top of page
  • Writer's pictureXander Billa

Protecting your personal data

Data is an assets to protect and store. It is a collection of descrete values that conveys information, describing quantity, quality, fact and statistics and other basic units of meaning or simply sequences of symbols that may be further interpreted. It is a subset of data. It contain a lot of critical and personal data. An online identity also called `internet persona` is a social identity that an internet user establishes in online communities and websites. Some example of online identity is social media profile like Facebook user profile. Data Security is the process of protecting sensetive information from unauthorized access. We use all types of types security practices to secure our data from misuse like encryption, access restriction (physical and digital assets), and more Smart devices are the gadgets that are used to perform a specific task. It collect numerous types of data but it depends on the device. Smart devices can be combines to bring intelligence to both objects and spaces, such as smart homes and buildings and can help automate processes and controls Smart devices like cameras and smart assistant are in the end cameras and microphone in our home that collect video and audio information about your presence and activities. Smart devices are used in almost any industry, from smart manufacturing to healthcare, helping to improve efficiency and optinmize operations. The real time example is smartphone which collect all sorts of data at once whether it's video, audio, picture and every minor detail. Hackers always look for personal data and critical data such as online identity or some critical information like - Military information, top secret government information, or comapny manifesto. Hackers can take a lot of advantage to soemone's data. They can sell your data to other criminals. The buyers can use this data for their own criminal purpose. To take over accounts login detail required. They can use stolen login credentials to break into with payment details such as shopping accounts. Stolen data is used to to harm companies. It leads to spear phishing Criminals can also try to gain access to company network to spy on them and infect them with malware. Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases. Identity theft is committed in many different ways and its victims are typically left with damage to their credit finance and reputation. There are various forms of identity theft, the most common is financial. Identity theft protection is a growing industry that kepp track of people credit reports, financial activity and social number use. Types of Identity theft - There are several types of identity theft including:

Financial Identity Theft

In financial identity theft, someone uses another person's identity or information to obtain credit, goods, services, or benefits. This is the most common form of identity theft.

Social Security Identity Theft

If identity thieves obtain your Social Security Number, they can use it to apply for credit cards and loans and then not pay outstanding balances. Fraudsters can also use your number to receive medical, disability, and other benefits. Medical Identity Theft In medical identity theft, someone poses as another person to obtain free medical care. Synthetic Identity Theft Synthetic identity theft is a type of fraud in which a criminal combines real (usually stolen) and fake information to create a new identity, which is used to open fraudulent accounts and make fraudulent purchases. Synthetic identity theft allows the criminal to steal money from any credit card companies or lenders who extend credit based on the fake identity. Child Identity Theft In child identity theft, someone uses a child's identity for various forms of personal gain. This is common, as children typically do not have information associated with them that could pose obstacles for the perpetrator. The fraudster may use the child's name and Social Security Number to obtain a residence, find employment, obtain loans, or avoid arrest on outstanding warrants. Often, the victim is a family member, the child of a friend, or someone else close to the perpetrator. Some people even steal the personal information of deceased loved ones. Tax Identity Theft Tax identity theft occurs when someone uses your personal information, including your Social Security Number, to file a bogus state or federal tax return in your name and collect a refund. Criminal Identity Theft In criminal identity theft, a criminal poses as another person during an arrest to try to avoid a summons, prevent the discovery of a warrant issued in their real name or avoid an arrest or conviction record.

Recent Posts

See All

VLAN or Virtual LAN

20When it comes to separating the multiple domain we can use a concept called VLAN. In this article I will tell you about VLAN also I will give you a brief on configuration as well. Let’s see about VL

OSI Model

In the late 1970s, the Open Systems Interconnection (OSI) Reference Model was created by the International Organization for Standards (ISO). Way for the data transfer between disparate hosts running d

bottom of page