Self study 1 Task. Work with the article which is not related to your specialty



Download 20,17 Kb.
Sana11.03.2021
Hajmi20,17 Kb.
#61394
Bog'liq
Self-study 1


SELF STUDY 1

Task. Work with the article which is not related to your specialty.

Choose 1 article on your specialty. The article should be of 200-250 words long.

1. Put five special questions to the article to cover the plot. (2 points per each correct question) Total score: 10 Points

2. Write 5 True/False questions. 20 points.

Total: 30 points

The structure of your task:

Title of the article : https://www.genworth.com.au/information-safety/



(The name of the website where the article was published)

Information safety
Like many other businesses, Genworth may be the target of consumer security attacks or become the victim of the unauthorised use of our name and logo as part of a consumer fraud or identity theft crime. Additional safeguard information relating to methods of identity theft, other consumer frauds and identity theft help can be found below.
Methods of identity theft
The growing popularity and reliance on the internet for financial transactions and other dealings has led to a related increase in online theft and fraud. Some criminals are out to steal your money; others are out to steal your identity.
Identity theft: capturing and misusing another's personal information
Identify theft occurs when someone wrongfully obtains and uses another person's personal information to commit a crime. The fraud typically involves trying to open new accounts using the victim's identity (which can wreak havoc on the victim's credit), or misappropriating the victim's existing accounts.
Some frauds use elaborate hoaxes with counterfeit cheques from real companies. Others entail rummaging through your trash looking for discarded statements from your bank. No matter the technique, they're all looking for valuable information about you: tax file numbers, medicare numbers, driver's license numbers, credit card numbers, and bank account numbers. Whether it's identity theft, or old-fashioned robbery, stay on your guard.
Fraudulent techniques used to steal your personal information
Pharming - a criminal 'pharms' for your information by redirecting you to a sham web site without your knowledge or consent. The sham web site may look like the actual site you had intended to visit -- and likely will include legitimate company logos and trademarks. By duping you into believing the sham is legitimate, the aim is to get you to provide your confidential personal information such as account numbers and passwords.
Phishing - someone 'phishes' for your information by sending emails designed to appear as if they come from a legitimate source. They often will include company logos and trademarks as bait to lure the recipient into believing the email is legitimate. The email may even contain a link to a spoof copy of the legitimate website. Email recipients are asked to 'update' personal information such as account numbers and passwords.
Skimming - 'skimmers' are electronic devices that capture personal or account information from your credit card, driver's license, or even a passport. If your card is swiped through a skimmer, the information contained on your card's magnetic strip is stored on the skimmer or an attached computer. Pay close attention to retail clerks who may have skimmers in addition to a legitimate machine by which your legitimate transaction is recorded.
Shoulder surfing - this is often as simple as looking over someone's shoulder at automated teller machines, cybercafés, airport kiosks, etc., but shoulder surfing also can be done from a distance using binoculars or high-tech gadgetry. Miniature closed-circuit television cameras can be (and have been) concealed in ceilings, walls or fixtures to capture data entry. Spyware, malware and computer viruses - these are computer programs loaded on to your computer, generally through the Internet and without your knowledge or consent. Some programs impair the performance of your computer; while others collect data that you type such as passwords, account numbers, etc. One of the most effective ways to prevent malware is to keep your computer protected with the latest patch updates and anti-virus software
Dumpster diving - this describes people rummaging through your trash to find unshredded information like credit card offers, old bills and bank statements.(200-300 words)

Special questions:

1. What are the reasons of increase in online theft and fraud?

2. How the word “identity theft” can be defined?

3. What explanation can be the best for the term “pharming”?

4. What is the device which can be called as “skimmers”?

5. How computers can be prevented from malware?

True/False

  1. Fraudulent techniques did not use to steal your personal information.

  2. Identity theft is capturing and misusing another`s private information.

3. Skimmers are electronic devices that can steal information from your credit card.

4. People whose actions can be described as “dumpster diving” are the ones who deal with spreading computer viruses.

5. Some programs may collect data that you type such as passwords, account numbers and others.
Download 20,17 Kb.

Do'stlaringiz bilan baham:




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish