Technological Crime Identity Theft

0 / 5. 0

TECHNOLOGICAL CRIME Identity theft

Introduction

It is cyber fraud in this case that of identity theft today computer technologies have developed in their maximum capabilities having as these, many more development and competitiveness between the various countries, appear to belong to more avant -garde areas, security alwaysIt is at possible risk, due to improper uses or computer systems that are scheduled to violate confidential information, which ultimately harms most people because making their banking operations more continuously through mobile platforms

Developing

The main object is to identify how we can prevent risk factors in which, every person for identity theft. It is the prevention for what must be informed of the population especially to the most vulnerable such as older adults, due to their inexperience, with computer platforms they fall into claws of these fraudsters in many cases usurping their identity.

The importance of where this type of crime comes, the factors that intervene to know prevention and make known new techniques to have to strengthen the securities, in our devices such as using new technologies in our favor not only distrust, but also provide both our deviceselectronic and be very aware of all the information received as mails, messages, suspicion bulletins that can be viruses and take advantage of hacking the equipment corresponding to our confidential information mainly the financial

Social problem produced by technological crime for the realization of the selected computer crime. Describe the causes, figures, cases, context in which the crime occurs, people involved: victims, hackers, perpetrators, institutions, company, among others

The identity of a person is the legal personality, with the knowledge of the rights and obligations in a real world, an identity right is essential for every individual who belongs to society and its character by the attribute of human dignity, for whichIdentity theft affects the legal, social and financial scope.

The theft of identity through information technologies, (online), in which cybernetic criminals use tools to access confidential information, through emails with false names of renowned institutions;With the help of elements that damage the computer equipment, which are the uses use as spies obtaining data through piracy and even the most common tasks that are the fraud of the banking sector.

The problem has been unleashed because the updates of the various electronic tools for ease or electronic benches are used much more frequent which can have elements, vulnerable so that any hacker can interrupt high security measures.National for the protection and defense of the users of financial services) the increase of 96% the increase in attack to the banking system, with 1 million 577 thousand 987 claims with an amount of 2,520 million pesos the main point of risk isIt is presented through electronic commerce.

One of the first data of this type of crime according to the National Commission for the Protection and Defense of Users of Financial Services (Condusef), in 2011 they began the attention of complaints that makes a number of 4000 complaints fromAlleged identity theft, which in 2015 presented an elevated figure of complaints to 10000, its considerable increase leading to the financial sector ascended only in the year of 2014 were 762000000 pesos, the most common ones that fell the robberiesIt was in fraudulent operation in the alienation of real estate, such as the most common to obtain personal or automotive loans.

Having sudden growth and a new criminal form, with its surprising evolution in such a short time, the instruments of dissemination and obtaining the distribution of personal data online

In this case, the cyber fraud that will be analyzed is that of identity theft, it must.

conclusion

At the importance of where this type of crime comes, the factors that intervene to know prevention and make known new technique to have to strengthen security, in our device such as using new technologies in our favor not only distrust, but also provide both our deviceselectronic and be very aware of all the information received as mails, messages, suspicion bulletins that can be viruses and take advantage of hacking the equipment corresponding to our confidential information mainly the financial

Bibliography

  • Condusef. (2020). 3.3 million claims for fraud are registered in the first half of the year. 07-29-2020, of Condusef.
  • Barba Alvarez R (2018). Identity theft in Mexico. 07-29-2020, of Law Research in Law, Criminology and Legal Consulting.
  • Consumer Response Center. (2020). Let’s talk about identity theft: a guide.
  • Libien H Pineapple (2005). The computer crimes provided for and sanctioned in the Mexican legal system.

Free Technological Crime Identity Theft Essay Sample

Related samples

Zika virus: Transmission form Introduction The Zika virus belongs to the Flaviviradae family, was found for the first time in a monkey called Rhesus febrile and in...

Zika virus: cases and prevention Introduction The World Health Organization (WHO) has confirmed that Zika is a virus caused through the mosquito bite which is...

Zeus The King of Greek mythology Introduction Zeus is the Olympic God of heaven and thunder, the king of all other gods and men and, consequently, the main figure...

Zeus's punishment to Prometheus Introduction Prometheus, punished by Zeus Prometheus, punished by Zeus. Prometheus is a ‘cousin’ of Zeus. He is the son of the...

Comments

Leave feedback

Your email address will not be published. Required fields are marked *