What Is Privacy And Identity?

1764 Words4 Pages

Group II project Paper (Kehinde A., Taiwo A., Daniel W. and Chevell D.) Mrs. Vinzanna Leysath Database Management-Group II Project (Privacy & Identity) Technology has made life so easy in this present generation to the extent that, we can do virtually almost with it. We can now use technology to protect our privacy and our identity from been stolen. People use passwords, biometrics and other forms of security measures to hide their possessions which include their identity, privacy and valuable properties. While technology has a great advantage when it comes to securing one’s privacy and identity, one of its disadvantages is that privacy identity thieves can still find a way to use technology to intrude people’s privacy and steal their identity. …show more content…

Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver 's license numbers, in order to impersonate someone else. It the fraudulent acquisition and use of a person 's private identifying information, usually for financial gain. One’s privacy would be intruded when his identity is been stolen. Identity theft is sometimes confused with other crimes that lead to identity theft. For example, when a thief copies your credit card information just to steal your money, that is not identity theft, it is a financial crime. A good example of identity theft is when someone steal or forge your identity card or social security card/number for the purpose of pretending to be you that and/or for financial purpose. Many people’s Facebook page have been hacked just because the hacker wants to pretend to be the real account owner. After succeeding in hacking into the Facebook page, the hacker can chat with the real account owner’s …show more content…

Password manager. Two-step verification This step is also known as two-factor authentication. It adds an additional layer of protection to the user’s password. It requires users to have extra credentials other than just a password to access an online account. Two-step verification normally requires users to know their password, and have a specific mobile device. Some social media have started introducing the two-step verification for example LinkedIn and twitter. Two-step verification reduces the chances of hackers bumping into your privacy as it critically make sure that only the authenticated user have access to it. Biometric technology Biometric is a device that can recognize someone 's unique physical trait, for example fingerprints, eyeball, face, or voice and it uses them as a means of authentication to gain access to something. Hackers can never gain access to someone’s privacy who uses biometric as a means of gaining access to his/her privacy. Biometric is the surest thing that can never be compromised, if it’s being done correctly because it is attached to the natural inbuilt quality of the user. In order for hackers to use it, they must go through an extra ordinary mile which could lead to other crimes like kidnapping or

More about What Is Privacy And Identity?

Open Document