blog




  • Essay / A Report on Identity Theft

    Table of ContentsWhat is Online Identity Theft?Types of Online Identity TheftMethods for Committing Online Identity TheftWho is at Risk? Possible solutions and prevention of online identity theftConclusionWhat is online identity theft? Everyone is unique. We all have our own set of traits, DNA and fingerprints. Each individual has their own characteristics, interests and talents that constitute a unique identity. Our identity combines all of these things within us. When this identity is taken away or stolen from us, we lose who we are. Although we don't lose our sense of who we are for ourselves, we lose it to others. Bad actors impersonate us, behaving and committing actions as an individual in disguise and at the expense of another. Say no to plagiarism. Get a Custom Essay on “Why Violent Video Games Should Not Be Banned”?Get Original EssayOnline identity theft is the use of someone else's identity for personal gain. The abuser "steals" a victim's identity and engages in various activities under the victim's name and identifying information, such as their addresses, social security number, usernames and words password, banking information and credit card numbers. The victim's information may also be sold to various "bidders", seeking to obtain their identity for nefarious reasons. According to the Federal Trade Commission's (FTC) Consumer Sentinel Network, approximately 3 million identity theft and fraud reports were filed in 2018. 444,602 complaints were classified as identity theft, compromising nearly 15% of total reports (Insurance Information Institute). . The identity thief seeks to take advantage of his or her own self-interest and personal gain at the expense of innocent and unsuspecting people. The online security of hundreds of thousands of victims has been compromised and many have had their finances exploited and their reputations ruined as a result of such a heinous and serious crime. Types of Online Identity Theft There are different types of theft identity and the methods to achieve it. how it is committed by the perpetrators. In 2018, the top five types of identity theft fraud included 1) credit card fraud in which new accounts were opened in victims' names, 2) various identity thefts (i.e. say online shopping, online accounts, insurance, etc.), 3) taxation. fraud, 4) cell phone fraud with new account openings, and 5) credit card fraud in which victims' existing accounts were used. The most common type was credit card fraud with the opening of new accounts. 130,928 reports were filed for this type, representing 40.5% of the “top five total.” Simply put, any form of identity theft committed using online methods can be classified as online identity theft. A perpetrator may commit criminal identity theft, impersonating another person to avoid police arrest and conceal a criminal record. Financial identity theft involves using a stolen identity for financial gain, such as opening credit cards in the victim's name and making online purchases using stolen payment information. Medical identity theft occurs when a person seeks health benefits using another person's identity (Pixel Privacy). The types listed above are examples that may involve the theft of a person's identity through certain methods carried out online. Various forms of identity theft can be committed withoutthe use of technology and the Internet. This can happen in the real world and the perpetrator can engage in activities on the Internet using stolen identities. The same goes for online theft and identity exploitation through real-world activities. Thus, various forms of identity theft can be committed for fraudulent actions and personal gain interchangeably, both in the digital and non-digital world. Methods to Commit Identity Theft Online There are different ways to commit identity theft online. Phishing involves attempting to acquire sensitive information through a form of digital communication. Sensitive information that may be phished includes the victim's name, usernames, passwords, payment information, address, and other contact information. The most common execution of phishing involves sending "spam" or "fraudulent" emails with the aim of tricking victims into clicking on links, often disguised as promotions or rewards, and being prompted to enter their information to “claim their prize”. Another goal is for the victim to download malicious files in the email containing malware that will infect the victim's computer, thereby allowing the thief to access the files and information stored on that particular device. Pharming involves a hacker redirecting traffic from a legitimate website to a fake website. The hacker gains access to the website's server and installs a redirect address to the fake site. Visitors are now redirected to the hacker's fake site and enter their information to access accounts and make purchases, making their information available to the hacker. The pharming method is similar to phishing in that the victim is “tricked” into providing their sensitive information. However, the victim does not click on a suspicious email, but instead enters a web address that they may have visited multiple times and had no reason to believe that the website's security had been compromised by a hacker computer science. Another method may involve an author. create a fake online profile to interact with people via email and social media. For example, a perpetrator pretends to be an employee of an organization with seemingly authentic credentials and asks the victim to "confirm their account" with their information. The thief can also pose as a real person or even use a stolen online profile to capture another online identity. Scammers can also create fake online dating profiles and form an “online relationship” with their victim. They can gain the victim's trust and the scammer can ask for gifts and financial transactions. They can also know their victim's intimate details, which can be used if the attacker wants to impersonate their victim in the future. Additionally, the attacker may exploit other intimate information, such as revealing images, which can be used to blackmail the victim into sending them bank account information, credit card numbers, and, in fact, his complete identity. Also under the guise of identity theft or false identity, a thief can convince someone of a problem with their device or internet and request remote access to "fix the problem", resulting in disclosing personal and financial details to the author. Risk? Essentially, anyone's identity can be stolen. This can happen to people.