click below
click below
Normal Size Small Size show me how
Identify theft
| Question | Answer |
|---|---|
| Spy ware | software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. |
| Dumpster Diving | Is a salvaging from large commercial,residential and construction containers |
| Firewall | Is a network security device that monitors and filters incoming and outgoing network traffic |
| Forgery | The action of forging or producing a copy of a document |
| Fraud | Criminal deception intended to result in financial or personal gain |
| IdentityTheft | When someone steals someone’s identity |
| Peer-to-Peer(P2P) | Computer systems connected to each other |
| Phishing | The fraudulent practice of sending emails purporting to be from reputable companies |
| ShoulderSurfing | Is a criminal practice word thieves steal your personal data by spying over shoulder are use a laptop |
| Snail Mail | The ordinary postal system as a post to email |
| Scams | A dishonest scheme, a fraud |
| Anti- virus software | A computer program used to prevent detect and remove malware |
| Better business bureau | Is a private nonprofit organization whose self described mission is to focus on advancing marketplace trust |
| Federal Trade Commission | Is an independent agency of the United States government who is principal mission is enforcement of civil US antitrust law |
| Equifax | Is a credit bureau |
| TransUnion | Is an American consumer credit reporting agency |
| Experian | Is an Anglo Irish multi national consumer credit reporting company |
| Internal Revenue Service | Is the revenue service of the United States federal government responsible for collecting taxes and administering the internal revenue code |
| Solicitations | The act of asking for or trying to obtain something from someone |
| Spam | A Publicly traded company that continues operations despite a merger or bankruptcy |