Online ID theft techniques, investigation and response
暂无分享,去创建一个
ID theft, especially in its online form, is currently one of the most prevalent types of computer crime. The limited end-user awareness as well as the retention and business processing of large amounts of personal data in a manner that does not meet security and regulatory requirements provide plenty of opportunities to fraudsters. A number of organisations have produced guidelines of good practice targeted to individuals and organisations; however the matter is still on the rise. In this paper, we review computer-based techniques employed by fraudsters in order to steal IDs and refer to published guidelines and the documented good practice against those. We discuss the issues related to the investigation of such incidents and provide the grounds for the development of a framework to assist in their forensic examination.
[1] Paula Thomas,et al. ID theft: Fraudster techniques for personal data collection, the related digital evidence and investigation issues , 2006 .
[2] David Porter. Identity fraud: the stealth threat to UK plc , 2004 .
[3] Russell Dean Vines,et al. Phishing: Cutting the Identity Theft Line , 2005 .
[4] Eoghan Casey. Determining Intent — Opportunistic vs Targeted Attacks , 2003 .
[5] Carl J. Pacini,et al. What your firm should know about identity theft , 2004 .