Identity Theft: Who Are You Anyway?
نویسنده
چکیده
I N F O R M A T I O N S Y S T E M S S E C U R I T Y RALPH SPENCER POORE, CISSP, CISA, CFE, is the Chief Technology Officer of Privacy Infrastructure, Inc. and a long-time contributor to the Journal. Please feel free to provide feedback to him at [email protected]. When farmer Jones walked into the general store in town, the storeowner — or one of his employees — would greet him personally. The storeowner knew whether farmer Jones’ credit was good, what his buying habits were, and how he would settle his account. If someone else came in pretending to be farmer Jones, he had to look and act like farmer Jones, and if he didn’t pull it off, he risked physical detention. Of course, there may be places today that are like the television show Cheers where everyone knows us. In cyberspace, however, our computer has a better chance to be known than we do. The degree to which I must convey who I am to others directly correlates with the requirements of the transaction I attempt. Many transactions do not require me to identify myself. When I walk into a convenience store to buy a gallon of milk and I pay cash, the clerk neither requests nor needs my identification. When I attempt a transaction for which personally identifiable information is required (e.g., one requiring that I be at least 21 years of age), then either the clerk must ask for identification sufficient for the transaction or the clerk must acquire sufficient validation by personal recognizance. The latter choice (e.g., recognizing that a man with a graying beard is probably older than 21) is, at least currently, not an available choice to online merchants. In cyberspace, the apparent identity (usually obtained from the hardware or software used) becomes your identity for purposes of an online transaction. From knowing the identity of the computer presented, you may correctly identify the person using the computer — or not. Many technologies purporting to identify and to authenticate a person (“end user”) rely on the assumed relationship the user has with the computer that the user appears to be using. Cellular telephones and similar handheld computers (e.g., PDA) usually authenticate as if they were the end users. Successfully cloning such computers equates to stealing the identities of the legitimate owners — if only for limited purposes. Files used to authenticate a user can usually be copied to other computers. In Windows systems, for example, these P R I V A C Y
منابع مشابه
The Myths of Security: What the Computer Security Industry Doesnt Want You to Know by Viega John
Why is security so bad? With many more people online than just a few years ago, there are more attackers -and theyre truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you: Why its easier for bad guys to own your computer than you think W...
متن کاملThe Consequences of the Identity Theft Fear in the Sport Products Online Shopping From the Perspective of Physical Education Students
Background. Today, online shopping has become one of the most important components of modern marketing that had both positive and negative consequences for customers. Objectives. The purpose of present research was to study the consequences of fear of identity theft in sport products online shopping from the perspective of physical education students. Methods. The present study is a descripti...
متن کاملComplementing for “Permanent Identity-Theft” in Biometrics Using Visual-Based Challenge Response
Biometric authentication has been described to be reliable solution to the problem of identity determination by establishing the identity of a person based on “who he is", but permanent Identity theft has been considered an important issue since biometric samples are not secret and when a biometric feature is compromised, it cannot be changed. This research work describes a middleware called Vi...
متن کاملDifferentiating identity theft: An exploratory study of victims using a national victimization survey☆
Despite the widespread attention given to identity theft, there is much confusion on how best to define and measure it. Recent attempts to measure its extent through victimization surveys or law enforcement files have varied considerably in the types of crimes included as identity theft. Some studies include credit card fraud, while others exclude it. This inconsistency in data collection has m...
متن کاملThe Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution
Background: Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals’ tendency to addiction, theft and prostitution in Kerman city, Iran. Methods...
متن کاملIdentities , forgeries and disguises Gérard Chollet and
The preservation of your identity could become a major concern. In many situations, you need to claim an identity and this claim needs to be verified somehow. The technology called biometrics may help. But, what if a deliberate impostor claims your identity? Will this forgery be always detected? Biometric identity verification is imperfect. This paper reviews some of the techniques that a delib...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information Systems Security
دوره 10 شماره
صفحات -
تاریخ انتشار 2001