How do you solve this problem Mitnicki formula or through technology, training and regulations?
technology
Because the risk of identity theft in particular, increase the user's behavior, it is a technology solutions here a bit more limited. If the data is used to correct angling website redirection, it will help web safer. Another technology is a tool for social media privacy settings. At least the default would be limited access by the users of the information published. If the user has his own data to share with a wider audience to change settings, then this decision is likely to be more prudent. Particularly, when the user is in a specific environment, being new, it may not always even know that he distributed information essence of the whole world can be accessed. Of course, do not ensure the full protection of the privacy settings, and therefore highly sensitive information should not be spread through such channels anyway, but at least it makes the wrong people getting information is difficult.
training
Because the course is very large, it would probably be most effective to carry out (media) campaigns that the message reaches the widest possible audience. Fortunately, this is already happening. To make people better understand what information may be disseminated, and what not, it would be useful to give specific examples of how identity thieves may have any information about your personal interests. In addition to general training campaigns will be carried out in schools.
Rules
technology
Because the risk of identity theft in particular, increase the user's behavior, it is a technology solutions here a bit more limited. If the data is used to correct angling website redirection, it will help web safer. Another technology is a tool for social media privacy settings. At least the default would be limited access by the users of the information published. If the user has his own data to share with a wider audience to change settings, then this decision is likely to be more prudent. Particularly, when the user is in a specific environment, being new, it may not always even know that he distributed information essence of the whole world can be accessed. Of course, do not ensure the full protection of the privacy settings, and therefore highly sensitive information should not be spread through such channels anyway, but at least it makes the wrong people getting information is difficult.
training
Because the course is very large, it would probably be most effective to carry out (media) campaigns that the message reaches the widest possible audience. Fortunately, this is already happening. To make people better understand what information may be disseminated, and what not, it would be useful to give specific examples of how identity thieves may have any information about your personal interests. In addition to general training campaigns will be carried out in schools.
Rules
- Some of the most important rules that you should follow are:
- Do not post publicly the details of his personal life
- Every time publishing anything online, think about who will have access
- By entering personal information on a web page, make sure that it is accurate and reliable site
- Consider skeptical of e-mail, etc. through channels to be sent in the links (even if the sender appears to be correct)