Terry Williams graded - Grade: A PDF

Title Terry Williams graded - Grade: A
Author Terry Williams
Course Office Software Support Fundamentals
Institution University of Phoenix
Pages 5
File Size 162.9 KB
File Type PDF
Total Downloads 28
Total Views 128

Summary

Download Terry Williams graded - Grade: A PDF


Description

1 Terry Williams ENG/100 December 17, 2018 Dr. Priscilla Bamba

1 Thesis Statement: Identity theft can be prevented by protecting one’s Social Security number, scanning credit reports and accounts regularly, and using different passwords for sites visited. Protection of one’s Social Security number A Social Security card should never be carried in a wallet. Typically, reciting the digits is all that is required. People should memorize their Social Security number and keep the card stowed away at home. Individuals should never type their Social Security number in an email or any messaging application. Most emails and messages can be intercepted by an experienced hacker, leaving your information vulnerable to theft. A person should never give out their Social Security number. Except for their employer, financial institutions, the Internal Revenue Service and other government programs, no one should require this form of identification. When a person emails sensitive information that includes their Social Security number, they should make sure that they use a secure server to insure the information cannot be breached. Because the theft of Social Security numbers are so prevalent, when a person is asked to give one up to anyone, inquiring as to why it is needed is a must (Poole, Corkem, Hoffman 2018). When a person’s Social Security number has been compromised and all protective measures seem to fail, they may consider blocking all electronic access to their Social Security record. This may seem like a desperate measure, but it can minimize additional financial damage. Monitor all credit reports and accounts regularly People should make sure that all files in their credit reports in fact theirs. If there is any suspicious activity or fraud found, it should be reported immediately to the proper authorities. By checking their credit report regularly, people can quickly check for new lines of credits that may have been fraudulently started in their name. Anyone can get a free copy of their credit reports once a year. Individuals should properly dispose of any personal papers that may have pertinent information on them by destroying them. This will keep the information from falling into the

2 wrong hands (Anonymous, 2007). Some people may choose to use a credit monitoring service that will catch any unauthorized activity on their account. This service can be useful, but ultimately it is up to them to do a little self-help to stay protected. Use a different password for each site visited Password managers should be used to create and securely store complex passwords. Passwords are needed for nearly everything we do in our digital life. Remembering them and keeping them safe can be a difficult task. While using the same password on numerous sites can seem to be convenient to some people, if cyber thieves guess it, they now have access to multiple accounts. This is the reason people should use password managers. As the name implies, a password manager helps the user create, store, and recall passwords. In most instances, an account can be set up by providing a name, email address, and a master password. Most password managers are both a website and an app. This way a person will have access to their passwords no matter what device that they are on. Password managers are readily available for people to use, using them is at their discretion. People should look at password managers as a form of a virtual lock box that will keep their passwords safe. They will also guide them in the creation of different, strong passwords for each of their accounts. The prevention of the illegal encroachment of online accounts can be prevented by protecting them with good password management.

3 References

Corkem, S.,Poole V., Hoffman H. (2018). Prevention and Resolution for Identity Theft: Practical Advice for Individuals, Business Owners, and Tax Professionals. Retrieved from http://: https://web-a-ebscohostcom.contentproxy.phoenix.edu/ehost/detail/detail Anonymous, (2007). Help Customers Avoid Identity Theft. Retrieved from https://search-proquestcom.contentproxy.phoenix.edu/docview/230437039/fulltext/E0C4CBAB333D41A0PQ/9? accountid=35812

Content

Points Earned

50 Percent

7/7.5

    

The thesis statement is included. The thesis statement is clear and presents the main ideas that will be addressed in the body paragraphs. Each paragraph includes a topic sentence that introduces the main idea of the paragraph. Each paragraph includes 5-8 appropriate supportive sentences. Each paragraph includes an appropriate concluding sentence that transitions to the next idea.

Comments: The thesis statement is included and is well written. Each paragraph did include a well written topic sentence. The paragraphs do contain the five to eight supportive sentences as required, but some information might need to be cut from the essay. Transitions are missing.

Organization and Development

Points Earned

30 Percent

4.5/4.5

    

Faculty feedback from Organizing Ideas Worksheet has been incorporated into the thesis statement and topic sentences. The paper is a minimum of 350 words in length. The tone aligns with the assignment’s purpose and is geared toward the appropriate audience. The paper is clear, is organized in a logical manner, addresses the main points, and demonstrates transition from one idea to the next. The references used for support are scholarly and relevant to the topic.

Comments: Faculty feedback was incorporated. The word count is fine for now. The tone is well done; the paper is clear and organized in a logical manner, addressing the main points, but transition is lacking. The references are sometimes used properly.

Mechanics and Format

Points Earned

20 Percent

2.5/3

4   

The proper template is used for the assignment. Rules of grammar and punctuation are followed; spelling is correct. The paper—including the title page, spacing, font, and reference page—is consistent with the APA guidelines required for this assignment.

Additional Comments:

Comments: The proper template is used, and rules of grammar, punctuation and spelling are largely following. The paper’s layout is correct except for some alignment problems with the references page. Total Earned 14/15...


Similar Free PDFs