides our personal information takes precautions to protect our data by giving limited access to foreign users.
2. What implications can the social networking sites have for job applicants? Implications differ form company to company. But many of the companies monitor their employees to make sure that they are not sharing company related information with people out of the company. Some companies monitors to make sure that employees are not using companies’ website during work hours.
3. What is the risk of combining your family and
…show more content…
By this the hacker can easily deceive the person.
4. What type of personal information could an attacker obtain from a user profile on LinkedIn.com that he or she could use for identity theft? Full name, company that the user work for, experience, education and blogs if available.

5. Suppose someone posted your highly confidential personal information on a social networking site, and you wish to have the results removed from the Google search engine. Describe some actions you could take to have the information removed. If anyone wants to delete their personal information from Google they can contact webmaster of the site to remove the content of the information posted. Google just removes personal information such as Social security numbers, bank account and credit card numbers, images of signature. There is also a website named reputation.com by which one can pay to them to remove the confidential content.

6. How does one find public records online? One can find public record online by visiting city, state or government websites. There they can search for public records

You May Also Find These Documents Helpful

  • Satisfactory Essays

    STurner Assignment Unit3

    • 560 Words
    • 3 Pages

    b. Whether you use social networking sites or not, what type of information should you avoid posting on these sites?…

    • 560 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    McBride Financial Services is concerned about the cost, security and the approach to be used in both sharing and accessing data by customers, employees, contractors and business partners via the internet or intranet. There is an obvious need for the company to allow all types of users the ability to interact virtually with the company, while maintaining a high level of data security. As such, in its effort to control and share data access, the company is carefully considering using an organizational website to provide information to customers, acquire contact information,…

    • 1002 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Ftc vs Google

    • 745 Words
    • 3 Pages

    This action arises from Google’s alleged violation of a previous consent order with the FTC. In the prior action, the FTC alleged that when Google launched its social networking tool, Google Buzz, it used Gmail users’ private information despite telling those users it would only use that information for Gmail services. The FTC also alleged that Google misrepresented to its Gmail users hat it would not automatically enroll them in the Buzz network and that they could control what information would be public on their profiles.…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Social Security

    • 707 Words
    • 3 Pages

    In conclusion, people can protect their personal information if they don't use the wrong websites, don't give out all their most important information, and keep there social security away from social networking. People must know the website their using because most social networks are not trusted. Also, do not give out your important personal information because there are a lot of cyber criminals. Last but not least do not give out your…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The use of the Internet has become an indispensable tool for students, workers and people in general. Moreover, the use of search engines like Google is a daily routine activity when someone wants to inquire something.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Dirt Bikes’s management wants to make sure it has policies and g p procedures in place to protect the privacy of visitors to its Web site. You have been asked to develop Dirt Bikes’s Web site privacy policy. The TRUSTe Web it t URL Th TRUST W b site at www.truste.org h M d l P i t t has Model Privacy Disclosures in its Privacy Resources that you can download and review to help you draft Dirt Bikes’s privacy policy. You can also examine specific companies’ privacy policies by companies searching for Web site privacy policies on Yahoo!, Google or another search engine. Prepare a report for management that addresses the following g g issues shown on the following slides:…

    • 5618 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Personal information is vital and important resources for each person in the world. Our personal identification or information as important as an account information for a company exists. How personal information gets affected on web? Well, In this decade we are totally depend on the Internet and we can not live a single day without Internet. So somehow we have to share our personal identification in online to satisfy our daily needs and requirements without even concerning what will going be happen next if my personal information goes in wrong hands.…

    • 409 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Gives individuals the right to know what information is held about them and provides a framework to ensure the personal information is handled properly.…

    • 475 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Data Protection

    • 735 Words
    • 3 Pages

    Once a person has given their personal details such as their bank details to the organisation, they are open to various threats. One of these threats is Identity Theft, Identity Theft is when somebody steals your personal information and sometimes your financial information, in this case, the person who stole your financial information may make transactions using your name. Financial Identity Theft is the most common form of Identity Theft and in America, there is more reported Identity Thefts than there is traffic accidents. "We get more reports of identity theft every day than traffic accidents." (Financial Identity Theft), up to 9 million people in the US are victims of Identity Theft each year. Although the fear of Identity Theft has gave people an insight of what could happen to them, and made people more cautious with their information such as their bank details, it has still affected people who have been victims of Identity Theft, their credit rating can be destroyed due…

    • 735 Words
    • 3 Pages
    Good Essays
  • Good Essays

    25% of registered social networking users had posted sensitive personal data about themselves on their profiles. This included details such as their phone number, home address or email address. (Ofcom social networking sites research/Get Safe Online Report 2007).…

    • 545 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cvcvcvc

    • 436 Words
    • 2 Pages

    consumers make some sort of check for security reassurance on a site before they purchase online.…

    • 436 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NTM Review

    • 454 Words
    • 4 Pages

    Phishing – Emails or queries asking for personal information and can be related to identity theft.…

    • 454 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    We would all agree that posting anyone’s personal information without his/her approval and permission to the Web is undesirable. Many people would also object this behavior and would consider it as a human right harassment and a sale of one’s personal and private information.…

    • 3563 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    presentacia

    • 2041 Words
    • 9 Pages

    McAfee’s recent study found that 95% of 18-23 year olds believe it is dangerous to post personal or intimate information (social security number, banking information about yourself, who you date, personal activities, etc.) yet 47% of them post this type of information online.1…

    • 2041 Words
    • 9 Pages
    Better Essays