scispace - formally typeset
Search or ask a question
Topic

Identity theft

About: Identity theft is a research topic. Over the lifetime, 2284 publications have been published within this topic receiving 31700 citations.


Papers
More filters
Proceedings ArticleDOI
01 Aug 2017
TL;DR: The solution of using image steganography application to hide important data or documents under an image before uploading them to the cloud storage will avoid the risks of attracting hackers or outsiders to discover the importance of the data hidden.
Abstract: Identity theft is a serious crime where the criminals steal user's identity to access their bank accounts, personal hospital records and etc. The usage of cloud storage has allowed the hackers to attack the victims easily by accessing the victim's data stored in a remote location. Cloud storage may be convenient to allow users to store any data files and access those files from different devices and in different locations around the world. However, it can still pose security threats as with a lot of important data stored in one location is very appealing to cunning hackers. The solution of using image steganography application to hide important data or documents under an image before uploading them to the cloud storage will avoid the risks of attracting hackers or outsiders to discover the importance of the data hidden. The application uses one of simplest image steganography approach 'LSB algorithm' to achieve best quality of encoded image/stego-image. Besides, the application can be deployed via offline or online depending whether they want to upload the encoded image/stego-image to the cloud storage.

3 citations

Journal ArticleDOI
TL;DR: Memory forensics is also known as memory analysis, which deals with the estimation of the changeable data in a system memory repository as mentioned in this paper. In order to investigate and detect the attacks, the professionals perform the memory forensics to interpret the nature of the malware i.e. do not easily traceable on hard drive data.

3 citations

Book
16 May 2013
TL;DR: The paper highlights the increase of cyber related attacks in the past ten years due to lack of transatlantic international corporation between participating countries, coherent information security policies, data aggregation and sound international laws to facilitate prosecution of perpetrators.
Abstract: The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce, education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks, which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the past ten years due to lack of transatlantic international corporation between participating countries, coherent information security policies, data aggregation and sound international laws to facilitate prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime elements taking advantage of the Internet as a medium of operations. This paper presents conclusive solution that users, organizations and consumers can enact to protect themselves from the threat of cyber attacks culminating into identity theft, financial loss or both.

3 citations

Journal ArticleDOI
TL;DR: In this article, the authors describe a typical cyber-attack as one or more of the following: stolen personal information, loss of privacy, identity theft, and/or monetary loss.
Abstract: If one asks any quality professional to describe a typical cyberattack, the answer will probably include one or more of the following: stolen personal information, loss of privacy, identity theft, ...

3 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
76% related
Social network
42.9K papers, 1.5M citations
74% related
Service provider
55.1K papers, 894.3K citations
74% related
Authentication
74.7K papers, 867.1K citations
73% related
Information technology
53.9K papers, 894.1K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022165
202178
2020107
2019108
2018112