QAC040X351YB - Social Engineering and Identity Theft Analysis
VerifiedAdded on 2023/06/18
|23
|8967
|161
Project
AI Summary
This project investigates identity theft using social engineering, covering its impact on socialization and society. It identifies social engineering as a form of cybercrime, examines the consequences of identity theft on students, and analyzes the effects of cyber thefts on businesses and the economy. The project also explores solutions to cybercrime and their implementation in real-world scenarios. It includes a detailed literature review, requirements analysis, design considerations, implementation and testing phases, results, and a conclusion. The research aims to raise awareness about cyber threats and provide insights into prevention and recovery strategies, addressing ethical, legal, and social aspects of identity theft.

Identity theft using
social engineering
social engineering
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Table of Contents
Project Proposal...............................................................................................................................1
Project Objectives...................................................................................................................1
Aim................................................................................................................................1
Objectives......................................................................................................................1
Background...................................................................................................................1
Scope.............................................................................................................................2
Proposed Approach................................................................................................................2
Ways of achieving the objectives..................................................................................2
Additional needs...........................................................................................................3
Professional issues........................................................................................................3
Ethical, legal or social aspects......................................................................................4
Preliminary Plan.....................................................................................................................4
Identifying the sequence of steps..................................................................................4
Expectation of the project to be finished......................................................................4
Major computing project report.......................................................................................................5
Chapter 1: Introduction...........................................................................................................5
Research background....................................................................................................5
Summary.......................................................................................................................6
Chapter 2: Literature review...................................................................................................7
Concept of social engineering and its effect on society................................................7
Identity theft and its consequences on the students......................................................8
Issues of cyber thefts and its impact on businesses and economy..............................10
Solutions of cybercrime and implementing it in real world situations.......................12
Chapter 3: Requirements and analysis.................................................................................13
Chapter 4: Design.................................................................................................................14
Chapter 5: Implementation and testing.................................................................................15
Project Proposal...............................................................................................................................1
Project Objectives...................................................................................................................1
Aim................................................................................................................................1
Objectives......................................................................................................................1
Background...................................................................................................................1
Scope.............................................................................................................................2
Proposed Approach................................................................................................................2
Ways of achieving the objectives..................................................................................2
Additional needs...........................................................................................................3
Professional issues........................................................................................................3
Ethical, legal or social aspects......................................................................................4
Preliminary Plan.....................................................................................................................4
Identifying the sequence of steps..................................................................................4
Expectation of the project to be finished......................................................................4
Major computing project report.......................................................................................................5
Chapter 1: Introduction...........................................................................................................5
Research background....................................................................................................5
Summary.......................................................................................................................6
Chapter 2: Literature review...................................................................................................7
Concept of social engineering and its effect on society................................................7
Identity theft and its consequences on the students......................................................8
Issues of cyber thefts and its impact on businesses and economy..............................10
Solutions of cybercrime and implementing it in real world situations.......................12
Chapter 3: Requirements and analysis.................................................................................13
Chapter 4: Design.................................................................................................................14
Chapter 5: Implementation and testing.................................................................................15

Chapter 6: Results and discussion........................................................................................16
Findings.......................................................................................................................16
Goals achieved............................................................................................................17
Further work................................................................................................................18
Chapter 7: Conclusion..........................................................................................................18
References:.....................................................................................................................................19
Findings.......................................................................................................................16
Goals achieved............................................................................................................17
Further work................................................................................................................18
Chapter 7: Conclusion..........................................................................................................18
References:.....................................................................................................................................19

Project Proposal
Project Objectives
Aim
To investigate the identity theft using social engineering and its direct impact on socialization.
Objectives
To identify the concept of social engineering as a part of cybercrime and its effect on
society
To determine the identity theft as a part of cyber theft and its consequences on the
students
To examine the issues related to the cyber thefts and its impact on businesses and
economy
To investigate the solutions regarding cybercrime and the way of implementing in real
world situations
Background
Cyber crime can be defined as the crime which includes the computer systems and
networks along with the internet. In such a crime, either computer is uses as a source of crime or
even can be the target of crime. It highly impacts negatively on the private security of someone
or can also affect the financial stability in a drastic manner. It is also called computer crime
which results in illegal nature of the situation such as commuting fraud and trafficking on child
pornography along with the intellectual property and stealing identities and also the violating the
privacy. Types of cyber thefts includes the phishing scams, website spoofing, ransomware,
malware, internet of things hacking, social engineering, virus attacks and many more types of
cyber attacks are faced by the innocent people and businesses as well (Abass, 2018). Research is
conducted on the specific topic of social engineering which involves particularly identity theft.
The following investigation is performed on the identification of the concept of social
engineering as a part of cybercrime and its effect on society and determining the identity theft as
a part of cyber theft and its consequences on the students along with the examination of the
1
Project Objectives
Aim
To investigate the identity theft using social engineering and its direct impact on socialization.
Objectives
To identify the concept of social engineering as a part of cybercrime and its effect on
society
To determine the identity theft as a part of cyber theft and its consequences on the
students
To examine the issues related to the cyber thefts and its impact on businesses and
economy
To investigate the solutions regarding cybercrime and the way of implementing in real
world situations
Background
Cyber crime can be defined as the crime which includes the computer systems and
networks along with the internet. In such a crime, either computer is uses as a source of crime or
even can be the target of crime. It highly impacts negatively on the private security of someone
or can also affect the financial stability in a drastic manner. It is also called computer crime
which results in illegal nature of the situation such as commuting fraud and trafficking on child
pornography along with the intellectual property and stealing identities and also the violating the
privacy. Types of cyber thefts includes the phishing scams, website spoofing, ransomware,
malware, internet of things hacking, social engineering, virus attacks and many more types of
cyber attacks are faced by the innocent people and businesses as well (Abass, 2018). Research is
conducted on the specific topic of social engineering which involves particularly identity theft.
The following investigation is performed on the identification of the concept of social
engineering as a part of cybercrime and its effect on society and determining the identity theft as
a part of cyber theft and its consequences on the students along with the examination of the
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

issues related to the cyber thefts and its impact on businesses and economy and investigation on
the solutions regarding cybercrime and the way of implementing in real world situations (Conteh
and Schmick, 2021).
Scope
Scope of the research on identity theft using social engineering is such that it is the type
of cyber crime and it is necessary for each and every individual to get aware and gain the
knowledge about the prevention of such cyber thefts before being the victim of any cyber attacks
and major loss (Patel, 2020). Therefore, the in depth research is highly required in order to learn
the concept of identity theft using social engineering so that its impacts can be studied and their
forms as well so that it can be known that which form can be more disastrous and how can it be
prevented. Moreover, research also tells the solution after being the victim of cyber crime so that
recovery can be possible in a quick manner before any drastic happening of the incident.
Furthermore, due to greediness, people shares their private information so that they can get more
money without knowing about the sources and faces their major loss of money due to their
greedy nature. Therefore, in order to create awareness about cyber crime and social engineering
specially the identity theft, conducting research is important (Aldawood and Skinner, 2018).
Proposed Approach
Ways of achieving the objectives
There are ways in which the objectives made can be attained in an effective manner so
that the efficiency can be proved while conducting the research. First objective is to identify the
concept of social engineering as a part of cybercrime and its effect on society can be achieved by
briefly explaining the nature of social engineering and why is it relevant to study on the basis of
society along with the effects. Second objective is to determine the identity theft as a part of
cyber theft and its consequences on the students can be achieved by briefly explaining the nature
of identity theft and why is it relevant to study on the basis of students along with the
consequences. Third objective is to examine the issues related to the cyber thefts and its impact
on businesses and economy can be achieved by briefly explaining the nature of issues related to
the cyber thefts and why is it relevant to study on the basis of businesses and economy along
with its impact. Fourth objective is to investigate the solutions regarding cybercrime and the way
2
the solutions regarding cybercrime and the way of implementing in real world situations (Conteh
and Schmick, 2021).
Scope
Scope of the research on identity theft using social engineering is such that it is the type
of cyber crime and it is necessary for each and every individual to get aware and gain the
knowledge about the prevention of such cyber thefts before being the victim of any cyber attacks
and major loss (Patel, 2020). Therefore, the in depth research is highly required in order to learn
the concept of identity theft using social engineering so that its impacts can be studied and their
forms as well so that it can be known that which form can be more disastrous and how can it be
prevented. Moreover, research also tells the solution after being the victim of cyber crime so that
recovery can be possible in a quick manner before any drastic happening of the incident.
Furthermore, due to greediness, people shares their private information so that they can get more
money without knowing about the sources and faces their major loss of money due to their
greedy nature. Therefore, in order to create awareness about cyber crime and social engineering
specially the identity theft, conducting research is important (Aldawood and Skinner, 2018).
Proposed Approach
Ways of achieving the objectives
There are ways in which the objectives made can be attained in an effective manner so
that the efficiency can be proved while conducting the research. First objective is to identify the
concept of social engineering as a part of cybercrime and its effect on society can be achieved by
briefly explaining the nature of social engineering and why is it relevant to study on the basis of
society along with the effects. Second objective is to determine the identity theft as a part of
cyber theft and its consequences on the students can be achieved by briefly explaining the nature
of identity theft and why is it relevant to study on the basis of students along with the
consequences. Third objective is to examine the issues related to the cyber thefts and its impact
on businesses and economy can be achieved by briefly explaining the nature of issues related to
the cyber thefts and why is it relevant to study on the basis of businesses and economy along
with its impact. Fourth objective is to investigate the solutions regarding cybercrime and the way
2

of implementing in real world situations can be achieved by briefly explaining the nature of
solutions regarding cyber crime and why is it relevant to study on the basis of its implementation
in real time circumstances (Bansla, Kunwar and Gupta, 2019).
Additional needs
The research report on identity thefts using social engineering requires basic resources
such as to develop the report, it is important to have the in depth knowledge about the computing
and its associated technologies so that the safety and security needs can be identifies easily in an
in depth manner. Proper data and information is required having the facts of cyber crime and its
various types written by reliable and relevant authors so that it can be justify with an appropriate
evidence. Moreover, data from books and journals along with the internet sources are highly
required because the factual information can be attained with such sources of information.
Furthermore, the additional needs are the suitable aspects of the research area because anything
written cannot look vague but appears qualitative and qualitative along with the research
methods used and literature review along with the recommendation.
Professional issues
Professional issues regarding the identity thefts using social engineering are such that
organization who uses technology on large basis with excellent level and operate it by providing
the services of investments or credit card services and many more have a higher risk of social
engineering because many hackers in the name of such organizations contacts the customers and
extracts the private information of their credit and debit cards along with the personal
identification also and steals the money from them, customers ultimately blames the
organizations for stealing the money and demands for recovery. This is the professional issues
for such organizations because any how they have to tackle such cyber crimes with their
customer in the name of their own. They needs to investigate about it and finds out the culprit so
that next time it won't happen again, this whole situation takes a lot of expenses of the
organization, thereby, they are considered as the professional issues (Conteh and Staton, 2021).
3
solutions regarding cyber crime and why is it relevant to study on the basis of its implementation
in real time circumstances (Bansla, Kunwar and Gupta, 2019).
Additional needs
The research report on identity thefts using social engineering requires basic resources
such as to develop the report, it is important to have the in depth knowledge about the computing
and its associated technologies so that the safety and security needs can be identifies easily in an
in depth manner. Proper data and information is required having the facts of cyber crime and its
various types written by reliable and relevant authors so that it can be justify with an appropriate
evidence. Moreover, data from books and journals along with the internet sources are highly
required because the factual information can be attained with such sources of information.
Furthermore, the additional needs are the suitable aspects of the research area because anything
written cannot look vague but appears qualitative and qualitative along with the research
methods used and literature review along with the recommendation.
Professional issues
Professional issues regarding the identity thefts using social engineering are such that
organization who uses technology on large basis with excellent level and operate it by providing
the services of investments or credit card services and many more have a higher risk of social
engineering because many hackers in the name of such organizations contacts the customers and
extracts the private information of their credit and debit cards along with the personal
identification also and steals the money from them, customers ultimately blames the
organizations for stealing the money and demands for recovery. This is the professional issues
for such organizations because any how they have to tackle such cyber crimes with their
customer in the name of their own. They needs to investigate about it and finds out the culprit so
that next time it won't happen again, this whole situation takes a lot of expenses of the
organization, thereby, they are considered as the professional issues (Conteh and Staton, 2021).
3

Ethical, legal or social aspects
Ethical aspects of the identity thefts are such that in the organization there are many
people who are against the management and tries to spoil the functioning of the organization,
such people are reason where they try to destroy the ethics by revealing the confidential
information and using the social engineering as well. People outside the organization can also
performs this by hacking the accession of the data of the company. Legal issues arises when the
company identifies the theft and the criminal who are responsible for it runs away, this results in
the legal issues in professionalism. Moreover, social aspects are such that the employees who are
working in the organization tries to spoil their own colleagues by data breaching their
information due to some personal conflicts which can directly raise the social issues in
professionalism (Aldawood and Skinner, 2019).
Preliminary Plan
Identifying the sequence of steps
This research report is conducted with having the whole plan for completing the project
which includes the research proposal and major computing project report. Research proposal
includes the project objectives and proposed approach along with the preliminary plan which
contains various other steps such as aim and objectives along with the background and scope
which is followed by the ways of achieving the objectives and additional needs and also the
professional issues relating ethical, legal or social aspects. Major computing project report
includes different chapters from one to seven contains the introduction and literature review
along with the requirements and analysis which is followed by the design and implementation
and testing and also the results and discussion along with the findings and conclusion. These are
the sequencing of steps which are followed in order to complete the research report identity theft
using social engineering.
Expectation of the project to be finished
4
Ethical aspects of the identity thefts are such that in the organization there are many
people who are against the management and tries to spoil the functioning of the organization,
such people are reason where they try to destroy the ethics by revealing the confidential
information and using the social engineering as well. People outside the organization can also
performs this by hacking the accession of the data of the company. Legal issues arises when the
company identifies the theft and the criminal who are responsible for it runs away, this results in
the legal issues in professionalism. Moreover, social aspects are such that the employees who are
working in the organization tries to spoil their own colleagues by data breaching their
information due to some personal conflicts which can directly raise the social issues in
professionalism (Aldawood and Skinner, 2019).
Preliminary Plan
Identifying the sequence of steps
This research report is conducted with having the whole plan for completing the project
which includes the research proposal and major computing project report. Research proposal
includes the project objectives and proposed approach along with the preliminary plan which
contains various other steps such as aim and objectives along with the background and scope
which is followed by the ways of achieving the objectives and additional needs and also the
professional issues relating ethical, legal or social aspects. Major computing project report
includes different chapters from one to seven contains the introduction and literature review
along with the requirements and analysis which is followed by the design and implementation
and testing and also the results and discussion along with the findings and conclusion. These are
the sequencing of steps which are followed in order to complete the research report identity theft
using social engineering.
Expectation of the project to be finished
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Tasks Week
1
Week
2
Week
3
Week
4
Week
5
Week
6
Week
7
Chapter 1: Introduction
Chapter 2: Literature Review
Chapter 3: Requirements and analysis
Chapter 4: Design
Chapter 5: Implementation and testing
Chapter 6: Results and discussion
Chapter 7 Conclusions
These are the list of chapters from one to seven considered as specific tasks and are
completed from week one to week seven. Such as the chapter one that is introduction will be
completed in week one. Chapter two that is literature review will be completed in week two.
Chapter three that is requirement and analysis will be completed in week three. Chapter four that
is design will be completed in week four. Chapter five that is implementation and testing will be
completed in week five. Chapter six that is results and discussion will be completed in week six
and chapter seven that is conclusion will be completed in week seven. This is the entire time
frame where expectation of the project to be finished is estimated.
Major computing project report
Chapter 1: Introduction
Research background
Research is all about on the topic of Identity theft using social engineering which is a part
of Cybercrime and it is referred to the major fraud done with the computer systems with the
motive of stealing the money from people by extracting their personal information and
identification along with the credit card number and many more in order to steal the money from
them illegally. These are usually done by the hackers who are expertise in operating the
computer systems and various software to hack the organisations or an individual computer
system in order to extract the confidential data and blackmail them in return for money or any
5
1
Week
2
Week
3
Week
4
Week
5
Week
6
Week
7
Chapter 1: Introduction
Chapter 2: Literature Review
Chapter 3: Requirements and analysis
Chapter 4: Design
Chapter 5: Implementation and testing
Chapter 6: Results and discussion
Chapter 7 Conclusions
These are the list of chapters from one to seven considered as specific tasks and are
completed from week one to week seven. Such as the chapter one that is introduction will be
completed in week one. Chapter two that is literature review will be completed in week two.
Chapter three that is requirement and analysis will be completed in week three. Chapter four that
is design will be completed in week four. Chapter five that is implementation and testing will be
completed in week five. Chapter six that is results and discussion will be completed in week six
and chapter seven that is conclusion will be completed in week seven. This is the entire time
frame where expectation of the project to be finished is estimated.
Major computing project report
Chapter 1: Introduction
Research background
Research is all about on the topic of Identity theft using social engineering which is a part
of Cybercrime and it is referred to the major fraud done with the computer systems with the
motive of stealing the money from people by extracting their personal information and
identification along with the credit card number and many more in order to steal the money from
them illegally. These are usually done by the hackers who are expertise in operating the
computer systems and various software to hack the organisations or an individual computer
system in order to extract the confidential data and blackmail them in return for money or any
5

other purposes. The reason behind conducting research on identity theft is because it is not
specific to any organisation but it is particular to one individual who doesn't have any knowledge
about cyber-crimes happening in the world and how they can prevent and fight against such
crimes. The open best dishes are conducted in order to reduce such illegal forms of crimes in
terms of computers and technologies. Social engineering is not only specific to the computers but
it can also be conducted with the help of fraud calls to any of the random individuals and
extracting their personal information but it is majorly conducted with the help of networks and
the internet by hacking the systems or any other. The following discussion contains the aims and
objectives of the research along with the discussions and results with proper findings and
conclusion in order to have the strategic investigation on a particular topic and cover the topic in
every aspect such as in the form of professional issues or personal as well along with the societal
and student issues also.
Summary
The following discussion is based on the different chapters with the help of which the
research is undertaken. Chapter 1 is itself the introduction which specifies the background of the
information with relevant information and data along with the summary of different chapters and
overview of the content they will be specifying in the further research. Chapter 2 will cover the
information of literature review in which the various objectives are described in a detailed
manner such as the concept of social engineering and its effect on society, identity theft and its
consequences on the students, issues of Cyber threats and its impact on businesses and economy
and solutions of Cyber-crime and its implementation in the real world situations. Under all these
objectives, literature review covers the purpose of each and every chapter with the reliable and
relevant investigation conducted on the specific objective with the help of the content of various
authors and sources of recent years and moreover the relationship has been created among the
research outputs and the student's own work. Furthermore, identification of the gaps is also
covered along with the applications and its new research context. Chapter 3 covers the
requirements and analysis section of the entire research report on identity theft which includes
the detailed discussion on the different types of data and software along with the hardware
required in order to conduct the investigation which is basically followed by by the kind of
analysis undertaken to complete the whole report so that its aims and objectives can be fulfilled
6
specific to any organisation but it is particular to one individual who doesn't have any knowledge
about cyber-crimes happening in the world and how they can prevent and fight against such
crimes. The open best dishes are conducted in order to reduce such illegal forms of crimes in
terms of computers and technologies. Social engineering is not only specific to the computers but
it can also be conducted with the help of fraud calls to any of the random individuals and
extracting their personal information but it is majorly conducted with the help of networks and
the internet by hacking the systems or any other. The following discussion contains the aims and
objectives of the research along with the discussions and results with proper findings and
conclusion in order to have the strategic investigation on a particular topic and cover the topic in
every aspect such as in the form of professional issues or personal as well along with the societal
and student issues also.
Summary
The following discussion is based on the different chapters with the help of which the
research is undertaken. Chapter 1 is itself the introduction which specifies the background of the
information with relevant information and data along with the summary of different chapters and
overview of the content they will be specifying in the further research. Chapter 2 will cover the
information of literature review in which the various objectives are described in a detailed
manner such as the concept of social engineering and its effect on society, identity theft and its
consequences on the students, issues of Cyber threats and its impact on businesses and economy
and solutions of Cyber-crime and its implementation in the real world situations. Under all these
objectives, literature review covers the purpose of each and every chapter with the reliable and
relevant investigation conducted on the specific objective with the help of the content of various
authors and sources of recent years and moreover the relationship has been created among the
research outputs and the student's own work. Furthermore, identification of the gaps is also
covered along with the applications and its new research context. Chapter 3 covers the
requirements and analysis section of the entire research report on identity theft which includes
the detailed discussion on the different types of data and software along with the hardware
required in order to conduct the investigation which is basically followed by by the kind of
analysis undertaken to complete the whole report so that its aims and objectives can be fulfilled
6

in an effective and efficient manner. Chapter 4 will cover the design of the entire report which
explains what type of design technique is selected from various other alternatives so that careful
attention could be paid on controlling the conditions for example sampling of the data chosen
along with the coding methods which are used in the report. Chapter 5 will cover the
implementation and testing part which has the discussion about the testing as per the needs and
requirements of the scheme presented in the chapter of analysis and requirements because the
usage of both functional and user acceptance testing was proper in the implementation process.
This is a type of project which is investigative and the techniques used have to be evaluated
according to the standard result set for better calibration along with the live data set. Chapter 6
full cover the results and discussion part which demonstrates the major results of the entire
investigation done so that the critical evaluation can be conducted because this chapter mainly
covers the three basic themes for better understanding such as findings and goals achieved along
with the further work in order to have the better future considerations and decision making for
future research and improvements. Chapter 7 will cover the conclusion of the whole report which
basically summarises about the succession or failure of the research as per the needs and
requirements of aims and objectives so that the amendments can be performed accordingly. All
these chapters are covered in the following discussion for better research and presentation of the
investigation conducted on the topic of Identity theft using social engineering.
Chapter 2: Literature review
Concept of social engineering and its effect on society
Concept of social engineering states that it is related to crime and illegal nature in the
context of information security because it is defined as the psychological influence of an
individual so that an individual can perform such actions which can spoil their life. It is basically
the extracting of confidential information from the people and using it to steal the money such as
credit card number or any identification card. It is a term which is broadly used in terms of
malicious actions which is completed with the help of human communications (Kagita,
Thilakarathne, Gadekallu and Singh, 2020). People who are involved in such crimes use that
trick to manipulate an individual so that they can easily provide that information to them and
even the security mistakes along with the sensitive information. This type of attack happens in
various steps. People who are into the social engineering crime performance stages in the form of
7
explains what type of design technique is selected from various other alternatives so that careful
attention could be paid on controlling the conditions for example sampling of the data chosen
along with the coding methods which are used in the report. Chapter 5 will cover the
implementation and testing part which has the discussion about the testing as per the needs and
requirements of the scheme presented in the chapter of analysis and requirements because the
usage of both functional and user acceptance testing was proper in the implementation process.
This is a type of project which is investigative and the techniques used have to be evaluated
according to the standard result set for better calibration along with the live data set. Chapter 6
full cover the results and discussion part which demonstrates the major results of the entire
investigation done so that the critical evaluation can be conducted because this chapter mainly
covers the three basic themes for better understanding such as findings and goals achieved along
with the further work in order to have the better future considerations and decision making for
future research and improvements. Chapter 7 will cover the conclusion of the whole report which
basically summarises about the succession or failure of the research as per the needs and
requirements of aims and objectives so that the amendments can be performed accordingly. All
these chapters are covered in the following discussion for better research and presentation of the
investigation conducted on the topic of Identity theft using social engineering.
Chapter 2: Literature review
Concept of social engineering and its effect on society
Concept of social engineering states that it is related to crime and illegal nature in the
context of information security because it is defined as the psychological influence of an
individual so that an individual can perform such actions which can spoil their life. It is basically
the extracting of confidential information from the people and using it to steal the money such as
credit card number or any identification card. It is a term which is broadly used in terms of
malicious actions which is completed with the help of human communications (Kagita,
Thilakarathne, Gadekallu and Singh, 2020). People who are involved in such crimes use that
trick to manipulate an individual so that they can easily provide that information to them and
even the security mistakes along with the sensitive information. This type of attack happens in
various steps. People who are into the social engineering crime performance stages in the form of
7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

cybercrime such as first is the research which means that people first investigate about the
individual from home they want to extract information and who can be easily manipulated or
influenced and also have a good amount in their bank account. All these investigations are made
by the hacker so that they can target the particular number of people for their crime (van de
Weijer, Leukfeldt and Bernasco, 2019). Second is planning which means that after the collection
of all the data in the research stage then planning is done accordingly because they make the
strategies that how they can use the data and in what manner along with the time duration so that
the proper feasibility study could be undertaken. Third stage is the contact which means that after
the proper planning is done, hackers start contacting the people who they have targeted in the
previous stages one by one by using all the tricks of manipulation and influencing them in order
to extract their confidential information (Yar and Steinmetz, 2019). Hackers generally target with
the help of fraud phone calls and can be the internet and networking which is also called the
cybercrime and cyber theft. Fourth stage is the execution which means that after extracting all
the information they start the process of stealing the money out from the confidential information
with their own software because they have the expertise in doing this and have a special
knowledge so they operate their software and extract along with the stealing of money of an
individual. Social engineering affects the society in a very drastic manner such as it has a
negative impact on the society because society faces the mental stress and financial loss due to
social engineering because the main purpose of social engineering is to steal the money which
majorly results in the loss of money which leads to the mental stress in a person and due to this
person attempts suicide or any other dangerous act. There is only the negative aspect of social
engineering in society, this is because it is very well known that the people are for the family and
if another person steals all their savings then it can also result in the mental trauma of a person
which ends the willingness to live as an individual. This is the impact of social engineering on
society (Kizza, 2020).
Identity theft and its consequences on the students
Concept of Identity Theft States that is the part of the social engineering and which is a
part of the cybercrime or cyber theft. Identity theft is referred to the using of personal
information of someone else for the personal use of one's own specially in the form of
identification number or in the form of credit card number so that the stealing of money can be
8
individual from home they want to extract information and who can be easily manipulated or
influenced and also have a good amount in their bank account. All these investigations are made
by the hacker so that they can target the particular number of people for their crime (van de
Weijer, Leukfeldt and Bernasco, 2019). Second is planning which means that after the collection
of all the data in the research stage then planning is done accordingly because they make the
strategies that how they can use the data and in what manner along with the time duration so that
the proper feasibility study could be undertaken. Third stage is the contact which means that after
the proper planning is done, hackers start contacting the people who they have targeted in the
previous stages one by one by using all the tricks of manipulation and influencing them in order
to extract their confidential information (Yar and Steinmetz, 2019). Hackers generally target with
the help of fraud phone calls and can be the internet and networking which is also called the
cybercrime and cyber theft. Fourth stage is the execution which means that after extracting all
the information they start the process of stealing the money out from the confidential information
with their own software because they have the expertise in doing this and have a special
knowledge so they operate their software and extract along with the stealing of money of an
individual. Social engineering affects the society in a very drastic manner such as it has a
negative impact on the society because society faces the mental stress and financial loss due to
social engineering because the main purpose of social engineering is to steal the money which
majorly results in the loss of money which leads to the mental stress in a person and due to this
person attempts suicide or any other dangerous act. There is only the negative aspect of social
engineering in society, this is because it is very well known that the people are for the family and
if another person steals all their savings then it can also result in the mental trauma of a person
which ends the willingness to live as an individual. This is the impact of social engineering on
society (Kizza, 2020).
Identity theft and its consequences on the students
Concept of Identity Theft States that is the part of the social engineering and which is a
part of the cybercrime or cyber theft. Identity theft is referred to the using of personal
information of someone else for the personal use of one's own specially in the form of
identification number or in the form of credit card number so that the stealing of money can be
8

done and this is performed without any permission in order to commit the fraud and crimes. It
was first conducted in 1964 (Singh and Rastogi, 2018). This is a term which describes all types
of crimes and illegal actions in which the person wrongfully extracts and uses the other
individual Private data which is considered as fraud and deception. The motive of such crime is
basically to take revenge from the person or to simply steal the money for their own luxurious
life. There are different types of Identity theft which the hackers used to attack the people such as
account takeover fraud which means that hackers hack the account of an individual and access
the account as per the needs and requirements and specifically attack those people who have a
good amount in their bank account. Debit card and credit card fraud which means that hackers
steal the information from an individual of the personal number which is printed on the debit and
credit card so that they can steal the money and access the bank accounts of the person
(Alshammari and Singh, 2018). Drivers licence identity theft which means that hackers hack the
driving licence of the person so that the information can be extracted and use the information in
their illegal activities which majorly turns into cybercrime. Mail identity theft which means that
hackers use the email spoofing to contact the person and send the satisfying mail so that the
person can easily provide the bank accounts information to them and the reason being the
greediness of a person. Online shopping fraud which means that hackers access the account of a
person through the applications through which the person conducts the online shopping and
through which we can extract the bank account details and can also make their shopping fraud
from the fraud websites. Social security number identity theft which is one of the identification
number of every individual who lives in the nation and it is important to link it with every bank
account so that the online transactions can be possible and therefore identity theft is also
performed on the social security number so that the hackers can easily access the bank accounts
of an individual. Another minor identity theft includes the senior identity theft and scams along
with the child identity theft and text identity theft which is followed by the biometric
identification theft and synthetic identity theft and also the medical identity theft (Wang, Hsieh,
Chang and Dallier, 2021). Moreover, the mortgage fraud and home title fraud along with the lost
or stolen passport and internet of things identity fraud. Identity theft is majorly impacting the
students because nowadays students are willing to earn because of the increasing opportunity for
the students to earn in the small age only and therefore they find their job opportunities on the
Internet specially on the job applications which is connected directly to the internet and therefore
9
was first conducted in 1964 (Singh and Rastogi, 2018). This is a term which describes all types
of crimes and illegal actions in which the person wrongfully extracts and uses the other
individual Private data which is considered as fraud and deception. The motive of such crime is
basically to take revenge from the person or to simply steal the money for their own luxurious
life. There are different types of Identity theft which the hackers used to attack the people such as
account takeover fraud which means that hackers hack the account of an individual and access
the account as per the needs and requirements and specifically attack those people who have a
good amount in their bank account. Debit card and credit card fraud which means that hackers
steal the information from an individual of the personal number which is printed on the debit and
credit card so that they can steal the money and access the bank accounts of the person
(Alshammari and Singh, 2018). Drivers licence identity theft which means that hackers hack the
driving licence of the person so that the information can be extracted and use the information in
their illegal activities which majorly turns into cybercrime. Mail identity theft which means that
hackers use the email spoofing to contact the person and send the satisfying mail so that the
person can easily provide the bank accounts information to them and the reason being the
greediness of a person. Online shopping fraud which means that hackers access the account of a
person through the applications through which the person conducts the online shopping and
through which we can extract the bank account details and can also make their shopping fraud
from the fraud websites. Social security number identity theft which is one of the identification
number of every individual who lives in the nation and it is important to link it with every bank
account so that the online transactions can be possible and therefore identity theft is also
performed on the social security number so that the hackers can easily access the bank accounts
of an individual. Another minor identity theft includes the senior identity theft and scams along
with the child identity theft and text identity theft which is followed by the biometric
identification theft and synthetic identity theft and also the medical identity theft (Wang, Hsieh,
Chang and Dallier, 2021). Moreover, the mortgage fraud and home title fraud along with the lost
or stolen passport and internet of things identity fraud. Identity theft is majorly impacting the
students because nowadays students are willing to earn because of the increasing opportunity for
the students to earn in the small age only and therefore they find their job opportunities on the
Internet specially on the job applications which is connected directly to the internet and therefore
9

hackles grabs such opportunity to steal the students and their accounts by emailing them fraud
emails and extracting the personal information. Students are not having experience of such things
so hence they become the victim very easily under such crimes. There is a negative impact of
Identity theft on students and affecting it in a drastic manner (Kamat and Gautam, 2018).
Issues of cyber thefts and its impact on businesses and economy
There are a lot of issues related to cyber threats because they are associated with their
types which the hackers adopt to conduct a crime. Online impersonation is one of the issue in
cyber theft which means that people who have the wrong intention with the bad fantasy make the
innocent people victim and try to be personal with them by starting with the friendship in the
online applications by using the chat box and many other things in order to interact and
communicate with the people whom they have targeted and wants to extract money from them so
that the online impersonation can be attempted by the hacker (Kashif, Javed and Pandey, 2020).
Social network fraud is an another issue in cyber theft which means that the hackers use various
social sites such as Facebook and Instagram along with the Twitter and YouTube which is
followed by the Snapchat and many more so that the social networking can be created with the
people in terms of relationships and friendships and therefore they can conduct the fraud by
having a personal relation with the people therefore it is known as the social network fraud.
Cyber bullying is also one of the issue in cyber theft which means that harassing the people on
the internet by blackmailing them with their personal content or by any personal pictures so that
they can steal the money in return of such data they have collected from the victim and can have
the luxurious life with the money they have earned from crime and illegal nature of the internet.
This is known as cyber bullying because it is basically done with the help of the Internet and
networking because nowadays social media is trending and therefore anything which is leaking
becomes a trend which almost everyone knows about it so cyber bullying is famous for the
harassment and making the people victim of the crimes (Al-Khater, Al-Maadeed, Ahmed and
Khan, 2020). Trafficking passwords is also an another issue in cyber theft which means that
password hacking is one of the major issue in cybercrime which means that any important data
which the organisation is containing is generally locked with the password with proper
authentication and authorisation along with the biometric system as very depends upon the level
of important the data is. Hackers hack the systems and try to break the password and after
10
emails and extracting the personal information. Students are not having experience of such things
so hence they become the victim very easily under such crimes. There is a negative impact of
Identity theft on students and affecting it in a drastic manner (Kamat and Gautam, 2018).
Issues of cyber thefts and its impact on businesses and economy
There are a lot of issues related to cyber threats because they are associated with their
types which the hackers adopt to conduct a crime. Online impersonation is one of the issue in
cyber theft which means that people who have the wrong intention with the bad fantasy make the
innocent people victim and try to be personal with them by starting with the friendship in the
online applications by using the chat box and many other things in order to interact and
communicate with the people whom they have targeted and wants to extract money from them so
that the online impersonation can be attempted by the hacker (Kashif, Javed and Pandey, 2020).
Social network fraud is an another issue in cyber theft which means that the hackers use various
social sites such as Facebook and Instagram along with the Twitter and YouTube which is
followed by the Snapchat and many more so that the social networking can be created with the
people in terms of relationships and friendships and therefore they can conduct the fraud by
having a personal relation with the people therefore it is known as the social network fraud.
Cyber bullying is also one of the issue in cyber theft which means that harassing the people on
the internet by blackmailing them with their personal content or by any personal pictures so that
they can steal the money in return of such data they have collected from the victim and can have
the luxurious life with the money they have earned from crime and illegal nature of the internet.
This is known as cyber bullying because it is basically done with the help of the Internet and
networking because nowadays social media is trending and therefore anything which is leaking
becomes a trend which almost everyone knows about it so cyber bullying is famous for the
harassment and making the people victim of the crimes (Al-Khater, Al-Maadeed, Ahmed and
Khan, 2020). Trafficking passwords is also an another issue in cyber theft which means that
password hacking is one of the major issue in cybercrime which means that any important data
which the organisation is containing is generally locked with the password with proper
authentication and authorisation along with the biometric system as very depends upon the level
of important the data is. Hackers hack the systems and try to break the password and after
10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

succeeding in the same, hackers start blackmailing the organisation or an individual as well that
they will only leave the confidential data of the organisation if they pay some amount to the
hackers which is in large numbers. organisation generally pay for it because the data the hackers
hack is really very confidential and private and if the data breaching is conducted by the hacker
that it can directly spoil the image and reputation of the organisation in the marketplace which
can ultimately result in the shutting down of the company so therefore in order to save such
image of the organisation, company generally pays the amount but also file the case against the
hackers in the crime investigation centre so that they can get their money back if possible. Cyber
extortion is one of the issues in cyber theft which means that it is basically done in The E-
Commerce organisations such as Amazon or eBay and many others. It is basically The hacking
of the computer systems in the organisations because the organisational computer systems
contains a lot of information and data which can definitely help the hackers in gaining a lots of
money from the organisations so therefore the directly attached to the computer systems in the
organisation and control the access over them and blackmail the organisation that they will only
release the access from the computer systems if they will pay the large amount of money to them
(Brar and Kumar, 2018). This hampers of working and functioning of the organisation which can
damage the Goodwill of the company in a more drastic manner therefore it is considered as the
cyber extortion where computer systems are directly attacked for the bad intentions of the hacker
and they generally make their victim in the form of organisation because an individual computer
system will never give the important information or data to the hacker. Identity theft is an
another issue in cyber theft which means that help to generally steals the information from the
user such as credit card number or bank account number so that they can still the money from
them and can have the access on the bank account which results in the financial loss to the victim
and the mental trauma as well. Unauthorised system access is also one of the issue in cyber theft
which means that some small organisations who do not have enough capital to invest in the
cybersecurity and save their system from the cybercrime general put the system into risk and
have the unauthorised system in the organisation and hackers directly attack those systems who
are unauthorised even at the small organisations also. therefore, the unauthorised system access
is the easiest way for the hacker to hack the systems in a very dangerous way. Cyber thefts have
a negative impact on the businesses and economy in such a way that it results in the increased
cost of the business because of the ransomware and malware software in the organisation. Cyber
11
they will only leave the confidential data of the organisation if they pay some amount to the
hackers which is in large numbers. organisation generally pay for it because the data the hackers
hack is really very confidential and private and if the data breaching is conducted by the hacker
that it can directly spoil the image and reputation of the organisation in the marketplace which
can ultimately result in the shutting down of the company so therefore in order to save such
image of the organisation, company generally pays the amount but also file the case against the
hackers in the crime investigation centre so that they can get their money back if possible. Cyber
extortion is one of the issues in cyber theft which means that it is basically done in The E-
Commerce organisations such as Amazon or eBay and many others. It is basically The hacking
of the computer systems in the organisations because the organisational computer systems
contains a lot of information and data which can definitely help the hackers in gaining a lots of
money from the organisations so therefore the directly attached to the computer systems in the
organisation and control the access over them and blackmail the organisation that they will only
release the access from the computer systems if they will pay the large amount of money to them
(Brar and Kumar, 2018). This hampers of working and functioning of the organisation which can
damage the Goodwill of the company in a more drastic manner therefore it is considered as the
cyber extortion where computer systems are directly attacked for the bad intentions of the hacker
and they generally make their victim in the form of organisation because an individual computer
system will never give the important information or data to the hacker. Identity theft is an
another issue in cyber theft which means that help to generally steals the information from the
user such as credit card number or bank account number so that they can still the money from
them and can have the access on the bank account which results in the financial loss to the victim
and the mental trauma as well. Unauthorised system access is also one of the issue in cyber theft
which means that some small organisations who do not have enough capital to invest in the
cybersecurity and save their system from the cybercrime general put the system into risk and
have the unauthorised system in the organisation and hackers directly attack those systems who
are unauthorised even at the small organisations also. therefore, the unauthorised system access
is the easiest way for the hacker to hack the systems in a very dangerous way. Cyber thefts have
a negative impact on the businesses and economy in such a way that it results in the increased
cost of the business because of the ransomware and malware software in the organisation. Cyber
11

security regulations require the high cost in the implementation and maintenance of it and
therefore a lot of expenses need to be bare by the organisation. Operational disruption is another
negative impact of Cyber theft on businesses and economy which means that hackers generally
hacks the entire systems of the organisation which results in the operational destruction leading
to the hindrance in the smooth functioning of the organisation. Reputational damage is also one
of the negative impact of Cyber threat on businesses and economy which means that due to the
fear of data breaching the company has to install the cybersecurity systems and if then too they
suffer from the cybercrime then it will result in the damage in the reputation of the organisation
in the marketplace which can result in the shutting down of the company. Lost revenue is also
another negative impact of Cyber theft on businesses and economy which means that a company
starts losing the profit margin and revenue if the company becomes the victim of cybercrime
which leads to huge losses in the organisation. Hackers also steal the intellectual property of the
organisation which has the highest value for every company (Ali, 2019).
Solutions of cybercrime and implementing it in real world situations
There are various solutions of Cybercrime along with the implementation it in the real-
world situations such that using the strong passwords is one of the solution of cybercrime which
means that the organisation as well as an individual must take care about the data and
information in the computer system must be properly authenticated with the strong password
with the help of password management systems if there containing any important information so
that the hackers can't crack it (Lee and Holt, 2020). Blocking spyware attacks is another solution
of cybercrime which means that security systems need to be installed which blocks the spyware
attacks so that the computer systems can be secured from such illegal attacks from the hackers.
Encryption and decryption is also another solution of cybercrime which means that the encoding
and decoding language used by the organisations to communicate so that the hackers do not
identify what language is being written in the data so that they will not be able to leak or breach
the data. Access control is also one of the solutions of cybercrime which means that only those
people in the organisation should be given the access who are trustable so that written
information can be saved in the computer systems (Somer, 2019). authentication and
authorisation is another solution of cybercrime which means that whatever the important
software or application is being installed in the computer systems must be properly authenticated
12
therefore a lot of expenses need to be bare by the organisation. Operational disruption is another
negative impact of Cyber theft on businesses and economy which means that hackers generally
hacks the entire systems of the organisation which results in the operational destruction leading
to the hindrance in the smooth functioning of the organisation. Reputational damage is also one
of the negative impact of Cyber threat on businesses and economy which means that due to the
fear of data breaching the company has to install the cybersecurity systems and if then too they
suffer from the cybercrime then it will result in the damage in the reputation of the organisation
in the marketplace which can result in the shutting down of the company. Lost revenue is also
another negative impact of Cyber theft on businesses and economy which means that a company
starts losing the profit margin and revenue if the company becomes the victim of cybercrime
which leads to huge losses in the organisation. Hackers also steal the intellectual property of the
organisation which has the highest value for every company (Ali, 2019).
Solutions of cybercrime and implementing it in real world situations
There are various solutions of Cybercrime along with the implementation it in the real-
world situations such that using the strong passwords is one of the solution of cybercrime which
means that the organisation as well as an individual must take care about the data and
information in the computer system must be properly authenticated with the strong password
with the help of password management systems if there containing any important information so
that the hackers can't crack it (Lee and Holt, 2020). Blocking spyware attacks is another solution
of cybercrime which means that security systems need to be installed which blocks the spyware
attacks so that the computer systems can be secured from such illegal attacks from the hackers.
Encryption and decryption is also another solution of cybercrime which means that the encoding
and decoding language used by the organisations to communicate so that the hackers do not
identify what language is being written in the data so that they will not be able to leak or breach
the data. Access control is also one of the solutions of cybercrime which means that only those
people in the organisation should be given the access who are trustable so that written
information can be saved in the computer systems (Somer, 2019). authentication and
authorisation is another solution of cybercrime which means that whatever the important
software or application is being installed in the computer systems must be properly authenticated
12

and authorised with the specific people who are expertise in it so that any unknown person
cannot have the access to such details of the organisation. Updating the system on the frequent
basis is also one of the solutions of cybercrime which means that every computer system or even
the technology requires the upgrade on a frequent basis so that they can be more secure every
time with the new features because hackers find it difficult to hack the systems who are updated
(Biswal and Pani, 2021). Training and development to employees is another solution of
Cybercrime because until and unless employees don't have any knowledge about the computer
systems and Technology they will continue working with the way they were working earlier and
therefore they can be the victim of Cybercrimes and therefore it is important to train and develop
the employees in the terms of Technology so that they can be careful while using the computer
systems and also with the internet and networks while browsing. This majorly helps in fighting
against the email spoofing and internet fraud. The entire report is based on identity theft using
social engineering so therefore there are also solutions to prevent the systems from identity theft
such as protecting the passwords of confidential details of an individual and the smart working
with that credit card and debit card along with securing the mails from spams. Moreover,
ensuring the computer and internet security along with reviewing the records on a regular basis
along with the checking of the credit rating frequently (Conteh, 2021).
Chapter 3: Requirements and analysis
There are many things which are required to accomplish the report and the search of
Identity theft using social engineering in the form of data collected and technical devices used to
achieve the research. talking about the requirements of data which is used in conducting the
research of Identity theft using social engineering the type of secondary data and cross sectional
data along with the categorical data and time series data which is followed by the spatial data and
ordered data. Secondary data are the types of data where data is not collected directly from the
human resources such as with the help of questionnaires or surveys and also can be the
interviews and many more sources in which the human directly interacts with the person in order
to gather the information. Therefore, secondary data is something which is collected indirectly
with the help of books and journals along with the articles and internet browsing and also the
newspaper and many more sources where the information is collected indirectly because the
researcher has the reliability of the authors who have given the information in the books or in
any of the indirect sources. These sources must be relevant and reliable along with their recent
13
cannot have the access to such details of the organisation. Updating the system on the frequent
basis is also one of the solutions of cybercrime which means that every computer system or even
the technology requires the upgrade on a frequent basis so that they can be more secure every
time with the new features because hackers find it difficult to hack the systems who are updated
(Biswal and Pani, 2021). Training and development to employees is another solution of
Cybercrime because until and unless employees don't have any knowledge about the computer
systems and Technology they will continue working with the way they were working earlier and
therefore they can be the victim of Cybercrimes and therefore it is important to train and develop
the employees in the terms of Technology so that they can be careful while using the computer
systems and also with the internet and networks while browsing. This majorly helps in fighting
against the email spoofing and internet fraud. The entire report is based on identity theft using
social engineering so therefore there are also solutions to prevent the systems from identity theft
such as protecting the passwords of confidential details of an individual and the smart working
with that credit card and debit card along with securing the mails from spams. Moreover,
ensuring the computer and internet security along with reviewing the records on a regular basis
along with the checking of the credit rating frequently (Conteh, 2021).
Chapter 3: Requirements and analysis
There are many things which are required to accomplish the report and the search of
Identity theft using social engineering in the form of data collected and technical devices used to
achieve the research. talking about the requirements of data which is used in conducting the
research of Identity theft using social engineering the type of secondary data and cross sectional
data along with the categorical data and time series data which is followed by the spatial data and
ordered data. Secondary data are the types of data where data is not collected directly from the
human resources such as with the help of questionnaires or surveys and also can be the
interviews and many more sources in which the human directly interacts with the person in order
to gather the information. Therefore, secondary data is something which is collected indirectly
with the help of books and journals along with the articles and internet browsing and also the
newspaper and many more sources where the information is collected indirectly because the
researcher has the reliability of the authors who have given the information in the books or in
any of the indirect sources. These sources must be relevant and reliable along with their recent
13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

year so that the research made can prove effective and efficient while delivering the content in
the form of a report. Cross-sectional data is collected with the help of observational power in
different subjects for example in the form of individuals and forms along with the countries and
regions simultaneously without any time differentiation. This is because this type of data is the
single time point and the single space point because it has a limited nature which cannot describe
the change over time and therefore its relationships vary from one aspect to another. Categorical
data demonstrate the information which are divided in groups such as in the form of gender and
race along with the group or age and many more. This data cannot be measured numerically but
it is qualitative in nature because it is known for its attributes and therefore it consists of the
univariate data set which represents the individual observations in the form of responses. Time
series data is used when some measurements are to be recorded on a frequent basis in the form of
quantities like time duration and temperature along with the weight and population and many
more. It has a variable value which remains increasing and also decreases along with the constant
nature. Spatial data States the geographic information which demonstrate the constructed
features of various oceans along with the information technology geography in the form of points
and lines along with the geometric data and many more. Order data is a type of data where the
data is managed in a systematic manner as per the ordered categories but it is similar to the
categorical variable but different from the ordering variables. For example, the economic status
such as low and medium along with the higher and average. There are different types of analysis
which are undertaken in the formulation of the research such as descriptive data analysis and
causal data analysis. Descriptive data analysis is a type of univariate descriptive data analysis
which means that the analysis is done in a described manner so that it can be understood briefly
without any complications and in an easy manner and also makes the investigation easy. Casual
data analysis is used in the research in such a way when the information background is to be
demonstrated for any purpose along with the scope and limitations.
Chapter 4: Design
Design techniques used to conduct the research of identity theft using social engineering
are such as the data samples collected in the form of various data types such as the observation or
participant observation which means that the data which is represented in the research is a part of
investigator observation about the cyber crime and cyber theft that what the investigator has
observed about identity theft from cost to the loss along with the each and every aspect of the
14
the form of a report. Cross-sectional data is collected with the help of observational power in
different subjects for example in the form of individuals and forms along with the countries and
regions simultaneously without any time differentiation. This is because this type of data is the
single time point and the single space point because it has a limited nature which cannot describe
the change over time and therefore its relationships vary from one aspect to another. Categorical
data demonstrate the information which are divided in groups such as in the form of gender and
race along with the group or age and many more. This data cannot be measured numerically but
it is qualitative in nature because it is known for its attributes and therefore it consists of the
univariate data set which represents the individual observations in the form of responses. Time
series data is used when some measurements are to be recorded on a frequent basis in the form of
quantities like time duration and temperature along with the weight and population and many
more. It has a variable value which remains increasing and also decreases along with the constant
nature. Spatial data States the geographic information which demonstrate the constructed
features of various oceans along with the information technology geography in the form of points
and lines along with the geometric data and many more. Order data is a type of data where the
data is managed in a systematic manner as per the ordered categories but it is similar to the
categorical variable but different from the ordering variables. For example, the economic status
such as low and medium along with the higher and average. There are different types of analysis
which are undertaken in the formulation of the research such as descriptive data analysis and
causal data analysis. Descriptive data analysis is a type of univariate descriptive data analysis
which means that the analysis is done in a described manner so that it can be understood briefly
without any complications and in an easy manner and also makes the investigation easy. Casual
data analysis is used in the research in such a way when the information background is to be
demonstrated for any purpose along with the scope and limitations.
Chapter 4: Design
Design techniques used to conduct the research of identity theft using social engineering
are such as the data samples collected in the form of various data types such as the observation or
participant observation which means that the data which is represented in the research is a part of
investigator observation about the cyber crime and cyber theft that what the investigator has
observed about identity theft from cost to the loss along with the each and every aspect of the
14

research. So bees are also used but not in the practical manner instant used in the theoretical
manual such as just recording the opinions of different persons on the research topic and
collected along with the analysis and demonstrative in the research report. Moreover, interviews
are also the part because the investigator has prepared many questions in order to ask so that the
proper answer can get from the people what they think about the cybercrime especially the
identity theft and social engineering. Furthermore, experiments are also done such as in the form
of a website by accepting all cookies and observing the result of what happens if they investigate
and accept all cookies and how it affects identity theft and social engineering. Secondary data
analysis which is also known as the archival study is already discussed in the previous section
that secondary type of data analysis is conducted to attain the whole research report. Mixed
methods are also used in the form of design methodology that is combination of many of the
designs such as the observation and surveys along with the interviews and experiments which is
followed by the secondary data analysis and many more.
Chapter 5: Implementation and testing
Functional testing can be defined as the making sure that the piece of software is working
correctly or not which means that testing of the software in an effective manner so that its
reliability and security can be e compatible with its testing scalability so that its functional
testing have the ability to its non functional testing areas as well as per the overall performance.
There is some process in which the functional testing is conducted such as using the data which
is to be tested in order to identify the inputs because the quality of imports depends upon the
quality of output along with the quantity as well and that is why test data has to be added to fight
first. Second is to determining that what is expected outcome must be based on the input which
means that the input is sure when the investigator put in the software but there is a doubt in the
output because quality totally depends upon the input and sometimes due to the system crash the
output can also get spoiled and therefore determining such cases are important. Third is to run
the test cases with the proper inputs which means that after putting all the qualitative and
quantitative inputs in the software it is important to run so that the output can be analysed as per
the needs and requirements. Fourth is to compare the results which are expected with the help of
actual results to show that comparison done can be easy and comfortable for the investigator and
can analyse the perfect result out of it. Functional testing has some types such as unit test and
integration test along with the smoke test and regression test which is followed by the sanity test
15
manual such as just recording the opinions of different persons on the research topic and
collected along with the analysis and demonstrative in the research report. Moreover, interviews
are also the part because the investigator has prepared many questions in order to ask so that the
proper answer can get from the people what they think about the cybercrime especially the
identity theft and social engineering. Furthermore, experiments are also done such as in the form
of a website by accepting all cookies and observing the result of what happens if they investigate
and accept all cookies and how it affects identity theft and social engineering. Secondary data
analysis which is also known as the archival study is already discussed in the previous section
that secondary type of data analysis is conducted to attain the whole research report. Mixed
methods are also used in the form of design methodology that is combination of many of the
designs such as the observation and surveys along with the interviews and experiments which is
followed by the secondary data analysis and many more.
Chapter 5: Implementation and testing
Functional testing can be defined as the making sure that the piece of software is working
correctly or not which means that testing of the software in an effective manner so that its
reliability and security can be e compatible with its testing scalability so that its functional
testing have the ability to its non functional testing areas as well as per the overall performance.
There is some process in which the functional testing is conducted such as using the data which
is to be tested in order to identify the inputs because the quality of imports depends upon the
quality of output along with the quantity as well and that is why test data has to be added to fight
first. Second is to determining that what is expected outcome must be based on the input which
means that the input is sure when the investigator put in the software but there is a doubt in the
output because quality totally depends upon the input and sometimes due to the system crash the
output can also get spoiled and therefore determining such cases are important. Third is to run
the test cases with the proper inputs which means that after putting all the qualitative and
quantitative inputs in the software it is important to run so that the output can be analysed as per
the needs and requirements. Fourth is to compare the results which are expected with the help of
actual results to show that comparison done can be easy and comfortable for the investigator and
can analyse the perfect result out of it. Functional testing has some types such as unit test and
integration test along with the smoke test and regression test which is followed by the sanity test
15

and user acceptance test. User acceptance testing is also used in conducting the research which is
defined as the clinical trial process in the form of critical element and primary goal is to make
sure that the electronic case report forms is conducted as per the needs and requirements of the
electronic data capture which the research has utilised in conducting the same. Moreover both
the types of testing is used in conducting the research on a practical and theoretical basis so that
the research content can be evidence and justification can be made for the same on the research
topic that is The Identity theft using social engineering.
Chapter 6: Results and discussion
Findings
It is important to study and learn about cyber crimes so that cyber security can be applied
in real world applications and organisations. The research done is on the topic of Identity theft
using social engineering which is a part of Cyber crime in which the hacker extracts the private
information of the user in order to steal the money. Therefore, different types of aims and
objectives are created so that a better understanding can be developed from the research report.
Such a project proposal was met with the help of different project objectives which contains the
project aim and background along with the scope. Proposed approach is also discussed which
includes the ways of achieving your objectives and additional needs along with the professional
issues. Preliminary plan has to find out the identification of the sequence of steps along with the
expectation of a project to be finished. Further findings on the basis of a major computing project
report which includes different chapters such as chapter 1 is of the introduction which has found
out about the research background and summary. Chapter 2 is all about the literature review
which has focused on all the four objectives which was made in the previous section and do the
objectives are the concept of social engineering and its effect on society along with the identity
theft and its consequences on the students which is followed by the issues of Cyber threats and
its impact on businesses and economy and also the solutions of cybercrime and implementing it
in the real world situations. Moreover the findings are also made on the basis of requirements
and analysis along with the design and implementation which is followed by the testing and also
the results and discussion. Hence this report covers all such areas in order to better understand
the conception of Identity theft using social engineering.
16
defined as the clinical trial process in the form of critical element and primary goal is to make
sure that the electronic case report forms is conducted as per the needs and requirements of the
electronic data capture which the research has utilised in conducting the same. Moreover both
the types of testing is used in conducting the research on a practical and theoretical basis so that
the research content can be evidence and justification can be made for the same on the research
topic that is The Identity theft using social engineering.
Chapter 6: Results and discussion
Findings
It is important to study and learn about cyber crimes so that cyber security can be applied
in real world applications and organisations. The research done is on the topic of Identity theft
using social engineering which is a part of Cyber crime in which the hacker extracts the private
information of the user in order to steal the money. Therefore, different types of aims and
objectives are created so that a better understanding can be developed from the research report.
Such a project proposal was met with the help of different project objectives which contains the
project aim and background along with the scope. Proposed approach is also discussed which
includes the ways of achieving your objectives and additional needs along with the professional
issues. Preliminary plan has to find out the identification of the sequence of steps along with the
expectation of a project to be finished. Further findings on the basis of a major computing project
report which includes different chapters such as chapter 1 is of the introduction which has found
out about the research background and summary. Chapter 2 is all about the literature review
which has focused on all the four objectives which was made in the previous section and do the
objectives are the concept of social engineering and its effect on society along with the identity
theft and its consequences on the students which is followed by the issues of Cyber threats and
its impact on businesses and economy and also the solutions of cybercrime and implementing it
in the real world situations. Moreover the findings are also made on the basis of requirements
and analysis along with the design and implementation which is followed by the testing and also
the results and discussion. Hence this report covers all such areas in order to better understand
the conception of Identity theft using social engineering.
16
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Goals achieved
Aims and objectives has been achieved as per the development of them such as the first
objective is to you understand about the concept of social engineering and its effect on society,
this objective is attained by briefly describing that what is social engineering and how it can
effect on society by delivering the content on the negative aspects of social engineering so that
its various types and many other information can be reflected for better understanding and in-
depth research conducted given by the author therefore it is important to conduct the research
about social engineering because identity theft is a part of social engineering which has properly
described the term. Second objective is to understand about the identity theft and its
consequences on the students which means that the proper term which is considered in the aim of
the project that is the identity theft has been described in this objective so that its various types
and negative aspects can be briefly written in the project for better understanding and
improvement of the the mind set in terms of Identity theft that is exactly what it is and how it can
highly effect on the students. Consequences on the students is undertaken because of the reason
that now a days most of the students have their bank accounts and they start earning before there
valid age and there for hackers attack the students first in terms of Identity theft because students
wants to earn money and they can do anything for that so therefore consequences of the students
is undertaken in terms of Identity theft in second objective. Third objective is to understand
about various types of issues of Cyber threats and its impact on businesses and economy in
which the large number of Cyber crimes are discussed which the hackers uses to hack the
computer system with the negative motive and the most importantly their impact on businesses
and economy is taken because in today's era cybercrime is highly making the victim businesses
and economy because business contains a large amount of information and it hacker had those
information we can easily ask large amount of money so therefore the large organisations offers
the most because of the cyber crimes. Forth objective is the solution of cybercrime and
implementing it in the real world situations which means mat after stating all the issues and
problems in previous objectives now it is important to state the solutions that how the person can
find against such cyber theft and identity theft in the real-world situations so therefore this is the
last gold which is achieved in the form of 4th objective by providing the reliable and relevant
solutions which is having a practical nature of implementing in the real world circumstances.
17
Aims and objectives has been achieved as per the development of them such as the first
objective is to you understand about the concept of social engineering and its effect on society,
this objective is attained by briefly describing that what is social engineering and how it can
effect on society by delivering the content on the negative aspects of social engineering so that
its various types and many other information can be reflected for better understanding and in-
depth research conducted given by the author therefore it is important to conduct the research
about social engineering because identity theft is a part of social engineering which has properly
described the term. Second objective is to understand about the identity theft and its
consequences on the students which means that the proper term which is considered in the aim of
the project that is the identity theft has been described in this objective so that its various types
and negative aspects can be briefly written in the project for better understanding and
improvement of the the mind set in terms of Identity theft that is exactly what it is and how it can
highly effect on the students. Consequences on the students is undertaken because of the reason
that now a days most of the students have their bank accounts and they start earning before there
valid age and there for hackers attack the students first in terms of Identity theft because students
wants to earn money and they can do anything for that so therefore consequences of the students
is undertaken in terms of Identity theft in second objective. Third objective is to understand
about various types of issues of Cyber threats and its impact on businesses and economy in
which the large number of Cyber crimes are discussed which the hackers uses to hack the
computer system with the negative motive and the most importantly their impact on businesses
and economy is taken because in today's era cybercrime is highly making the victim businesses
and economy because business contains a large amount of information and it hacker had those
information we can easily ask large amount of money so therefore the large organisations offers
the most because of the cyber crimes. Forth objective is the solution of cybercrime and
implementing it in the real world situations which means mat after stating all the issues and
problems in previous objectives now it is important to state the solutions that how the person can
find against such cyber theft and identity theft in the real-world situations so therefore this is the
last gold which is achieved in the form of 4th objective by providing the reliable and relevant
solutions which is having a practical nature of implementing in the real world circumstances.
17

Further work
Current research is totally based upon the identity theft using social engineering but it is
important to explore other areas of cybercrimes so that the solutions of each and every cyber
crime can be conducted in order to spread the knowledge play uses more and more in order to
prevent and reduce Cyber crimes in the world. Therefore further work is totally based upon the
other areas of Cyber crimes discussed in the report but not in a in-depth manner such as in the
form of malware and spyware along with the password cracking and virus attack which is
followed by the breaking of the access control and many more. identity theft using social
engineering was important so it is discussed in the report but other areas are equally important
and can also damage even more than The Identity theft there for these are also to be get
researched and development of the report must be conducted so that the proper relevant and
reliable data can be demonstrated in the form of report for future consideration. Moreover it is
important to conduct research in a more enhanced and improved manner so that the limitations in
this research cannot be reflect in the future research there for better decision making is required
to conduct research.
Chapter 7: Conclusion
It is concluded that the research is undertaken on cyber crime, especially on identity theft
using social engineering. Research conducted with the help of data analysis and all the technical
requirements so that the proper and relevant data can be written in the project report for better
understanding and exploring out the research topic along with the aims and objectives. Identity
theft has a very bad impact on the society as well as on the organisations along with the students
and even also on the individuals so therefore the preventive solutions are drawn out in the
research report so that the brief understanding can be concluded with the help of research
undertaken in the entire report.
18
Current research is totally based upon the identity theft using social engineering but it is
important to explore other areas of cybercrimes so that the solutions of each and every cyber
crime can be conducted in order to spread the knowledge play uses more and more in order to
prevent and reduce Cyber crimes in the world. Therefore further work is totally based upon the
other areas of Cyber crimes discussed in the report but not in a in-depth manner such as in the
form of malware and spyware along with the password cracking and virus attack which is
followed by the breaking of the access control and many more. identity theft using social
engineering was important so it is discussed in the report but other areas are equally important
and can also damage even more than The Identity theft there for these are also to be get
researched and development of the report must be conducted so that the proper relevant and
reliable data can be demonstrated in the form of report for future consideration. Moreover it is
important to conduct research in a more enhanced and improved manner so that the limitations in
this research cannot be reflect in the future research there for better decision making is required
to conduct research.
Chapter 7: Conclusion
It is concluded that the research is undertaken on cyber crime, especially on identity theft
using social engineering. Research conducted with the help of data analysis and all the technical
requirements so that the proper and relevant data can be written in the project report for better
understanding and exploring out the research topic along with the aims and objectives. Identity
theft has a very bad impact on the society as well as on the organisations along with the students
and even also on the individuals so therefore the preventive solutions are drawn out in the
research report so that the brief understanding can be concluded with the help of research
undertaken in the entire report.
18

References:
Books and Journals
Abass, I.A.M., 2018. Social engineering threat and defense: a literature survey. Journal of
Information Security. 9(04). p.257.
Aldawood, H. and Skinner, G., 2018, December. Educating and raising awareness on cyber
security social engineering: A literature review. In 2018 IEEE International Conference on
Teaching, Assessment, and Learning for Engineering (TALE) (pp. 62-68). IEEE.
Aldawood, H. and Skinner, G., 2019. A taxonomy for social engineering attacks via personal
devices. International Journal of Computer Applications, 975, p.8887.
Ali, L., 2019. Cyber crimes-A constant threat for the business sectors and its growth (A study of
the online banking sectors in GCC). The Journal of Developing Areas. 53(1).
Al-Khater, W.A., Al-Maadeed, S., Ahmed, A.A. and Khan, M.K., 2020. Comprehensive review
of cybercrime detection techniques. IEEE Access, 8, pp.137293-137311.
Alshammari, T.S. and Singh, H.P., 2018. Preparedness of Saudi Arabia to defend against cyber
crimes: An assessment with reference to anti-cyber crime law and GCI index. Archives of
Business Research. 6(12).
Bansla, N., Kunwar, S. and Gupta, K., 2019. Social engineering: A technique for managing
human behavior. Journal of Information Technology and Sciences. 5(1). pp.18-22.
Biswal, C.S. and Pani, S.K., 2021. Cyber‐Crime Prevention Methodology. Intelligent Data
Analytics for Terror Threat Prediction: Architectures, Methodologies, Techniques and
Applications, pp.291-312.
Brar, H.S. and Kumar, G., 2018. Cybercrimes: A proposed taxonomy and challenges. Journal of
Computer Networks and Communications, 2018.
Conteh, N.Y. and Schmick, P.J., 2021. Cybersecurity Risks, Vulnerabilities, and
Countermeasures to Prevent Social Engineering Attacks. In Ethical Hacking Techniques
and Countermeasures for Cybercrime Prevention (pp. 19-31). IGI Global.
Conteh, N.Y. and Staton, Q.N., 2021. The Socio-Economic Impact of Identity Theft and
Cybercrime: Preventive Measures and Solutions. In Ethical Hacking Techniques and
Countermeasures for Cybercrime Prevention (pp. 104-113). IGI Global.
Conteh, N.Y., 2021. Ethical Hacking, Threats, and Vulnerabilities in Cybersecurity. In Ethical
Hacking Techniques and Countermeasures for Cybercrime Prevention (pp. 1-18). IGI
Global.
Kagita, M.K., Thilakarathne, N., Gadekallu, T.R. and Singh, S., 2020. A review on cyber crimes
on the Internet of Things. arXiv preprint arXiv:2009.05708.
Kamat, P. and Gautam, A.S., 2018. Recent trends in the era of cybercrime and the measures to
control them. In Handbook of e-business security (pp. 243-258). Auerbach Publications.
Kashif, M., Javed, M.K. and Pandey, D., 2020. A surge in cyber-crime during COVID-
19. Indonesian Journal of Social and Environmental Issues (IJSEI). 1(2). pp.48-52.
Kizza, J.M., 2020. Cyber Crimes and Hackers. Guide to Computer Network Security, pp.105-
131.
Lee, J.R. and Holt, T.J., 2020. Assessing the factors associated with the detection of juvenile
hacking behaviors. Frontiers in Psychology, 11, p.840.
Patel, N., 2020. Social engineering as an evolutionary threat to information security in healthcare
19
Books and Journals
Abass, I.A.M., 2018. Social engineering threat and defense: a literature survey. Journal of
Information Security. 9(04). p.257.
Aldawood, H. and Skinner, G., 2018, December. Educating and raising awareness on cyber
security social engineering: A literature review. In 2018 IEEE International Conference on
Teaching, Assessment, and Learning for Engineering (TALE) (pp. 62-68). IEEE.
Aldawood, H. and Skinner, G., 2019. A taxonomy for social engineering attacks via personal
devices. International Journal of Computer Applications, 975, p.8887.
Ali, L., 2019. Cyber crimes-A constant threat for the business sectors and its growth (A study of
the online banking sectors in GCC). The Journal of Developing Areas. 53(1).
Al-Khater, W.A., Al-Maadeed, S., Ahmed, A.A. and Khan, M.K., 2020. Comprehensive review
of cybercrime detection techniques. IEEE Access, 8, pp.137293-137311.
Alshammari, T.S. and Singh, H.P., 2018. Preparedness of Saudi Arabia to defend against cyber
crimes: An assessment with reference to anti-cyber crime law and GCI index. Archives of
Business Research. 6(12).
Bansla, N., Kunwar, S. and Gupta, K., 2019. Social engineering: A technique for managing
human behavior. Journal of Information Technology and Sciences. 5(1). pp.18-22.
Biswal, C.S. and Pani, S.K., 2021. Cyber‐Crime Prevention Methodology. Intelligent Data
Analytics for Terror Threat Prediction: Architectures, Methodologies, Techniques and
Applications, pp.291-312.
Brar, H.S. and Kumar, G., 2018. Cybercrimes: A proposed taxonomy and challenges. Journal of
Computer Networks and Communications, 2018.
Conteh, N.Y. and Schmick, P.J., 2021. Cybersecurity Risks, Vulnerabilities, and
Countermeasures to Prevent Social Engineering Attacks. In Ethical Hacking Techniques
and Countermeasures for Cybercrime Prevention (pp. 19-31). IGI Global.
Conteh, N.Y. and Staton, Q.N., 2021. The Socio-Economic Impact of Identity Theft and
Cybercrime: Preventive Measures and Solutions. In Ethical Hacking Techniques and
Countermeasures for Cybercrime Prevention (pp. 104-113). IGI Global.
Conteh, N.Y., 2021. Ethical Hacking, Threats, and Vulnerabilities in Cybersecurity. In Ethical
Hacking Techniques and Countermeasures for Cybercrime Prevention (pp. 1-18). IGI
Global.
Kagita, M.K., Thilakarathne, N., Gadekallu, T.R. and Singh, S., 2020. A review on cyber crimes
on the Internet of Things. arXiv preprint arXiv:2009.05708.
Kamat, P. and Gautam, A.S., 2018. Recent trends in the era of cybercrime and the measures to
control them. In Handbook of e-business security (pp. 243-258). Auerbach Publications.
Kashif, M., Javed, M.K. and Pandey, D., 2020. A surge in cyber-crime during COVID-
19. Indonesian Journal of Social and Environmental Issues (IJSEI). 1(2). pp.48-52.
Kizza, J.M., 2020. Cyber Crimes and Hackers. Guide to Computer Network Security, pp.105-
131.
Lee, J.R. and Holt, T.J., 2020. Assessing the factors associated with the detection of juvenile
hacking behaviors. Frontiers in Psychology, 11, p.840.
Patel, N., 2020. Social engineering as an evolutionary threat to information security in healthcare
19
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Singh, S.K. and Rastogi, N., 2018, February. Role of cyber cell to handle cyber crime within the
public and private sector: an Indian case study. In 2018 3rd International Conference On
Internet of Things: Smart Innovation and Usages (IoT-SIU) (pp. 1-6). IEEE.
Somer, T., 2019, July. Taxonomies of cybercrime: An overview and proposal to be used in
mapping cyber criminal journeys. In ECCWS 2019 18th European Conference on Cyber
Warfare and Security (Vol. 475). Academic Conferences and publishing limited.
van de Weijer, S.G., Leukfeldt, R. and Bernasco, W., 2019. Determinants of reporting
cybercrime: A comparison between identity theft, consumer fraud, and hacking. European
Journal of Criminology. 16(4). pp.486-508.
Wang, S.Y.K., Hsieh, M.L., Chang, C.K.M. and Dallier, D.J., 2021. Collaboration between Law
Enforcement Agencies in Combating Cybercrime: Implications of a Taiwanese Case Study
about ATM Hacking. International journal of offender therapy and comparative
criminology. 65(4). pp.390-408.
Yar, M. and Steinmetz, K.F., 2019. Cybercrime and society. Sage.
organizations. Jurnal Administrasi Kesehatan Indonesia, 8(1), pp.56-64.
20
public and private sector: an Indian case study. In 2018 3rd International Conference On
Internet of Things: Smart Innovation and Usages (IoT-SIU) (pp. 1-6). IEEE.
Somer, T., 2019, July. Taxonomies of cybercrime: An overview and proposal to be used in
mapping cyber criminal journeys. In ECCWS 2019 18th European Conference on Cyber
Warfare and Security (Vol. 475). Academic Conferences and publishing limited.
van de Weijer, S.G., Leukfeldt, R. and Bernasco, W., 2019. Determinants of reporting
cybercrime: A comparison between identity theft, consumer fraud, and hacking. European
Journal of Criminology. 16(4). pp.486-508.
Wang, S.Y.K., Hsieh, M.L., Chang, C.K.M. and Dallier, D.J., 2021. Collaboration between Law
Enforcement Agencies in Combating Cybercrime: Implications of a Taiwanese Case Study
about ATM Hacking. International journal of offender therapy and comparative
criminology. 65(4). pp.390-408.
Yar, M. and Steinmetz, K.F., 2019. Cybercrime and society. Sage.
organizations. Jurnal Administrasi Kesehatan Indonesia, 8(1), pp.56-64.
20
1 out of 23
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.