Jorgia Macawili BTVTED DT 1-A Case-Study-1
Jorgia Macawili BTVTED DT 1-A Case-Study-1
CASE STUDY 1:
social network. Once this part of the mission is complete, the scammer
has a variety of options at their disposal. Data mine the accounts they
have friended under the bogus profile. Even if you have your privacy
and sharing options set to “Friends Only,” you are still at risk if you
accidentally accept a duplicate friend request. The scammer contacts
people close to the victim and tells them that they are in trouble of
some kind, usually stranded on vacation, arrested or in some other
legal trouble, etc. This is accompanied by an urgent plea to send
money thru different money remittances. Unknown con artists are not
the only ones creating duplicate profiles and pages. Bullies often create
fake profiles with the intention of humiliating or harassing their
intended victim.
Facebook users can take some steps to protect their privacy and make
it much harder for identity thieves to compromise their personal
information. For starters, users can select which friends can view their
personal information, including their birthdate, relationship status,
phone number and hometown, in the “About Me” section of their
profile. They can limit this to different groups of people, such as
friends, work colleagues and so on.
1) What is your suggestion on this case?
ANSWER: