1,908
24
Essay, 2 pages (250 words)

Protecting information resources

Protecting Information Resources Two examples of a computer crime or fraud include infiltrating computer system and inserting a virus or other pollutant into a computer network.
One recommendation for preventing or reducing ID theft is protecting one’s Social Security Card by refraining from carrying it when not necessary. Holders should not carry their Social Security Cards in their wallets or purses. Writing one’s social security number on a cutout paper and putting it in a wallet or purse is just as risky.
Another recommendation is safeguarding one’s PINs. ATM cards, social security cards, online bank accounts, and registration cards have personal identity numbers that on should always secure. A highly discouraged method of securing these numbers is writing them down on cutout papers and keeping them in one’s wallet or purse. Instead, one should memorize one’s PIN to prevent an identity thief from determining it.
A third recommendation is analyzing one’s credit releases. To know about possible identity thefts, one should go through his or her credit reports regularly to view transactions, registrations, approvals, and any previous activity on one’s cards or accounts. Regular analysis hinders potential harm since one detects identity theft promptly.
Fourthly, shredding documents with one’s personal information or numbers is a critical and safe way of disposing it. A shredding machine is the simplest, relatively cheap, and best way to safeguard oneself from dumpster divers. One hinders identity thieves from getting personal information from one’s trash by shredding document such as preapproved cards, checks, bank declarations, and deposit slips.
Lastly, checking one’s mail early lowers exposure to mail theft. One can ask the post office to hold your mail when one has traveled for a given period. Also locking the mailbox prevents thieves from accessing mail with personal information.

Thank's for Your Vote!
Protecting information resources. Page 1
Protecting information resources. Page 2
Protecting information resources. Page 3

This work, titled "Protecting information resources" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Protecting information resources'. 16 November.

Reference

AssignBuster. (2021, November 16). Protecting information resources. Retrieved from https://assignbuster.com/protecting-information-resources/

References

AssignBuster. 2021. "Protecting information resources." November 16, 2021. https://assignbuster.com/protecting-information-resources/.

1. AssignBuster. "Protecting information resources." November 16, 2021. https://assignbuster.com/protecting-information-resources/.


Bibliography


AssignBuster. "Protecting information resources." November 16, 2021. https://assignbuster.com/protecting-information-resources/.

Work Cited

"Protecting information resources." AssignBuster, 16 Nov. 2021, assignbuster.com/protecting-information-resources/.

Get in Touch

Please, let us know if you have any ideas on improving Protecting information resources, or our service. We will be happy to hear what you think: [email protected]