How people use the borrowed identity for fraud


Information Security Project Assignment

Part 1

For your final project assignment, you are asked to locate an article on your choice of one course related topic and summarize this article in 4-6 paragraphs (2-3 pages, double-spaced). In addition to explaining the contents of the article, you are asked to explain why this topic is important and how this article relates to this course. This must be in YOUR OWN WORDS.

The project will have THREE SECTIONS:

1) A description or summary of the article you have selected.
2) A paragraph in YOUR OWN WORDS explaining the importance of this topic and why you believe this topic relates to this course.
3) A link to the site where you found your article.

Part 2

Illegally Creating a New Identity (How Far Can You Go?)

Creating a new identity explains in detail how people use the borrowed identity for fraud. There are fundamentally three types of identities (other than the one you're born with); Created, Forged, and Stolen.

• With created identities, you establish the paperwork needed to make the identity legal, and from that point on you are essentially that person.

• With forged identities, you create the minimal IDs, instead of applying through the state or government.

• With stolen identities, you take over another person's ID (living or deceased) in order to abuse their specific credit.

From the point you transfer his or her identity to you, you are that person. This process is more complicated if you have a criminal record (and thus have fingerprints on record). This can be problematic if caught with the stolen identity, since the authorities think they have someone else.

Project Plan

1) Research the process to assume a new identity in the United States.

2) Provide a step-by-step checklist for someone to follow (which will prove how easy this process is for identity thieves).

3) List the type of information you can find on any person you are searching for on the Internet.

4) Detail your findings by compiling a list of websites that you used to gather personal data on your target.

5) Compile a list of data broker agencies/sites that collect data on citizens.

You will be asked to present your findings and research at the end of this exercise.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: How people use the borrowed identity for fraud
Reference No:- TGS02987953

Expected delivery within 24 Hours