Abstract
This paper sets out to explore the many dimensions of
identity theft. It explores the rates at which it occurs, and the varying
scales that it occurs from individuals up to millions of people at a time. It
also takes into perspective the consequences that the victims must deal with
after their identity is stolen. The key point of this paper is to find out what
has been driving the increase in this type of crime over the years and to show
the many forms that it has taken as it has evolved to adapt to the online
world. As time has passed and the internet came into being, there is little
need to be physically around someone when trying to steal their identity,
jurisdiction issues and ineffective laws minimized the risk the attackers were
facing and the internet facilitated easy crime for big profit. In doing so,
this paved the way for all sorts of scams to be created and even though it is a
crime, even parents can get caught up in the act of stealing their child’s
identity while trying to survive.
Title Page……………………………………………………………………………………….....1
Abstract……………………………………………………………………………………………2
Table of Contents………………………………………………………………………………..3-4
Introduction………………………………………………………………………………………..5
What is Identity Theft……………………………………………………………………………..5
The Victims………………………………………………………………………………..5
Types of Identity Theft………………………………………………………………………….…6
Child ID
theft……………………………………………………………………………...6
Tax
Theft…………………………………………………………………………………..7
Medical ID
Theft…………………………………………………………………………..7
Senior ID
Theft……………………………………………………………………………8
Social ID
Theft…………………………………………………………………………….8
Identity Theft Methods……………………………………………………………………………9
Social
Engineering………………………………………………………………………..9
Phishing………………………………………………………………….………............10
Pharming…………………………………………………………..………….…............10
Pretexting………………………………………………………………….……..............11
Smishing……………………………………………………………………........................……11
Data Breaches……………………………………………………………………………………11
Skimming………………………………………………………………………………………...12
Dumpster Diving………………………………………………………………………………....12
Malware………………………………………………………………………………………….13
Spyware………………………………………………………………………………….............13
Consequences for the Victim…………………………………………………………………….13
Conclusion……………………………………………………………………………………….14
References………………………………………………………………………………………..15
No comments:
Post a Comment