Who`s Who - Web-IG

Transcription

Who`s Who - Web-IG
BTS INFORMATIQUE DE GESTION
Session 2003
E1.2 : LANGUE ANGLAISE APPLIQUÉE À
L’INFORMATIQUE ET À LA GESTION
(partie écrite)
Durée : 2 heures
Coefficient : 2
L’usage d’un dictionnaire bilingue est autorisé.
Les calculatrices sont interdites.
Who’s Who
5
10
15
20
Every year scam artists reportedly create some 700,000 false identities – enough to fill a
virtual San Francisco. That estimate is conservative, insists Norman A. Willox, Jr., of the National
Fraud Center, a consulting firm. It’s based on the number of fake credit cards, bank accounts,
driver’s licenses and other supposed proofs of identity that are being uncovered. Data from the U.S.
General Accounting Office suggest that identity fraud has been increasing by roughly 50 percent a
year since 1999. And despite corporate and government moves toward universal IDs, the quest for
absolute proof that you are who you say you are appears quixotic.
Creating a false identity is easy, especially if you start with a real one. A few visits to webbased public directories (or local libraries and records offices) can yield addresses and phone
numbers past and present, date of birth, employers, mother’s maiden name and similar vital
personal data. Add an illegitimately obtained Social Security or credit-card number, and an
impostor has almost as solid a case for claiming to be someone as the real person does. Criminal
information brokers even package up complete identities for sale, according to Willox.
In a society in which people regularly do business without meeting face to face, a system
that bases trust on a few dozen bytes of lightly guarded data is fundamentally insecure. Federal
estimates of losses from identity fraud are well up in the billions of dollars a year, and those whose
names or numbers are used as a basis for fake identities may spend several years and thousands of
dollars trying to clear their records. Some have even been arrested and imprisoned for crimes
committed by their doppelgängers1. The rapid expansion of global trade, Willox says, is at risk.
The rise in identity theft, coupled with the current climate of fear about terrorism, has led
organizations ranging from database builder Oracle to the American Association of Vehicle
Administrators to propose the development of tamperproof IDs that would positively verify
everyone’s identity for purposes as diverse as opening a bank account or getting on an airplane.
Besides the usual name, address, birth date and ID number, proposed computer-readable identity
1
Doppelgängers = double, copie de quelqu’un . ≅ « copycat »
Page 1/2
25
30
35
cards could also contain biometric data such as fingerprints or iris scans to make falsification
impossible –assuming that it was issued to the right person in the first place.
But in addition to the obvious civil-liberties implications of an ID that could be used to track
every commercial or government transaction, an ostensibly perfect token of identity could reduce
security rather than enhance it. One problem, says Lauren Weinstein, moderator of the Internetbased Privacy Forum, is that you shouldn’t confuse proof of identity with proof of trustworthiness.
The FBI and CIA knew exactly who Robert Hanssen and Aldrich Ames were, for example, but that
didn’t stop their espionage. Similarly, Weinstein argues, relying on a “frequent traveler card” for
airline security could lead to relaxed vigilance just when it’s most needed.
Tamperproof ID would be a “high-value target”, Weinstein explains. Given how often
criminals dupe or suborn the officials who issue birth certificates or driver’s licenses (and how
many false identities are already in place), even 99.9 percent accuracy would give thousands of fake
people a government imprimatur. Biometric certification of dubious identities could make life even
worse for victims of identity fraud – today as a last resort you can cancel all your accounts and even
get a new Social Security number, “but how do you cancel your fingerprints?” Weinstein points out.
Paul Wallich (Scientific American, July 2002).
QUESTIONS
Compréhension: ( 12 points )
Résumer le texte en français en 200 mots (+/- 10%).
Expression : ( 8 points )
Répondre aux deux questions en anglais.
1. Two weeks ago, you visited the “sales” web site of a US-based computer hardware retailer but
didn’t order anything. However, your bank account balance sheet received today shows a $ 500
credit card payment to that company. Write an e-mail note of protest to either the hardware
retailer or your bank.
(70 mots +/- 10 % : 3 points)
2. According to you, what are the best methods to counter identity fraud? Do they represent a
danger for privacy? Why (or why not)?
(130 mots +/- 10 % : 5 points)
Page 2/2
BTS INFORMATIQUE DE GESTION
Session 2003
E1.2 : LANGUE ANGLAISE APPLIQUÉE À L’INFORMATIQUE ET
À LA GESTION
(partie écrite)
Durée : 2 heures
Coefficient : 2
PROPOSITION DE CORRIGÉ
Expression ( 8 points : 1=3, 2=5 )
Pour la question 1, on peut donner : -1 pt pour la qualité de l’argumentation et la clarté d’une
expression simple et efficace.
-1 pt pour la qualité du vocabulaire (mots bien choisis, y
compris réemploi judicieux de mots du texte, noms composés).
-1 pt pour la qualité grammaticale (ordre des mots
pertinence des formes verbales).
Pour la question 2, les trois points de la question 1 mais : - 1 pt de plus pour la première rubrique
(qualité de l’argumentation et clarté) soit 2 au total pour cet aspect du travail.
- 1 pt pour la mise en page ( division en
paragraphes, majuscules, ponctuation, lisibilité).
RESUME : Exemple de résumé : ( 12 points)
Le nombre d’ usurpations d’identité augmente actuellement de 50 % par an aux USA.Pour
aussi désirable qu’elle soit, il semble que la preuve d’identité fiable à cent pour cent soit un rêve.
En pillant une base de données (celle d’une bibliothèque ou de l’état civil), et en piratant un
numéro de Sécurité Sociale, on peut dérober l’identité d’une personne, certains en font même
commerce. Des milliards de dollars de transactions sont ainsi perdus chaque année, nuisant au
commerce international. Les malheureux dont l’identité a été volée, finissent même parfois en
prison à la place du pirate.
On a proposé de compléter les données habituelles par des caractéristiques
anthropométriques (empreintes digitales, carte de l’iris), mais la fiabilité ainsi obtenue pourrait non
seulement porter atteinte à la vie privée, mais aussi endormir la méfiance des contrôleurs: ce n’est
pas parce qu’on a des papiers en règle qu ‘on est honnête! Cependant, un tel système d’une
précision mirobolante de 99,9 % laisserait encore subsister des milliers de faux, et en cas de
détournement d’identité, la victime ne pourrait même plus obtenir de nouveaux papiers.
(182 mots)
Page 1/1