Identity Theft: Driving Forces

 

Abstract

    This paper sets out to explore the many dimensions of identity theft. It explores the rates at which it occurs, and the varying scales that it occurs from individuals up to millions of people at a time. It also takes into perspective the consequences that the victims must deal with after their identity is stolen. The key point of this paper is to find out what has been driving the increase in this type of crime over the years and to show the many forms that it has taken as it has evolved to adapt to the online world. As time has passed and the internet came into being, there is little need to be physically around someone when trying to steal their identity, jurisdiction issues and ineffective laws minimized the risk the attackers were facing and the internet facilitated easy crime for big profit. In doing so, this paved the way for all sorts of scams to be created and even though it is a crime, even parents can get caught up in the act of stealing their child’s identity while trying to survive. 

Title Page……………………………………………………………………………………….....1

Abstract……………………………………………………………………………………………2

Table of Contents………………………………………………………………………………..3-4

Introduction………………………………………………………………………………………..5

What is Identity Theft……………………………………………………………………………..5

The Victims………………………………………………………………………………..5

Types of Identity Theft………………………………………………………………………….…6

            Child ID theft……………………………………………………………………………...6

            Tax Theft…………………………………………………………………………………..7

            Medical ID Theft…………………………………………………………………………..7

            Senior ID Theft……………………………………………………………………………8

            Social ID Theft…………………………………………………………………………….8

Identity Theft Methods……………………………………………………………………………9

            Social Engineering………………………………………………………………………..9

            Phishing………………………………………………………………….………............10

            Pharming…………………………………………………………..………….…............10

            Pretexting………………………………………………………………….……..............11

Smishing……………………………………………………………………........................……11

Data Breaches……………………………………………………………………………………11

Skimming………………………………………………………………………………………...12

Dumpster Diving………………………………………………………………………………....12

Malware………………………………………………………………………………………….13

Spyware………………………………………………………………………………….............13

Consequences for the Victim…………………………………………………………………….13

Conclusion……………………………………………………………………………………….14

References………………………………………………………………………………………..15

No comments:

Post a Comment