Facts About Identity Theft In Computer Security

Computer Security

In my previous articles, I have talked about some of the facts that you need to know about how you can secure yourself online. Please note that the mistake that many people are making is that they always feel that they have nothing that is of importance to a hacker.

 

You should note that you have a lot that a hacker can use even though you are the poorest person in the world. You need to keep your data and personal effects secured. In this article, I want to look at some facts about Identity theft in computer security. Follow me as we will look at that together in this article.

Let us start with this customer’s complaint…

“I lost my purse in 2006. But Surprisingly I got notices of bounced cheques in 2007. About a year later, I received information that someone using my identity had bought a car. In 2008, I came to know that someone is using my Social Security Number for a number of years. A person got arrested and produced my SSN on his arrest sheet. I can’t get credit because of this situation. I was denied a mortgage, employment, credit cards and medical care for my children”

 

What is Identity theft?

Identity theft or ID Fraud refers to fraud where an offender wrongly obtains key pieces of the intended victim’s personal identifying information, such as date of birth, Social Security Number, and driver’s license number among others. and make gains by using personal data. 

Negative effects of such losses…

#1 Financial losses 

One of the negative impacts of identity theft is that it will lead to financial losses for the victim. When such details are stolen, they can use them to process loans or buy products online. This can negatively impact your credit records. That is why you have to keep such identities of yours secured. 

#2 Criminal charges

Also, when your identities are stolen, a crime can be committed on your behalf and you will have to answer for such offences. Take, for example, you have just lost your ID card and the person that stole your ID card now went for an armed robbery attack. During the investigation, your ID card was now found at the crime scene. It will take time before you can be cleared of the charges. This will be worsened if you failed to report such loss to the police in the first place.

#3 Denials 

In some advanced countries, life can be very difficult when you lose your Social Security Number. It can make your life miserable. You can be denied a loan, employment, medicare and other facilities if your ID is stolen and such ID was used to process loans without your consent. This will give you a poor credit rating. 

#4 Legal Issues

Also, you can find yourself entering into serious legal issues when your IDs are stolen and it is being used to commit identity crime. This can put you behind bars or damage your reputation. This can even take away ample time that you should have used in concentrating on other tasks. You need to keep your ID safe and maintain your privacy when dealing with others. 

Personal Information that can be stolen…

  • Passport numbers
  • Birth Certificates
  • Credit card and bank account numbers
  • Driver licence numbers
  • Social Security numbers 
  • Names 
  • Address 
  • Date of Birth
  • Mother’s maiden name
  • Telephone numbers

 

How do Attackers steal an identity?

#1 Social Engineering 

This is an act of manipulating people’s trust to perform certain actions or divulging private information, without using a technical cracking method.

#2 Phishing 

Here, fraudsters pretend to be a financial institution and send spam/pop-up messages to trick the user to reveal personal information. 

#3 Hacking

Attackers may hack computer systems to steal personal information. Here, they always rely on the ignorance or carelessness of the user in order to perpetuate their attacks. That is why it is very vital that you should ask when you do not know or you are not sure of the right thing to do. 

#4 Theft of personal stuff

Fraudsters may steal wallets and purses, mail including bank and credit card statements, pre-approved credit card offers and new cheques or tax information.

What attackers do with a stolen identity

Here are some of what attackers do with stolen identity generally…

#1 Credit Card Fraud

They may open new credit card accounts in the name of the user and do not pay the bills in return. This will definitely spoil your credit card record generally. 

#2 Phone or Utility fraud

They may open a new phone or wireless account in the user’s name, or run up charges on his or her existing account. 
They may use the user’s name to get utility services such as electricity, heating or cable TV. 

#3 Other fraud

They may also try to get a job using the person’s Social Security Number. They may also give legitimate users’ information to police during an arrest and if they do not turn up for their court date, a warrant for arrest is issued in the legitimate user’s name. 

#4 Bank/Finance Fraud

You should also note that they may create counterfeit cheques using a victim’s name or account number. Also, they may open a bank account in the victim’s name and issue the cheques. In addition, they may clone an ATM or credit card and make electronic withdrawals in the victim’s name. They may also take a loan in the victim’s name.

#4 Government documents Fraud

It is possible that they get a driving licence or official ID Card issued on a legitimate user’s name but with their photo. They may also use the victim’s name and Social Security Name to get government benefits. Also, they may file a fraudulent tax return using legitimate user information.

Action Point
PS: If you would like to have an online course on any of the courses that you found on this blog, I will be glad to do that on individual and corporate level, I will be very glad to do that I have trained several individuals and groups and they are doing well in their various fields of endeavour. Some of those that I have trained includes staffs of Dangote Refinery, FCMB, Zenith Bank, New Horizons Nigeria among others. Please come on Whatsapp and let’s talk about your training. You can reach me on Whatsapp HERE. Please note that I will be using Microsoft Team to facilitate the training. 

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.

 

Fact Check Policy

CRMNIGERIA is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.

 

     
Fact Check Policy
truehost
telegram
CRMNuggets Whatsapp Channel
About Adeniyi Salau 1500 Articles
Adeniyi Salau is a highly dedicated and committed Blogger of repute. He likes sharing his IT knowledge with others. My desire is to impact as many lives as possible with my IT skills. You can download my mobile APP. Download the ICTLOAD APP on Google Playstore. Thanks.

Be the first to comment

Leave a Reply

Your email address will not be published.


*