logo

Identity Theft Using Social Engineering - Investigating Its Impact on Society and Students

   

Added on  2023-06-18

23 Pages8967 Words161 Views
Data Science and Big Data
 | 
 | 
 | 
Identity theft using
social engineering
Identity Theft Using Social Engineering - Investigating Its Impact on Society and Students_1

Table of Contents
Project Proposal...............................................................................................................................1
Project Objectives...................................................................................................................1
Aim................................................................................................................................1
Objectives......................................................................................................................1
Background...................................................................................................................1
Scope.............................................................................................................................2
Proposed Approach................................................................................................................2
Ways of achieving the objectives..................................................................................2
Additional needs...........................................................................................................3
Professional issues........................................................................................................3
Ethical, legal or social aspects......................................................................................4
Preliminary Plan.....................................................................................................................4
Identifying the sequence of steps..................................................................................4
Expectation of the project to be finished......................................................................4
Major computing project report.......................................................................................................5
Chapter 1: Introduction...........................................................................................................5
Research background....................................................................................................5
Summary.......................................................................................................................6
Chapter 2: Literature review...................................................................................................7
Concept of social engineering and its effect on society................................................7
Identity theft and its consequences on the students......................................................8
Issues of cyber thefts and its impact on businesses and economy..............................10
Solutions of cybercrime and implementing it in real world situations.......................12
Chapter 3: Requirements and analysis.................................................................................13
Chapter 4: Design.................................................................................................................14
Identity Theft Using Social Engineering - Investigating Its Impact on Society and Students_2

Chapter 5: Implementation and testing.................................................................................15
Chapter 6: Results and discussion........................................................................................16
Findings.......................................................................................................................16
Goals achieved............................................................................................................17
Further work................................................................................................................18
Chapter 7: Conclusion..........................................................................................................18
References:.....................................................................................................................................19
Identity Theft Using Social Engineering - Investigating Its Impact on Society and Students_3

Project Proposal
Project Objectives
Aim
To investigate the identity theft using social engineering and its direct impact on socialization.
Objectives
To identify the concept of social engineering as a part of cybercrime and its effect on
society
To determine the identity theft as a part of cyber theft and its consequences on the
students
To examine the issues related to the cyber thefts and its impact on businesses and
economy
To investigate the solutions regarding cybercrime and the way of implementing in real
world situations
Background
Cyber crime can be defined as the crime which includes the computer systems and
networks along with the internet. In such a crime, either computer is uses as a source of crime or
even can be the target of crime. It highly impacts negatively on the private security of someone
or can also affect the financial stability in a drastic manner. It is also called computer crime
which results in illegal nature of the situation such as commuting fraud and trafficking on child
pornography along with the intellectual property and stealing identities and also the violating the
privacy. Types of cyber thefts includes the phishing scams, website spoofing, ransomware,
malware, internet of things hacking, social engineering, virus attacks and many more types of
cyber attacks are faced by the innocent people and businesses as well (Abass, 2018). Research is
conducted on the specific topic of social engineering which involves particularly identity theft.
The following investigation is performed on the identification of the concept of social
engineering as a part of cybercrime and its effect on society and determining the identity theft as
a part of cyber theft and its consequences on the students along with the examination of the
1
Identity Theft Using Social Engineering - Investigating Its Impact on Society and Students_4

issues related to the cyber thefts and its impact on businesses and economy and investigation on
the solutions regarding cybercrime and the way of implementing in real world situations (Conteh
and Schmick, 2021).
Scope
Scope of the research on identity theft using social engineering is such that it is the type
of cyber crime and it is necessary for each and every individual to get aware and gain the
knowledge about the prevention of such cyber thefts before being the victim of any cyber attacks
and major loss (Patel, 2020). Therefore, the in depth research is highly required in order to learn
the concept of identity theft using social engineering so that its impacts can be studied and their
forms as well so that it can be known that which form can be more disastrous and how can it be
prevented. Moreover, research also tells the solution after being the victim of cyber crime so that
recovery can be possible in a quick manner before any drastic happening of the incident.
Furthermore, due to greediness, people shares their private information so that they can get more
money without knowing about the sources and faces their major loss of money due to their
greedy nature. Therefore, in order to create awareness about cyber crime and social engineering
specially the identity theft, conducting research is important (Aldawood and Skinner, 2018).
Proposed Approach
Ways of achieving the objectives
There are ways in which the objectives made can be attained in an effective manner so
that the efficiency can be proved while conducting the research. First objective is to identify the
concept of social engineering as a part of cybercrime and its effect on society can be achieved by
briefly explaining the nature of social engineering and why is it relevant to study on the basis of
society along with the effects. Second objective is to determine the identity theft as a part of
cyber theft and its consequences on the students can be achieved by briefly explaining the nature
of identity theft and why is it relevant to study on the basis of students along with the
consequences. Third objective is to examine the issues related to the cyber thefts and its impact
on businesses and economy can be achieved by briefly explaining the nature of issues related to
the cyber thefts and why is it relevant to study on the basis of businesses and economy along
with its impact. Fourth objective is to investigate the solutions regarding cybercrime and the way
2
Identity Theft Using Social Engineering - Investigating Its Impact on Society and Students_5

of implementing in real world situations can be achieved by briefly explaining the nature of
solutions regarding cyber crime and why is it relevant to study on the basis of its implementation
in real time circumstances (Bansla, Kunwar and Gupta, 2019).
Additional needs
The research report on identity thefts using social engineering requires basic resources
such as to develop the report, it is important to have the in depth knowledge about the computing
and its associated technologies so that the safety and security needs can be identifies easily in an
in depth manner. Proper data and information is required having the facts of cyber crime and its
various types written by reliable and relevant authors so that it can be justify with an appropriate
evidence. Moreover, data from books and journals along with the internet sources are highly
required because the factual information can be attained with such sources of information.
Furthermore, the additional needs are the suitable aspects of the research area because anything
written cannot look vague but appears qualitative and qualitative along with the research
methods used and literature review along with the recommendation.
Professional issues
Professional issues regarding the identity thefts using social engineering are such that
organization who uses technology on large basis with excellent level and operate it by providing
the services of investments or credit card services and many more have a higher risk of social
engineering because many hackers in the name of such organizations contacts the customers and
extracts the private information of their credit and debit cards along with the personal
identification also and steals the money from them, customers ultimately blames the
organizations for stealing the money and demands for recovery. This is the professional issues
for such organizations because any how they have to tackle such cyber crimes with their
customer in the name of their own. They needs to investigate about it and finds out the culprit so
that next time it won't happen again, this whole situation takes a lot of expenses of the
organization, thereby, they are considered as the professional issues (Conteh and Staton, 2021).
3
Identity Theft Using Social Engineering - Investigating Its Impact on Society and Students_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Security: Principles, Cryptography, Secure Programming Techniques
|16
|3334
|170

Development and Impact of Cyber Crime in Australia
|24
|5700
|394

Cyber Terrorism: Is Sri Lanka Ready?
|53
|15191
|297

Cyber Crime: Problems and Solutions
|7
|2138
|193

Cyberspace Laws in Fiji: Strengths and Weaknesses
|11
|3028
|87

Cybersecurity for Organizations
|14
|3076
|39