Facts About Identity Theft In Computer Security

identity theft

Facts About Identity Theft In Computer Security

 

 

In my previous articles, I have talked about some of the facts that you need to know about how you can secure yourself online. Please note that the mistake that many people are making is that they always feel that they have nothing that is of importance to a hacker. You should note that you have a lot that a hacker can use even though you are the poorest person in the world. You need to keep your data and personal effects secured. In this article, I want to look at some facts about Identity theft in computer security. Follow me as we will look at that together in this article.

 

Let us start with this customer’s complaint…

“I lost my purse in 2006. But Suprisingly I got notices of bounced cheques in 2007. About a year later, I received information that someone using my identity had bought a car. In 2008, I came to know that someone is using my Social Security Number for a number of years. A person got arrested and produced my SSN on his arrest sheet. I can’t get credit because of this situation. I was denied a mortgage, employment, credit cards and medical care for my children”

 

What is Identity theft?

Identity theft or ID Fraud refers to fraud where an offender wrongly obtains key pieces of the intended victim’s personal identifying information, such as date of birth, Social Security Number, driver’s license number among others. and make gains by using personal data. 

 

Negative effects of such losses…

#1 Financial losses 

One of the negative impacts of identity theft is that it will lead to financial losses for the victim. When such details are stolen, they can use them to process loans or buy products online. This can negatively impact your credit records. That is why you have to keep such identities of yours secured. 

 

#2 Criminal charges

Also, when your identities are stolen, a crime can be committed on your behalf and you will have to answer for such offences. Take, for example, you have just lost your ID card and the person that stole your ID card now went for an armed robbery attack. During the investigation, your ID card was now found at the crime scene. It will take time before you can be cleared of the charges. This will be worsened if you failed to report such loss to the police in the first place.

 

#3 Denials 

In some advanced country, life can be very difficult when you lose your Social Security Number. It can make your life miserable. You can be denied a loan, employment, medicare and other facilities if your ID is stolen and such ID was used to process loans without your consent. This will give you a poor credit rating. 

 

#4 Legal Issues

Also, you can find yourself entering into serious legal issues when your IDs are stolen and it is being used to commit identity crime. This can put you behind bars or damage your reputation. This can even take away ample time that you should have used in concentrating on other tasks. You need to keep your ID safe and maintain your privacy when dealing with others. 

 

Personal Information that can be stolen…

  • Passport numbers
  • Birth Certificates
  • Credit card and bank account numbers
  • Driver licence numbers
  • Social Security numbers 
  • Names 
  • Address 
  • Date of Birth
  • Mother’s maiden name
  • Telephone numbers

 

How do Attackers steal an identity?

#1 Social Engineering 

This is an act of manipulating people trust to perform certain actions or divulging private information, without using a technical cracking method.

 

#2 Phishing 

Here, fraudsters pretend to be a financial institution and send spam/ pop up messages to trick the user to reveal personal information. 

 

#3 Hacking

Attackers may hack computer systems to steal personal information. Here, they always rely on the ignorance or carelessness of the user in order to perpetuate their attacks. That is why it is very vital that you should ask when you do not know or you are not sure of the right thing to do. 

 

#4 Theft of personal stuff

Fraudsters may steal wallets and purses, mails including bank and credit card statements, pre-approved credit card offers and new cheques or tax information.

 

What attackers do with a stolen identity

Here are some of what attackers do with stolen identity generally…

#1 Credit Card Fraud

They may open new credit card accounts in the name of the user and do not pay the bills in return. This will definitely spoil your credit card record generally. 

 

#2 Phone or Utility fraud

They may open a new phone or wireless account in the user’s name, or run up charges on his or her existing account. 

They may use the user’s name to get utility services such as electricity, heating or cable TV. 

 

#3 Other fraud

They may also try to get a job using the person’s Social Security Number. They may also give legitimate user’s information to police during an arrest and if they do not turn up for their court’s date, a warrant for arrest is issued in the legitimate user’s name. 

 

#4 Bank/Finance Fraud

You should also note that they may create counterfeit cheque using a victim’s name or account number. Also, they may open a bank account in the victim’s name and issue the cheques. In addition, they may clone and ATM or credit card and make electronic withdrawals in the victim’s name. They may also take a loan in the victim’s name.

 

#4 Government documents Fraud

It is possible that they get a driving licence or official ID Card issued on legitimate user’s name but with their photo. They may also use the victim’s name and Social Security Name to get government benefits. Also, they may file a fraudulent tax return using legitimate user information.

 

 

Action Point

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.

Download Our App.

          

CEHNigeria On Google Playstore

Download Our Blog App On Google Playstore.

 

        

GET SEOPOZ. OUTSMART YOUR BLOG COMPETITORS

Have a deeper understanding of Google Search Console. Join SEOPOZ for free.

Join Our Whatsapp Group Here

          

Join Our Whatsapp Group

Follow Us On Twitter and I will Follow Back

          

Follow Us On Twitter

Kindly follow me on Twitter and I promise I will follow back. Aside you will get updated when we post new articles.

About Adeniyi Salau 889 Articles
I am an IT enthusiast and a man of many parts. I am a Certified Digital Marketer, Project Manager and a Real Estate Consultant. I love writing because that's what keeps me going. I am running this blog to share what I know with others. I am also a Superlife Stem Cell Distributor. Our Stem Cell Products can cure many ailments.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


CommentLuv badge