Title :
With attackers wearing many hats, prevent your “Identity Theft”
Author :
Bindra, Gundeep Singh ; Shrivastava, Dhrupad ; Seth, Richa
Author_Institution :
Comput. Sci. Dept., SRM Univ., Delhi, India
Abstract :
An Identity Is Stolen Every 3 Seconds!! Spoofing is a huge issue for most Internet users - in fact, Identity Theft victimized 10.1 Million Americans last year. In this modern digital world, it is very simple to fool the system and pretend to be anyone. With the identity theft getting simpler day-by-day, make sure you are not being digitally spoofed. These days, it doesn´t require a computer genius to intrude your privacy or impersonate the victim. And despite various laws, individuals and businesses are still feeling the negative effects of spam alike. The attacker could use your email to send emails to your contacts/anyone or use your caller ID number to call and eventually talk to people. This paper is an attempt to make the readers aware of the various types of spoofing that exists and also how not to fall in prey to them. It is an examination of the various spoofing techniques used by the attackers and their motives. This work intends to increase the awareness and understanding of the Identity Thefts that are and related frauds throughout the world. A few control measures at the users´ level are also suggested. This conceptual paper is definitely expected to contribute to future research on similar and related topics as spin off from this study.
Keywords :
Internet; computer crime; data privacy; fraud; unsolicited e-mail; Internet; call forging; email forging; frauds; identity theft prevention; privacy intrusion; spam; spoofing techniques; Computers; Electronic mail; FCC; IP networks; Internet; Poles and towers; Postal services; Call Forging; Email Forging; Identity Thefts; Spoofing; countermeasures;
Conference_Titel :
Application of Information and Communication Technologies (AICT), 2012 6th International Conference on
Conference_Location :
Tbilisi
Print_ISBN :
978-1-4673-1739-9
DOI :
10.1109/ICAICT.2012.6398499