Sunday, October 25, 2009

Protect Yourself from Cyber Identity Theft

To Protect Yourself from Cyber Identity theft you must know What Is Online Identity Theft? Using Information on the Internet for Identity Theft and for online transaction, take a moment to review a Web site's privacy policy. Read more about t is Cyber Identity Theft at http://www.webopedia.com/didyouknow/Internet/2006/identity_theft.asp
Cyber Identity Theft is a Cyber Crime is an act of criminals impersonate individuals for financial gain. If a Cyber thief is able to access your secret information such as social security numbers, a signature, name, address, phone numbers, and even banking and credit card information, he or she can use it to commit fraud in your name. Using this confidential information the Cyber thief could apply for loans or new credit card accounts.
Cyber Identity theft can also go beyond this type of a monetary impact. Thieves can use your information to obtain a driver's license or other documentation that would display their photo but your name and information. With these documents thieves could to obtain a job and file fraudulent income tax returns, apply for travel documents, file insurance claims, or even provide your name and mailing address to police and other authorities if involved in other criminal activities.
Learn the terms like
Security: In the computer industry, refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.
Cyber forensics: The application of scientifically proven methods and to use digital evidence to provide a conclusive description of Cyber Crime activities.
Phishing: The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for Cyber Identity theft.
E-mail spoofing: Forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source.

No comments:

Post a Comment