Topic > Physical Theft Essay - 2819

Physical theft of your device or information can occur in many forms. As technology advances very rapidly, the chances of identity being stolen also increase. Physical theft involves the theft of information in any form, such as laptop and credit card information or directly from the credit card itself. The main purpose of physical theft is to take advantage of the stolen information or device from the affected party. On a large scale, physical theft would mean the theft of valuable information from a company that is considered an asset of that particular company. In the early 1980s, information storage was not a big concern where there were fewer resources for information theft. The attackers mainly depended on banking transactions and dumpster account numbers. Universities also used to post students' grades in the hallways based on their Social Security number. But later, personal information such as social security numbers and date of birth gained more importance and was used to track the person's information such as bank account number, monetary transactions, physical address, phone number and history. Attackers have begun to focus primarily on stealing Social Security numbers and dates of birth to gain an advantage by hacking individual information. With the birth of the Internet, everything has become online to make things easy for people. Hence the importance of social security numbers used for identifying people has increased. It was reported that multiple laptops were stolen from RIT in 2008. These laptops contained information about the students' Social Security numbers, dates of birth, and their profiles. Nearly 1000 students have been affected... middle of paper......nent in rooted or jailbroken devices.Here are some ways to avoid vulnerabilities:1- Turn off the NFC function when not in use2- Make the user have to accept the proposed action3- Download and use applications from a trusted source4- Avoid bypassing manufacturer security features5- Keep your mobile device updated to obtain security patches6- Lock your mobile device with a security code when not in use7 - Be careful of people trying to get too close to you in line. Near Field Communication technology has huge potential and with more mobile device manufacturers adopting the technology and retailers adopting the technology at their checkout terminals; It is essential to avoid and protect against known and possible vulnerabilities. When used correctly, NFC can be used securely to correctly identify a person, better than credit cards and physical IDs.