Identity Theft |
In accessing an email account or online resource sharing, each user has a unique identity to do it. When this unique identity or ID misuse by others it’s known as identity theft or identity disguise. Identification security risks as a potential undesirable outcome of a breach of information security by an information security threat. All risks represent unauthorized acts, and there are four types: disclosure and theft, use, destruction and denial of service, and modification. These are the four activities is mainly done by an identity theft in online which are discussed below:
- Unauthorized Disclosure and Theft: When the database and software library are made available to persons not entitled to have access, the result can be the loss of information or money. For instance, industrial spies can give valuable competitive information, and computer criminals can embezzle the firm’s fund.
- Unauthorized Use: Unauthorized use occurs when persons who are not ordinarily entitled to use the firm’s resource are able to do so. Typical of this type of computer criminal is the hacker who views a firm’s information security as a challenge to be overcome. A hacker, for example, can break into a firm’s computer network, gain access to the telephone system, and make unauthorized long-distance call.
- Unauthorized Destruction and Denial of Service: Individuals can damage or destroy the hardware or software, causing a shutdown in the firm’s computer operations. It is not even necessary for computer criminals be on the premises. They can log onto the firm’s computer network from a remote terminal and cause such physical destruction as damaged monitors, crashed disks, jammed printers, and disabled keyboards.
- Unauthorized Modification: Changes can be made to the firm’s data, information, and software. Some changes go unnoticed and cause the users of the system output to make the wrong decisions. An especially worrisome type of modification is that caused by malicious software, often grouped under the heading of viruses.
No comments:
Post a Comment