Identity Theft
Prentice Hall (Verlag)
978-0-13-008275-6 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
This book was designed to help consumers and institutions ward off this ever-growing threat and to react quickly and effectively to recover from this type of crime. It is filled with checklists on who you should notify in case you become a victim and how to recover your identity. As well as, different levels of security on the Internet and what to watch out for, prevention methods for ISPs and methods of testing these prevention techniques. It asks which employees and customers are most at risk and what are your cyber-liabilities if you are a financial institution or employer and answers the questions through deployment of security technologies including biometrics, digital signatures using smart and optical cards, and encryption. Identity theft is one of the fastest growing crimes in the US. This past March, Secret Service agents and Jacksonville County Sheriff's officers arrested a 30-year-old Florida man who authorities allege was trying to sell 60,000 names and personal information of The Prudential Insurance Company of America employees. This is just one of many cases highlighting the extent to which everyone faces the threat of having their identity stolen.
Yet, few publications deal with this topic - leaving most people vulnerable. Worst of all, they don't fully recognize the threat.
JOHN R. VACCA is an information technology consultant and internationally known author of 35 books and over 430 articles, many of them focused on the Internet and security issues. He served as computer security official for NASA's Freedom Space Station program and the International Space Station Program, from 1988 until his early retirement from NASA in 1995, and as security consultant for the MGM movie AntiTrust. Vacca's recent Prentice Hall PTR books include Essential Guide to Storage Area Networks and The Cabling Handbook, 2nd Edition.
Foreword.
Introduction.
Acknowledgments.
I. IDENTITY THEFT FUNDAMENTALS.
1. Identity Theft Defined.
What Is Identity Theft? How Identity Theft Is Done. Where There's Help. Getting Serious About Identity Theft. An Age of Betrayal.
2. Minimizing Your Risk of Identity Theft. Guarding Against Identity Theft to Minimize Your Risk. Basic Security Precautions. Identifying Documents. End Notes.
3. Detecting, Reporting, and Recovering From Identity Theft.
Detecting Your Misappropriated Identity. Reporting ID Theft. Recovering From Identity Theft. When All Else Fails, Sue! Endnotes.
II. IDENTITY THEFT PROTECTION ON THE INTERNET.
4. Identity Theft on the Internet.
Understanding Internet Identity Theft. Types of Associated Internet Identity Theft Crimes. Role of Privacy And Security Policies. Government Action and Public Policy. Endnotes.
5. Prevention Methods for Internet Site Operators.
Inadequate Protection. Identity Theft Is Easy. Battening Down The Hatches. Not Just ISPs. Online Identity Theft and Fraud Prevention. ID Theft and Fraud Protection Plan for E-Business. Preparing Your Site for Any Holiday. Insurance and E-Commerce: Cyberliabilities. International Addresses and AVSs. The Future Benefits. Endnotes.
6. Protecting the Identity Information of Customers.
The Internet Itself. Consumer and Corporate Identity Theft Protection Implementation and Deployment. Identity-Theft-Related Risks and Threats. Web Site Identity Theft Provisions. Web Identity Theft Protection Verification. Endnotes.
7. Internet Site Operator Testing and Performance of Identity Theft Protection Techniques.
Identity Theft Protection Principles. Design and Testing Techniques. Identity Theft and Your Web Site. Endnotes.
III. IDENTITY PROTECTION FOR CORPORATIONS.
8. Protecting the Identity Information of Customers and Employees.
Identity Theft Crimes. Identity Theft Offenders. Which Customers Are at Risk? Internal and External Identity Theft Offenders. Identity Theft Information Protection Measures. Planning for Identity Theft Liability. Endnotes.
9. Guidelines for Protecting the Identity and Confidentiality of Personal Information When Working Outside the Corporate Office.
Other Sensitive Information. Identity Theft Legislation. Removing Records From the Office. Paper Records. Electronic Records. Laptop and Home Computers. Wireless Technology. Telephones and Voice Mail. Email, Faxes, and Photocopies. Conversations Outside the Office. Reporting Requirements.
10. Management of Ongoing Identity Theft Prevention and Protection Techniques.
Management of Electronic Records. Neural Networks. Postfraud. Processing Internet Charges. Rerouting Shipments. Internet Privacy Policies. Endnotes.
IV. IDENTITY THEFT FUTURE SOLUTIONS AND TECHNOLOGIES.
11. Biometrics.
How Biometric Systems Work. Types of Biometrics. Privacy-Enhanced Biometrics-Based Authentication. Biometrics and DNA at Work: Are They Cost Prohibitive for Identity Theft Protection? Benefits. Some Final Thoughts. Endnotes.
12. Digital Signatures: Smart, Optical, and Other Advanced Cards.
Three Levels of Security. A Few Kinks to Work out. Smart, Optical, and Other Advanced Cards. Using Smart Cards to Secure E-Business Applications. Using Biometrics in Smart Card Information and Operations. Optical Memory Cards. The National ID Card: Is Big Brother Watching? Endnotes.
13. Encryption.
What Is Email Encryption and How Does It Work? Symmetric Key Encryption. Asymmetric Encryption. Digital Signatures. Types of Email Encryption Products. Next Steps. Endnotes.
14. E-Commerce Security.
The Vulnerability of Open Networks. Inadequate Privacy Laws, Policies, and Technologies. Privacy Solutions. E-Commerce Fraud Detection Solutions. Endnote.
15. Data Mining.
Information Storage. What Is Data Mining? Examples of Data Mining. The Implications of Data Mining in the Context of Fair. Information Practices. Consumers and Businesses: Choices to Consider. Endnote.
16. Summary, Conclusions, and Recommendations.
Summary. Recommendations. Final Words. Endnotes.
APPENDICES.
Appendix A. Identity Theft Federal Laws Listing.
Identity Theft and Assumption Deterrence Act. Credit Laws.
Appendix B. Identity Theft State Laws Listing.
Appendix C. Identity Theft Reports, Testimony, and Comments Listing.
Reports. Testimony. Comments.
Appendix D. Identity Theft Cases and Scams Listing.
Cases. Scams.
Appendix E. Identity Theft Affidavit.
Appendix F. Glossary.
Index.
Erscheint lt. Verlag | 23.9.2002 |
---|---|
Verlagsort | Upper Saddle River |
Sprache | englisch |
Maße | 178 x 236 mm |
Gewicht | 982 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Recht / Steuern ► Privatrecht / Bürgerliches Recht ► IT-Recht | |
Recht / Steuern ► Strafrecht ► Kriminologie | |
ISBN-10 | 0-13-008275-9 / 0130082759 |
ISBN-13 | 978-0-13-008275-6 / 9780130082756 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich