Computer Security Assignments | Online Homework Help
Information Security – Final Project Specifications
Part 1
For your final project assignment, you are asked to locate an article on your choice of one course related topic and summarize this article in 4-6 paragraphs (2-3 pages, double-spaced). In addition to explaining the contents of the article, you are asked to explain why this topic is important and how this article relates to this course. This must be in YOUR OWN WORDS.
The project will have THREE SECTIONS:
1) A description or summary of the article you have selected.
2) A paragraph in YOUR OWN WORDS explaining the importance of this topic and why you believe this topic relates to this course.
3) A link to the site where you found your article.
**You will also be asked to present this topic on the last day of class**
Grading rubric:
Title page (name/course/date) | 10% |
Summary of the contents of the article | 30% |
Explanation of the importance of this topic and why you believe this topic relates to this course | 40% |
Reference Link (or citation) | 10% |
Quality of Presentation | 10% |
CT 6111 – Information Security – Final Project Specifications
Part 2
Illegally Creating a New Identity (How Far Can You Go?)
Creating a new identity explains in detail how people use the borrowed identity for fraud. There are fundamentally three types of identities (other than the one you’re born with); Created, Forged, and Stolen.
- With created identities, you establish the paperwork needed to make the identity legal, and from that point on you are essentially that person.
- With forged identities, you create the minimal IDs, instead of applying through the state or government.
- With stolen identities, you take over another person’s ID (living or deceased) in order to abuse their specific credit.
From the point you transfer his or her identity to you, you are that person. This process is more complicated if you have a criminal record (and thus have fingerprints on record). This can be problematic if caught with the stolen identity, since the authorities think they have someone else.
Project Plan
- Research the process to assume a new identity in the United States.
- Provide a step-by-step checklist for someone to follow (which will prove how easy this process is for identity thieves).
- List the type of information you can find on any person you are searching for on the Internet.
- Detail your findings by compiling a list of websites that you used to gather personal data on your target.
- Compile a list of data broker agencies/sites that collect data on citizens.
You will be asked to present your findings and research at the end of this exercise.