90 likes | 191 Views
IT Consultant Project. By Justin Groc. IT Professional I Consulted to. Position: Vice President of IT Operations Oversees all of the electronic online commerce when servicing other businesses within the company. Company: First Data Corporation
E N D
IT Consultant Project By Justin Groc
IT Professional I Consulted to • Position: Vice President of IT Operations • Oversees all of the electronic online commerce when servicing other businesses within the company. • Company: First Data Corporation • FDC is a payment processing company where provided is electronic commerce along with payment solutions. They provide fraud protections and authentication solutions.
What I Researched • I was requested to research for his department the ways that identity theft is indeed a constant occurring crime during electronic commerce and ways in which it could be prevented. • A little snippet from my interview: • “… I would like you to research statistics dealing with identity theft. Look for… help [that makes] online commerce flow more safely while avoiding theft. I would like to know how we can stay on top of our job in providing safer and more efficient transactions…”
Identity Theft Defined in Two Ways Existing-Account Fraud New-Account Fraud • Occurs when an existing credit or debit card is stolen, and then used to purchase goods and services. • Occurs when a thief uses personal identifying data to open a new account. (Roberds & Schreft, 2008)
Threats Within an Organization • Devices that support universal serial bus (USB) are threats because of their easy ability to transfer information, software, and applications on the go. • 86% of IT workers cited USB flash drive use • While nearly 50% of IT staff surveyed took no avoiding measures against iPod use in the office (Sarrel, 2008). • Organizations should seriously consider what they download and install especially if the software is from a third-party company.
Prevention • Make the network easy to scan for vulnerability issues. • Manage and update all patches frequently. • Providing a usable graphic user interface (GUI) is the most important consideration when selecting a patch-management system (Sarrel, 2008).
A Responsive Plan • A framework for investigation of any crime requires recorded artifacts of evidential value and creating profiles with listed suspects for potential identity thefts (Angelopoulou, 2007). • Should comprise of: • Prevention and Detection • Reaction • Investigation of Incidents
Rounding it All Out… • Having threat-management strategies to combat security risks will help the company comply with corporate policies that deal with government regulations (Qiu & Diney, 2005). • The Federal Trade Commission regulates commercial e-mails, online advertising, and consumer privacy. • In order to always have customers protected, a company must integrate a whole threat management solution for customers and set it up to align with business management goals (Markowitz, 2006).
Relevant Sources • Angelopoulou, O. (2007). Online ID theft techniques, investigation and response. Inderscience Publishers, 1 (Volume 1, Number 1/2007), 76-88. Retrieved April 10, 2010, from http:// inderscience.metapress.com/app/home/contribution.asp? referrer=parent&backto=issue,7,10;journal,9,9;linkingpublicationresults, 1:120736,1 • Roberds, W., & Schreft, S. (2009). Data security, privacy, and identity theft: The economics behind the policy debates. Economic Perspectives, 33(1), 22-30. Retrieved from Academic Search Premier database. • Markowitz, E. (2006). Get involved in security. eWeek, 23(22), 23. Retrieved from Academic Search Premier database. • Qiu, H., & Dinev, T. (2005). IS SPYWARE AN Internet Nuisance or Public Menace?. Communications of the ACM, 48(8), 61-66. Retrieved from Academic Search Premier database. • Vijayan, J. (2005). Training Needed to Halt 'Spear-Phishing' Attacks. Computerworld, 39(34), 6. Retrieved from Academic Search Premier database.