Anti Essays offers essay examples to help students with their essay writing.

Sign Up

Outsourcing Essay

Open Document

Below is an essay on "Outsourcing" from Anti Essays, your source for research papers, essays, and term paper examples.

Download the original attachment


      Identity theft occurs using some kind of hacking technique which is a big crime in the United States. We work daily to ourselves and for our families. We make use of credit cards and social security numbers in our life. We will get some benefits if we live our life with some restrictions. But what happens is sometimes in our life, some people will make use of our social security number or credit card number for their own purposes. For example, they might open bank accounts, take loans; they will do crimes using our names.

Innocent people will get arrested because of other people who committed the crimes using their names. That is why we have to be very careful when we are living in this society. We should know the basic things (General Knowledge) to live our life happily. We have to know that what should be done if someone make crimes using our names or steal our identity to protect ourselves. As told before, it is done using some hacking technique.  


Identity Theft: A fraud committed or attempted using the identifying information of another person without authority.

Hacking: A Simple definition to say it is unauthorized use of computer and network resources. A hacker is often someone who creates and modifies computer software and computer hardware, including computer programming, administration, and security-related items.

Phishing: Phishing is the practice of sending out fake emails, or spam, written to appear as if they have been sent by banks or other reputable organizations, with the intent of luring the recipient into revealing sensitive information such as usernames, passwords, account IDs, ATM Pins or credit card details.

Pretexting: the act of calling a victim on the phone and stating they have a problem with their account and they need to verify information to fix the problem

Spoofing: When an individual receives fake email messages...

Show More


MLA Citation

"Outsourcing". Anti Essays. 16 Dec. 2018


APA Citation

Outsourcing. Anti Essays. Retrieved December 16, 2018, from the World Wide Web: http://cassandralynndesignllc.com/free-essays/Outsourcing-26929.html