Home | Title Page | Introduction | Background | Legal Consequences | Prevention | Conclusion | References |
Picture this! You’re on your favorite shoe store’s website and you find the perfect pair. They aren’t too pricy, and they come in your size too. What do you do? You select your size, the color, and add the pair of shoes to your shopping bag. Then you run to get your handy dandy debit card. As you type your information into those blank boxes, you never think twice. Your fingers and 20/20 vision work as one to complete your order. Meanwhile, John Doe, a well trained hacker and identity thief, has copied every number and word submitted into those now filled boxes. He has your address, name, and your card information, but at least you got those shoes! Though this is a just one of many ways someone can steal your information, it occurs every day and can happen to anyone.