Introduction to Business

Chapter 27: Your Credit and the Law

Real-World Applications

Identity Crisis: Protect Yourself

Before you ever get tangled up in the cyber web of a hacker's delight, educate yourself on the common ways a hacker might steal important personal information. Use the Internet to create a profile of a wanted hacker. Once you've found this information, use posterboard to create a "wanted" poster.

Glencoe Online Learning CenterBusiness Administration HomeProduct InfoSite MapContact Us

The McGraw-Hill CompaniesGlencoe