...IFSM 201 November 16, 2014 Identity Theft The fastest growing financial crime is identity theft, it has affected 500,000-700,000 people in the United States. Identity theft occurs when people steal other people’s information and use the information to apply for credit cards and loans. The different types of information taken from victims can be: bank statements, copies of credit applications, lost or stolen credit cards, physician statements. Identity thieves will impersonate as representatives of government agencies, banks, and even internet service providers to collect social security number, passwords, mother’s maiden names, financial information, and other identifying information. Imposters will use different ways to acquire identity from victims through stealing wallets and purses which contain identification and bank cards. Also imposters will steal mail, which include those annoying preapproved credit offers, bank statements, tax information. Identity theft is serious as any major crimes it has caused people to commit suicide because of the stress and hardship that an individual endures. Identity theft can affect a person a week or even years of hardship and stress. I personally was a victim of identity theft on 2006 resulting in months of hardship and stress. On June 18, 2006 my family and I took a vacation to Philippines for a month and left our house with my brother to look after. As we were enjoying our vacation within two weeks I received a call from my brother...
Words: 1047 - Pages: 5
...Specification for*********, IFSM 201 Due: June 22 Our educational company is a small business with users who will use specialized applications and customized configurations. Staff needs to use desktop computers that are connected together and capable of running sophisticated software programs. The office handles multimedia contents which demand a lot of the PCs’ processor time, resources as well as upload/download contents from the internet. Given the needs of our office, my recommendations are: desktop computers with fast processors preferably, Intel® Core™ i5-4570 Processor (Quad Core, 3.20GHz Turbo, 6MB) plenty of memory (ram); graphic cards for smooth video presentation; video capture cards for multimedia input; and at least 6 USB ports for attaching any extra peripherals. A solid state drive will improve read/write performance of the PCs. A Gigabit Ethernet cards will ensure fast internet speed when uploading or downloading media contents. I have recommended specific details in the following tables, with references to websites where the items can be purchased. Hardware Table: GROUP | DEVICE- Make/Model/Vendor | REQUIRMENTS | INPUT | Key board | US English (QWERTY) Dell KB212-B Quiet USB Keyboard | | | Mouse | Dell MS111 USB Optical Mouse | | | Scanner | HP Officejet Pro 8600 e-All-In-One Printer, Copier, Scanner | scan and edit the photos | | Digital Camera | Canon - Bundle S110 12.1 MP Camera with 5x Wide-Angle...
Words: 921 - Pages: 4
...Information Technology: Identity Theft Name IFSM 201 Date Information Technology: Identity Theft Information technology has without a doubt changed the face of the world today. It has made amazing leaps and bounds in advancement in just the last 10 years alone and is continuing to flourish. Those who once owned personal desktop computers are now sporting portable laptop models, and people now have wireless devices which are both computer and phone combined. Those same devices are used to schedule doctors’ appointments, make bank transactions and buy goods within the cyber world. This whirlwind of technological change has created challenges in protecting personal data. Most users are not thinking security as they rush to purchase the “deal of the day” or conveniently look at x-rays that their physician sent over email. Unfortunately, this is a flawed mentality; important information whether on a device or in a file must be secured to protect an individual from identity theft. One might ask where the roads of technology, identity theft, and ethics intersect. That would be an easy answer. Scammers are anywhere and everywhere, use numerous technological systems to gather information to steal identities, and stealing from someone is not exactly ethical. These seedy individuals are starting to capitalize on the newest technologies while still making millions off of the old. For instance, unethical people may use smart phones application malware, email scams, telephone...
Words: 957 - Pages: 4
...Final Exam Spring 2013 IFSM 201 –Section [insert #] By typing my signature below, I pledge that this is my own work done in accordance with the UMUC policy on academic dishonesty and plagiarism http://www.umuc.edu/policies/academicpolicies/aa15025.cfm. I have not received or given any unauthorized assistance on this assignment/examination _____________________________________ (Typed signature represents actual signature) Instructions: Your responses should demonstrate your understanding of the course content and your analysis and critical thinking; you are not expected to just re-iterate what is in the textbook and the course modules, but to integrate the information and apply it to the specific question. Proper APA style must be used for any citations and references that you use. Place your answers within this document directly below each question (add sufficient space/extra lines as needed) and submit to your UMUC Assignments Folder as an attached MS Word document. This exam is worth 15 points towards the final course grade. Filename: yourlastname Final (example Brown Final) 1. (15%) Design a wireless network for your home network. A. What is a network? A network is group of two or more computer systems linked together. B. Describe how the home network would be used by your family members. A home network would be used by family members that have access to mobile computing devices, printers, and other accessories. Everyone in that family that...
