Question: Case Study Due 1 0 / 0 3 Consider this case of an intrepid identity thief. The perpetrator, Jane, encounters the victim, John, online in

Case Study Due 10/03
Consider this case of an intrepid identity thief. The perpetrator, Jane, encounters the victim, John, online in a chat room. John is using his real first name but only his last initial. However, over a series of online conversations between Jane and John, he does reveal personal details about his life (marital status, children, occupation, region he lives in, and so forth). Eventually, Jane offers John some piece of information, such as perhaps an investment tip, as a trick to get Johns email address from him. Once she gets his email address, an email exchange begins outside of the chat room, wherein Jane purports to give John her real name, thus encouraging John to do the same. Of course, the perpetrators name is fictitious, such as Mary. But Jane now has Johns real name, city, marital status, occupation, and so on.
Jane can try a number of options, but in this case she begins by using the phone book or the Web to get Johns home address and phone number. She can then use this information to get Johns Social Security number in a variety of ways. The most straightforward would be to go through Johns trash while he is at work. However, if John works in a large company, Jane can just call (or enlist someone to call), claiming to be Johns wife or another close relative, wanting to verify personnel data. If Jane is clever enough, she may come away with Johns Social Security number. Then it is a trivial matter to get Johns credit report and to get credit cards in his name.
From this scenario, consider the following questions:
What reasonable steps could John have taken to protect his identity in the chat room?
What steps should any employer take to prevent being unwittingly complicit in identity theft?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!