Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

ldentity Theft 5 days ago Identity theft, where people steal personal informa- t

ID: 3699122 • Letter: L

Question

ldentity Theft 5 days ago Identity theft, where people steal personal informa- tion, continues to be a problem for consumers and businesses. Several nationally known companies have been breached and sensitive personal informa- tion such as credit card numbers, names, address- es, and social security numbers were stolen. Assume that you are the database administrator for a large nationally known corporation with a large database that is accessible from the Web. List what steps you would implement to prevent people from stealing personal information from the corporate database and why you chose those steps minimum of 5). 1. 2. 3. 4. 5. Minimum 300 of your own words. Follow the num bering scheme above (-10 pts. if missing)

Explanation / Answer

Answer)

Identity theft is a big issued in which the attacker issues an attack and steals the identity of people so that he can use their name to gain something or even some financial gains or obtain credit and other benefits in the other person's name, so this leads to the other original person's loss and this this has many consequences and is a serious issue.

Identity theft generally occurs when the attacker steals the identity of the person and uses the name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. Thus this is a sensitive issue and must be protected and prevented against. As a database administrator of a large corporation we have to secure the data int our database against all of these attacks.

Five ways in which we can prevent or implement the prevention policy so that people cannot steal personal information from the corporate database are:

1) Access Controls: We have to implement password protection and access control so that not everybody can access the database, and only verified and authorized users can access the information on the database.

2) Encryption of the Database: We have to implement the encryption of the database. Upon encryption, the database becomes safer as the attacker even if he access to the database, the information will be unusable and cannot be read until decrypted.

3) Minimizing the Stored information on the Database which can be attacked : The most important of all the database which can be attacked shouldn't store many information which are unnecessary or can be worked without. Thus, we have to work with information such that minimal information required for the operation should be stored and not above that.

4) Antivirus software and Firewall : Antivirus software and Firewall should be implemented to secure the database and the system and a robust system should be in place to handle all the attacks which can appear from the outside as well as from the inside of the corporation.

5) Setting up Policies and Procedures and training users: Setting up the Policies and Procedures on privacy, security is mandatory for the users and on the other hand we have to train and share the knowledge to the users so that they can understand and practice the precautions to protect their information against identity and data theft.