IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Identity Stealing Attacks

Identity Stealing Attacks
View Sample PDF
Author(s): Lech J. Janczewski (University of Auckland, New Zealand)and Andrew M. Colarik (University of Auckland, New Zealand)
Copyright: 2005
Pages: 10
Source title: Managerial Guide for Handling Cyber-Terrorism and Information Warfare
Source Author(s)/Editor(s): Lech Janczewski (University of Auckland, New Zealand)and Andrew Colarik (AndrewColarik.com, USA)
DOI: 10.4018/978-1-59140-583-2.ch009

Purchase

View Identity Stealing Attacks on the publisher's website for pricing and purchasing information.

Abstract

In recent years, several feature films have been produced based on the concept of stealing an identity. As a result of deliberate or accidental changes to personal records, a person can cease to exist on paper, or someone else can acquire a person’s identity. These film directors’ concepts are not products of their rich imaginations, but are a reflection of reality. Quite often, we read about such accidents happening. Stealing an identity is a favorite step in the preparation of terrorist and cyber-terrorist attacks, and all of us, IT managers in particular, should be vigilant about such possibilities.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom