Wednesday, May 8, 2019

Identity Theft Computer Forensics to the Rescue Research Paper - 2

Identity Theft Computer Forensics to the Rescue - Research Paper physical exertionThen, social, ethical and moral issues regarding individuality theft have been discussed. The report is summarized in a concluding paragraph. APA referencing has been utilise properly.Identity theft is the crime that involves stealing of a individuals private information in order to impersonate that person in a legal sense, according to Vacca (137). When a persons identity is stolen, he is at great risk of facing a terrifying tote up of monetary and individual dealings done in his name by the thief. Technology, along with its pros, has introduced exceedingly technical and chic means of acquiring someones basic identifying information. Whatever means the thief uses, identity theft brings great damage to the victims name and reputation as the victim is but left responsible for whatever financial or personalised loss he faces. One much has to reveal bits of his personal information while doing onl ine transactions, such as his name, address, telephone number, bank information, credit tantalise information, and etcetera. The thief, after stealing this information, can misuse it by, for instance, applying for loans in the victims name, changing his billing address, obtaining movement license, applying for jobs, applying for insurance or new banking accounts, getting authorization for electronic transfers by victimization the victims electronic signature, or any other fraud.On the internet, identity theft is being accomplished using techniques same sending Trojan horses, which are destructive programs, into the computer system, and important passwords and useful information like social security number is transferred to the thief. Another way to steal an identity is email phishing. The victim is direct emails telling the victim that they are from so-and-so enterprise and scamming him by directing him to a fake website which asks for his personal information.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.