Back to Search Start Over

Online ID theft techniques, investigation and response

Authors :
Paula Thomas
Theodore Tryfonas
Konstantinos Xynos
Olga Angelopoulou
Source :
University of Bristol-PURE
Publication Year :
2007
Publisher :
Inderscience Publishers, 2007.

Abstract

ID theft, especially in its online form, is currently one of the most prevalent types of computer crime. The limited end-user awareness as well as the retention and business processing of large amounts of personal data in a manner that does not meet security and regulatory requirements provide plenty of opportunities to fraudsters. A number of organisations have produced guidelines of good practice targeted to individuals and organisations; however the matter is still on the rise. In this paper, we review computer-based techniques employed by fraudsters in order to steal IDs and refer to published guidelines and the documented good practice against those. We discuss the issues related to the investigation of such incidents and provide the grounds for the development of a framework to assist in their forensic examination.

Details

ISSN :
17519128 and 1751911X
Volume :
1
Database :
OpenAIRE
Journal :
International Journal of Electronic Security and Digital Forensics
Accession number :
edsair.doi.dedup.....e46d63cce4e5410dc5a53b06b4837d8b
Full Text :
https://doi.org/10.1504/ijesdf.2007.013594