Catalog

Record Details

Catalog Search



Available copies

  • 1 of 1 copy available at Evergreen Indiana.

Current holds

0 current holds with 1 total copy.

Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Starke Co PL - Schricker Main Library (Knox) 364.16 VAC (Text) 30032010315643 ADULT NON-FICTION Available -

Record details

  • ISBN: 0130082759 (pbk.) :
  • Physical Description: xxxi, 475 pages : illustrations ; 24 cm
  • Publisher: Upper Saddle River, NJ : Prentice Hall PTR, [2003]

Content descriptions

Bibliography, etc. Note:
Includes bibliographical references and index.
Subject: False personation > United States.
False personation > United States > Prevention.
Loading...

Foreword.
Introduction.
Acknowledgments.

I. IDENTITY THEFT FUNDAMENTALS.

1. Identity Theft Defined.
What Is Identity Theft? How Identity Theft Is Done. Where There's Help. Getting Serious About Identity Theft. An Age of Betrayal.

2. Minimizing Your Risk of Identity Theft. Guarding Against Identity Theft to Minimize Your Risk. Basic Security Precautions. Identifying Documents. End Notes.
3. Detecting, Reporting, and Recovering From Identity Theft.
Detecting Your Misappropriated Identity. Reporting ID Theft. Recovering From Identity Theft. When All Else Fails, Sue! Endnotes.

II. IDENTITY THEFT PROTECTION ON THE INTERNET.


4. Identity Theft on the Internet.
Understanding Internet Identity Theft. Types of Associated Internet Identity Theft Crimes. Role of Privacy And Security Policies. Government Action and Public Policy. Endnotes.

5. Prevention Methods for Internet Site Operators.
Inadequate Protection. Identity Theft Is Easy. Battening Down The Hatches. Not Just ISPs. Online Identity Theft and Fraud Prevention. ID Theft and Fraud Protection Plan for E-Business. Preparing Your Site for Any Holiday. Insurance and E-Commerce: Cyberliabilities. International Addresses and AVSs. The Future Benefits. Endnotes.

6. Protecting the Identity Information of Customers.
The Internet Itself. Consumer and Corporate Identity Theft Protection Implementation and Deployment. Identity-Theft-Related Risks and Threats. Web Site Identity Theft Provisions. Web Identity Theft Protection Verification. Endnotes.

7. Internet Site Operator Testing and Performance of Identity Theft Protection Techniques.
Identity Theft Protection Principles. Design and Testing Techniques. Identity Theft and Your Web Site. Endnotes.

III. IDENTITY PROTECTION FOR CORPORATIONS.


8. Protecting the Identity Information of Customers and Employees.
Identity Theft Crimes. Identity Theft Offenders. Which Customers Are at Risk? Internal and External Identity Theft Offenders. Identity Theft Information Protection Measures. Planning for Identity Theft Liability. Endnotes.

9. Guidelines for Protecting the Identity and Confidentiality of Personal Information When Working Outside the Corporate Office.
Other Sensitive Information. Identity Theft Legislation. Removing Records From the Office. Paper Records. Electronic Records. Laptop and Home Computers. Wireless Technology. Telephones and Voice Mail. Email, Faxes, and Photocopies. Conversations Outside the Office. Reporting Requirements.

10. Management of Ongoing Identity Theft Prevention and Protection Techniques.
Management of Electronic Records. Neural Networks. Postfraud. Processing Internet Charges. Rerouting Shipments. Internet Privacy Policies. Endnotes.

IV. IDENTITY THEFT FUTURE SOLUTIONS AND TECHNOLOGIES.


11. Biometrics.
How Biometric Systems Work. Types of Biometrics. Privacy-Enhanced Biometrics-Based Authentication. Biometrics and DNA at Work: Are They Cost Prohibitive for Identity Theft Protection? Benefits. Some Final Thoughts. Endnotes.

12. Digital Signatures: Smart, Optical, and Other Advanced Cards.
Three Levels of Security. A Few Kinks to Work out. Smart, Optical, and Other Advanced Cards. Using Smart Cards to Secure E-Business Applications. Using Biometrics in Smart Card Information and Operations. Optical Memory Cards. The National ID Card: Is Big Brother Watching? Endnotes.

13. Encryption.
What Is Email Encryption and How Does It Work? Symmetric Key Encryption. Asymmetric Encryption. Digital Signatures. Types of Email Encryption Products. Next Steps. Endnotes.

14. E-Commerce Security.
The Vulnerability of Open Networks. Inadequate Privacy Laws, Policies, and Technologies. Privacy Solutions. E-Commerce Fraud Detection Solutions. Endnote.

15. Data Mining.
Information Storage. What Is Data Mining? Examples of Data Mining. The Implications of Data Mining in the Context of Fair. Information Practices. Consumers and Businesses: Choices to Consider. Endnote.

16. Summary, Conclusions, and Recommendations.
Summary. Recommendations. Final Words. Endnotes.

APPENDICES.


Appendix A. Identity Theft Federal Laws Listing.
Identity Theft and Assumption Deterrence Act. Credit Laws.

Appendix B. Identity Theft State Laws Listing.
Appendix C. Identity Theft Reports, Testimony, and Comments Listing.
Reports. Testimony. Comments.

Appendix D. Identity Theft Cases and Scams Listing.
Cases. Scams.

Appendix E. Identity Theft Affidavit.
Appendix F. Glossary.
Index.


Additional Resources