Words: 2012 - Pages: 9
...PC Case Study- Jean Enduser PC Specification Mini Case Jean realized that she has outgrown her old desktop PC system and is in the market for a new one, but is not sure what she needs to buy. She wants to make sure that she gets a desktop PC system that meets her requirements without buying more hardware and software components than necessary. Jean heard that you are taking the IFSM 201 course at UMUC and wants you to help her to decide what type of desktop PC system she should purchase. You and Jean sit down and come up with a list of key tasks that she wants to complete on a regular basis. Jean also defines some capabilities that the desktop PC system needs to have to ensure optimal performance. These tasks and system needs are collectively Jean’s user requirements. The user requirements are as follows: 1. Create documents, spreadsheets, presentations and send and receive e-mail 2. Participate in online chat rooms and video conferences 3. Create, edit and share video and audio files via emails, bulletin boards and in chat rooms 4. Create a small database to store all audio, video and photo data 5. Take high quality digital photos and videos and download them to the PC and scan or edit photos 6. Participate in web courses and forums and browse the web to research new audio, video and photo editing methods 7. Print documents to include photo quality color printing 8. Save documents to...
Words: 369 - Pages: 2
...IFSM 201 Specification for Malcolm Johnson September 14, 2012 |Hardware Components | | |Device Type |Requirements Met | |5 x Dell Vostro 260 MT |Input Device - Workstation |Run Software/Applications | | |Output Device - Screen |Display content | |5 x Dell P2012H LCD | | | | | | | |5 x Logitech C615 |Input Device - Webcam |Participate in online video conferences, web | | | |courses and forums | |5 x USB Keyboard & Mice |Input Device – Keyboard/Mice | | | |Peripheral Device - UPS |Protect PC and components from dirty...
Words: 499 - Pages: 2
...Use of Cookies: Data Collection and Privacy Concerns Merle E. Jones, Jr. UMUC IFSM 201 Abstract This paper explores the uses and privacy issues of cookies a user’s internet browser in tracking daily activity for use of companies for online behavioral advertising (OBA). Using the information gathered, this paper examines the growth of the use of cookies to the eventual privacy control issues that have become common place. Sullivan (2012) discusses the personal data economy and online programs that allow companies to track the online and offline actions of their customers. Kuehn (2013) and Gervais (2014) both go into the government’s reaction and eventual lax policy toward cookies. Kuehn (2013) compares the use of current cookies to the use of deep packet inspection (DPI) that was eventually eliminated, even though cookies raise similar privacy concerns. Keywords: browser cookies, privacy, government, regulation, advertising, information policy Use of Cookies: Data Collection and Privacy Concerns The continued and growing use of the internet has allow the collection of data on a broad spectrum. The gathering of everyday activities online, paired with complex algorithms, has allowed a company to predict what an individual is looking for or what they may be interested in buying in the future. These cookies used for advertising purposes don’t pose that much of a threat, but in the hands of a government or government entity, the privacy concerns become more noticeable. ...
Words: 937 - Pages: 4
...The Proper and Ethical Application of Biometrics IFSM 201 – A Practical Introduction to Computers and Communications As the advancement of technology continues to flourish within the modern age, so too have the capabilities and ruthlessness of predators looking to exploit the weaknesses of some for their own personal gains. In order to safeguard and protect the privacies of technological users, technology has also adapted its growth to find better and more fail safe measures by which to guard the individual users. Having evolved from rudimentary passwords, to pin codes and card readers, to encrypted data relying on the application of the aforementioned safeguards, one of the newest and more failsafe applications to guard a person or companies privacy has become the application of biometrics. Biometric devices have helped institute a safeguard that, while not completely “hack proof,” is exponentially harder to replicate as it requires almost 100% reproduction on an individual’s personal body characteristics. Using a variety of biometric devices, a person or company can safeguard their privacies by relying on the one thing they think is immune to a host of scams to gain access – themselves. While the applications of such devices are gaining a stronger foothold among the masses, now enters an additional task to the workforce. Employers and individuals must ensure that they are using the technology practically, and ethically, in order to achieve maximum results without...
