0% found this document useful (0 votes)
11 views2 pages

Mazhar Mohammed

Uploaded by

Vivek Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views2 pages

Mazhar Mohammed

Uploaded by

Vivek Chauhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1

Response

Hello Mazhar Mohammed,

I have read your discussion post, and from that, I learned about identity theft. Identity

theft, often known as identity fraud, is an illegal act performed by a large number of people.

Identity theft occurs when somebody acquires your data and uses it to engage in crime. This theft

is done in a variety of methods, including acquiring private data such as another individual's

financial data, in order to perform activities (Haghighatkhah & Mosharraf, 2023). It can arise in

several forms, including illegal identity theft, senior identity theft, tax identity theft, social

security identity theft, driver's license identity theft, medical identity theft, synthetic identity

theft, and financial identity theft. Targeted users are often charged with responsibility or face

damage when the thief uses false documents. It is critical for users to be aware of potential

extortions and to be careful when using stolen data. Identity theft techniques contain pretext

calling, phishing, internet connection, mail theft, dump diving, and CVV code requests. These

approaches include pretending to be staff, extracting transactional information from public post

boxes, downloading spyware, connecting to public systems, and requesting card confirmation

morals to enhance transaction safety (Rafi et al., 2023).


2

References

Haghighatkhah, F. H., & Mosharraf, M. (2023). Exploring Identity Theft: Motives, Techniques,

and Consequent on Different Age Groups. Journal of Innovation in Computer Science

and Engineering, 1(1). http://dx.doi.org/10.48308/jicse.2023.231077.1017

Rafi, A., None Reihaini Fikria Bunga Oktaviani, Farhan, N., Jan, D., None Nazwa Yaqzhania

Imtiyaz, & None DedenWitarsyah. (2023). Understanding The Phenomenon and Risks of

Identity Theft and Fraud on Social Media. Asia Pacific Journal of Information System

and Digital Transformation, 1(01), 23–32. https://doi.org/10.61973/apjisdt.v101.3

You might also like