logo

Identity theft: An overview of the problem

   

Added on  2021-06-17

11 Pages804 Words54 Views
Consequences of Identity Theft

INTRODUCTIONVirus threat and malware are involved with the computing system (Scully 2014). The hackers basically brings down the websites, commit fraud, or steal data from other’s systems. This is known as cybercrime.The practice that deals with the protection and prevention of cybercrime is known as cyber-security.

TYPES OF FRAUD THAT ARE INVOLVED IN CYBER SECURITYIdentity Theft – Theft of personal detailsFraudulent Emails – Theft by fraud emails (Lee et al. 2017)Phishing – Theft by intruders by attaching fraud websites

IDENTITY THEFTThe information or data that are usually taken from the victims basically are used to credit, service, and merchandise them on behalf of victim (Kahn and Liñares-Zegarra 2016).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Fraud, Scams, and Identity Theft
|10
|2857
|310

Cyber Security Fraud, Scam and Identity Theft
|10
|2775
|272

Preventive Measures Against Identity Crime and Consumer Scams
|9
|2330
|491

Consequences of Increasing Threat of Identity Theft
|12
|675
|74

Professional Issues in Computing - Assignment
|5
|774
|82

Identity Theft - Assignment
|13
|1113
|14