Running head: IDENTITY THEFT
Cases of identity theft are on the rise throughout the world in today’s competitive world. The
primary purpose of this research is to alert and make individuals aware of the meaning of identity
theft, how it is happening in today’s world as well as the type of technology being used to
perform the fraud. The paper also looks into various ways through which identity theft can be
prevented. The paper is organized in three main parts:
The introduction, which briefly describes the main points discussed in the body of the research;
Practical problems, which highlights some examples of techniques used by hackers to steal other
people’s identities and lastly, Background situations, which explains the causes and impact of
identity theft, using examples.
The primary study of this research regards cyber crime’s identity theft. Identity theft is
defined as the act of stealing personal details belonging to other people. These include details
such as credit card details, numbers of social security and date of births. Consumers use the
internet to make their transactions easy. In 2007, a news release by Metro alleged that 9 out of
every ten people become victims of identity theft. The research seeks to make an animation
website to direct internet users how to make use and install specific tools, technology as well as
programs to prevent them from identity theft (Jakobsson & Myers, 2006).
Criminals use technologies like phishing e-mails as well as liberate effective virus,
targeting many people using the internet so that they can get their personal identities (Jakobsson
& Myers, 2006). However, there are strategies that consumers can use to protect their private
data from being accessed to these criminals. They can effectively use measures like Anti-virus
software, avoiding unnecessary cookies, avoiding strange emails and keeping their identities
secret. In recent days, online fraud has greatly increased because of the technological abilities of
the hackers. The following are examples of hacking techniques used to obtain private data of
people by cybercriminals, and how they can be prevented.
Spam attack refers to the technique used by hackers to access personal data of people, by
sending fraudulent emails which upon opening, enables the cybercriminals to obtain details such
as secret passwords. In order to prevent the attackers from obtaining private data of users such as
passwords, usernames and credit card information, users should be extremely careful about
opening strange emails that they receive (Bilge et al., 2009). They should be trained to
distinguish between trustworthy and spam messages. There are also websites that publish
messages or sources of messages that have been flagged as spam so that the users know which
ones they need to avoid. For instance,...