Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
18 views4 pages

Sultan Identity Theft

The document discusses identity theft, highlighting its prevalence due to increased internet use and data breaches. It details methods used by identity thieves, including phishing and the sale of stolen data on the dark web, and mentions a recent case of social security fraud in the U.S. The document emphasizes the importance of monitoring personal information and implementing security measures to protect against identity theft.

Uploaded by

Sammy Thuku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views4 pages

Sultan Identity Theft

The document discusses identity theft, highlighting its prevalence due to increased internet use and data breaches. It details methods used by identity thieves, including phishing and the sale of stolen data on the dark web, and mentions a recent case of social security fraud in the U.S. The document emphasizes the importance of monitoring personal information and implementing security measures to protect against identity theft.

Uploaded by

Sammy Thuku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Running Head: IDENTITY THEFT 1

Identity Theft

Student Name

Course

Instructor

Institution

Date
IDENTITY THEFT 2

In this age and time, consumers worldwide are demanding business models that follow

their expectations. This demand is prominent among online consumers who want personalized

user interfaces that help them complete their orders wherever they are. Consumers also want

online store inventory to be available free and fast, and secure from hacking. These expectations

of consumers have allowed online criminals to steal consumers' identities by mimicking their

personal data, where they use these details to obtain goods or steal money from consumers'

online profiles.

Identity theft is stealing personal information from people without their permission.

Because of the increased internet use, consumer data is at the greatest risk. The most common

method of identity theft is due to data breaches, which occurs when a person gains access to an

organization’s data without consent. This data ranges from credit card names and social security

number breaches. Sometimes the motive of the hackers who steal online users' identity is to sell

the data to others for it to be used illegally, and can even land on the dark web. The dark web is a

hidden network of websites where users use special software to hide their identities and

activities, making it a dangerous place for an innocent online user.

A recent case of identity theft happened in the United States where the seven individuals

were arrested for social security numbers fraud. According to the U.S. Office of the Inspector

General (2022), the individuals were found faces 10 years imprisonment for theft of government

property through false statements and concealment of identities to fraudulently benefit from the

social security department. Social security identity theft occurs when scammers use a person

social security numbers to steal government or take loans pretending to be victims. The

Australian Institute of Criminology (AIC) estimates the economic impact of identity theft to be

more than 2 billion dollars annually.


IDENTITY THEFT 3

Identity thieves do not limit themselves to only getting physical information on a person.

They also pry into people's lives through the web. They will phish for electronic information

with false emails, text messages, and websites crafted to steal data from anyone who visits the

site (How does identity theft happen?). With so many ways for identity thieves to steal, it is

important to know how to protect your identity. With modern technology and resources, a person

can monitor the various sectors an identity thief would attack (Australia Department of Home

Affairs, 2022). People should ensure that they have access to their bank accounts and monitor

their accounts regularly.

It is important to implement two-step verifications to double verify a person every time

they log in to a bank account. They should also ensure that they are notified anytime their bank

account is logged in or of failed login attempts. Regularly check bank statements to ensure that

there is no unauthorized purchase on any accounts. The same care should be taken with credit

reports. Many resources will monitor credit reports and notify a person if new accounts are

started. Taking the initiative to ensure that everything related to identity is being monitored can

be the difference between keeping your identity or it being stolen.

Questions

1. How does a person know that their identity has been stolen?

2. What signs should a person look out for to ensure their identity is secure?

3. Is phishing same as identity theft?


IDENTITY THEFT 4

References

Australia Department of Home Affairs (August 25, 2022). Identity crime in Australia. Retrieved

on November 2, 2022 from https://www.homeaffairs.gov.au/about-us/our-portfolios/criminal-

justice/cybercrime-identity-security/identity-crime

U.S. Office of Inspector General (October 5, 2022). Seven individuals indicted for social security

fraud. Retrieved on November 2, 2022 from https://oig.ssa.gov/news-releases/2022-10-06-

seven-individuals-indicted-for-social-security-fraud/

You might also like