Words: 921 - Pages: 4
...Final Exam "OL1" Spring 2014 IFSM 201 –Section 6391 By typing my signature below, I pledge that this is my own work done in accordance with the UMUC policy on academic dishonesty and plagiarism http://www.umuc.edu/policies/academicpolicies/aa15025.cfm. I have not received or given any unauthorized assistance on this assignment/examination _____________________________________ (Typed signature represents actual signature) Instructions: Your responses should demonstrate your understanding of the course content and your analysis and critical thinking; you are not expected to just re-iterate what is in the textbook and the course modules, but to integrate the information and apply it to the specific question. Proper APA style must be used for any citations and references that you use. Place your answers within this document directly below each question (add sufficient space/extra lines as needed) and submit to your UMUC Assignments Folder as an attached MS Word document. This exam is worth 15 points towards the final course grade. Filename: yourlastname Final (example: Brown Final) 1. (15%) Design a wireless network for your home network. A. What is a network? B. How will you and your family members use a home network? C. Name at least five devices you would connect to your network. D. In order to fully implement your home network, what types of hardware, software, connectivity components, etc., would be required? E. Security issues will be needed. What...
Words: 747 - Pages: 3
...Understanding The Concept of Protecting Personal Information (PPI) IFSM 201 6381 Concepts and Applications of Information Technology (2158) University of Maryland University College Understanding The Concept of Protecting Personal Information (PPI). Personally Identifiable Information or PII is information that can be used to distinctively identify, contact, or locate an individual. PPI is sensitive information that is associated with a person. These information should be accessed only on a strict need-to-know basis and handled and stored with great care. Personally identifiable information is information that can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc., alone, or when combined with secondary personal or secondary identifying information that is linked or linkable to a specific individual, such as date and place of birth, mother's maiden name, etc. Most companies keep sensitive personal information in their hard copy files such as names, addresses, gender, social security numbers, credit card, or other account data that uniquely identifies customers or employees (Heller, 2001, p. 1). This information is often necessary to complete customers’ orders, meet payroll, or perform other important business functions. However, if sensitive information gets into the wrong people, there is every tendency that it can lead...
Words: 942 - Pages: 4
...HIPPA PII Protection IFSM 201 Due 04 Oct 2015 Everyone has heard about HIPPA, which is the common acronym for the Health Insurance Portability and Accountability Act. This federal regulation has three priorities that focus on are protecting the confidentiality, integrity, and availability (CIA) of patient electronic protected health information (EPHI), guarding against reasonable possible expectable threats to the security or integrity of said EPHI, and protecting EPHI against unauthorized disclosure (National Institute of Standards and Technology, 2008) . The protection of the CIA of EPHI is important because our patients rely on this information’s accuracy and availability in emergency situations for use by medical professionals, while the confidentiality is important to ensure this personal information does not fall into the wrong hands and to ensure the patient’s civil rights are not violated. There have been many recent high level HIPPA violations recently. Some of the most damaging breaches that released the most protected personal information (PII) occurred at the Department of Veterans Affairs. In 2013 one of the largest known EPHI/PII breaches at the VA was discovered through the conduct of a thorough investigation and reported by Steven Marco of HIPAAOne.com that “found there were an astounding 14,215 violations that affected 101,018 veterans and 551 VA employees at 167 facilities since 2010. These violations included using patient information...
