id theft

889 Words2 Pages

Identity theft Name Institution Definition Identity theft is the act of stealing someone’s identity where someone pretends to be another person by assuming their identity. The motive of identity theft is to obtain access to resources or credit and other benefits in that person’s name. The victim, whose identity is stolen often suffers adverse consequences as a result of the action of the perpetrator. The perpetrator obtains these benefits by using the victim’s name, social security number, identification number or credit card number to commit fraud. In order for an act to be identity theft, the perpetrator must use the acquired personal information to obtain an advantage (Berghel, 2000). Techniques of gaining personal information There are various ways criminals can use to obtain personal information to use in identity theft. The information can be retrieved by stealing credit cards, rummaging through rubbish for personal information, advertising bogus jobs to obtain personal information and social engineering. Information technology has also made it possible for criminals to acquire personal information and the methods employed to acquire this information include hacking computer networks, abusing privileged IT access, impersonating trusted institutions in emails, the use of brute force techniques and exploiting social networks for personal information. Additionally, the information can be obtained from redundant information technology equipment and systems and stealing information from using breaches in the computers browser or using malware and Trojan horses (Smith & Lias, 2005). Types of identity theft There are generally five categories of identity theft and these are financial identity theft, medical identit... ... middle of paper ... ... to report incidences of identity theft to the responsible authorities in order to assist in investigating such occurrences (Finch, 2003). Reference list Berghel, H. (2000). Identity theft, social security numbers, and the web. Communications of the ACM, 43 (2), 17-21. Brody, R. G., Mulig, E., & Kimball, V. (2007). PHISHING, PHARMING AND IDENTITY THEFT. Academy of Accounting & Financial Studies Journal, 11 (3). Finch, E. (2003). What a tangled web we weave: Identity theft and the internet. Dot. Cons: Crime, Deviance, and Identity on the Internet. Cullompton, England: Willan Marshall, A. M., & Tompsett, B. C. (2005). Identity theft in an online world. Computer Law & Security Review, 21 (2), 128-137. Smith, A. D., & Lias, A. R. (2005). Identity theft and e-fraud as critical CRM concerns. International Journal of Enterprise Information Systems (IJEIS), 1 (2), 17-36

More about id theft

Open Document