AllFreePapers.com - All Free Papers and Essays for All Students
Search

Identity Theft in the Philippines

Autor:   •  March 9, 2015  •  Lab Report  •  1,214 Words (5 Pages)  •  1,352 Views

Page 1 of 5

AÑONUEVO, JOSEPH ANTHONY B.                                        ENG501M/T04

MIT/11494824

Topic: Cybercrime: Identity Theft in the Philippines        

Thesis Statement: This essay will explain how identity theft occurs, as well as the classification of identity theft, existing and recommended solutions to address identity theft in the Philippines.

Outline Topic:

1. How identity theft occurs

2.0. Classification of identity theft in the Philippines

2.1 Hacking

2.2 Skimming

2.3 Phishing

3.0 Existing solutions against identity theft in the Philippines

3.1 RA 10173 - Data Privacy Act of 2012

3.2 RA 10175 - Cybercrime Prevention Act of 2012

4.0 Recommended Solution to address identity theft in the Philippines

4.1 Visual Cryptography

4.2 Utilizing cutting edge technologies

4.3 Promoting precautionary guidelines against identity theft


AÑONUEVO, JOSEPH ANTHONY B.                                        ENG501M/T04

MIT/11494824

Cybercrime: Identity Theft in the Philippines

Problem

                Identity theft takes place when criminals or someone steal and exploits personal credentials of other people to commit fraud or engage in other unlawful activities. [1] Identity theft is a fast growing problem not only in the Philippines but across the world. It seems that no matter how to protect personal information, there are criminals who manage to steal it. Likewise with the use of technology to disguise their identities and physical location our local law enforcers find it difficult to identify and capture online identity thieves.

                There are three common classifications of identity theft in the Philippines; according to Chawki and Wahab [2]. Hacking is also called “cyber-trespass”. It allows hackers using a computer and network to gain access and steal individuals’, customers’ and even employees’ confidential information by evading and cracking system electronic security and password.

                Skimming takes place when all the information on the original card has been captured and restored in the technology device called reader used by the thieves [3].  This scenario commonly happens in the restaurant and department store establishments wherein thieves set up their plan.

...

Download as:   txt (7.2 Kb)   pdf (253.2 Kb)   docx (12.8 Kb)  
Continue for 4 more pages »