Words: 989 - Pages: 4
...Personally Identifiable Information IFSM 201 Everyone in today’s society is at risk for identity theft or other fraudulent actions against them using unauthorized use of their personally identifiable information. Luckily, there are many different ways to prevent such actions. The Department of Homeland Security defines” personally identifiable information (PII) as any information that permits the identity of an individual to be directly or indirectly inferred, including any information that is linked or linkable to that individual, regardless of whether the individual is a U.S. citizen, legal permanent resident, visitor to the U.S., or employee or contractor to the Department.” (Callahan, 2012). Some Personally identifiable information that can be used to cause harm on their own are social security number, driver’s license number, password number, alien registration number, etc. Other PII that can be used to cause harm when combined with other information are: name, email address, home address, date of birth, last 4 digits of social security number, mother’s maiden name, account passwords, phone number etc. There are numerous ways to combine someone’s information and gain access to private information. Unfortunately most PII are not difficult to get access to, because these information are use in everyday activities. Whether it is the doctor’s office that basically has all PII on a person or the lawyers office or a store that a credit card was used to purchase something...
Words: 1070 - Pages: 5
...PC VERSUS MAC Quinston B. Barfield University of Maryland University College IFSM 201 E222 Concepts and Applications of Information Technology (2148) Abstract Mac vs. PC has been a debate for over 20 years on which is better for conventional use. Since the creation of PC and the birth of MAC, many owners of both have arguable stated that one is better than the other. The truth of the matter is that it is simply based off user preference. Both offer a myriad of tools necessary to accommodate any need that you may have, whether it's for business use or just gaming. Based on the information researched on the operating systems, technical specifications, reliability, and user options PC vs. MAC I will have made my verdict on which is ranked number 1. PC Versus MAC Over the last decade, many computer users have argued that PC is better than MAC and MAC is better than PC. Although it is difficult to prove, there are a facts about both that may have their users in the emotional state about who's better. This very debate has ruined friendships, business and inspired some controversial yet creative advertisement, but with all of the debates not many users understand the difference between them. With assistance from a few sources I will share why this debate has yet to be solved. The difference between the Operating Systems The operating system is what significantly separates the two, Windows versus OS X Mavericks. "OS X is the operating system...
Words: 1302 - Pages: 6
...Cookie Types and Ethics of Their Use Matthew Fones IFSM 201 06/30/2013 The purpose of this research paper is to identify and explain three commonly seen cookies used on the Internet, along with identifying any potential ethical issues with such activities. The two most commonly used cookies are session cookies, persistent cookies. I will also describe a third type of cookie known as a flash cookie. First I will define what a computer cookie is. A cookie is a piece of text that a Web server can store on a user's hard disk or equivalent. Cookies allow a Web site to store information on a user's machine and later retrieve it (Brain, 2000). Cookies are created when a user's browser loads a particular website. The website sends information to the browser which then creates a text file. Every time the user goes back to the same website, the browser retrieves and sends this file to the website's server. Without cookies, websites and their servers have no memory. Computer Cookies are created not just by the website the user is browsing, but also by other websites that run ads, widgets, or other elements on the page being loaded. These cookies regulate how the ads appear or how the widgets and other elements function on the page. The first type of cookie to be described is the session cookie. This type of cookie allows users to be recognized within a website so any page changes or data selection you do is remembered from page to page. The most common example of this functionality...
Words: 1311 - Pages: 6
...The Dangers of Identity Theft Sharae Ernst IFSM 201 – Summer 2012 8/3/2012 “Identity theft occurs when someone uses your personally identifying information (PII), like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.” (Fighting Back Against Identity Theft: Federal Trade Commission). According to the Federal Trade Commission, identity theft complaints have decreased since year 2008 (314,521 to 250,854). It is estimated by the FTC that as many as 9 million Americans have their identities stolen each year. As information technology progresses along with society, there is always an increased risk of having one’s identity stolen. “Identity theft was the number one complaint category in the CSN for calendar year 2010 with 19% of the overall complaints, followed by Debt Collection (11%); Internet Services (5%); Prizes, Sweepstakes and Lotteries (5%); Shop-at-Home and Catalog Sales (4%); Imposter Scams (4%); Internet Auction (4%); Foreign Money Offers and Counterfeit Check Scams (3%); Telephone and Mobile Services (3%); and Credit Cards (2%).” (Consumer Sentinel Network Data Book: For January - December 2010, 2011). Although the numbers have slightly decreased, overall, identity theft is on the rise. “According to a February 2012 Javelin Study, identity theft rose 13% from 2010 to 2011. More than 11.6 million adults became a victim of identity theft in the United States during 2011.” (Coping with Identity Theft:...
Words: 1352 - Pages: 6