Identity Theft Case Study
Autor: Tan Peiyee • September 16, 2016 • Case Study • 429 Words (2 Pages) • 844 Views
Identity theft begins when someone takes your personally identifiable information such as your name, Social Security Number, date of birth, your mother’s maiden name, and your address to use it, without your knowledge or permission, for their personal financial gain. Someone fraudulently used your personal identifying information to their own purposes, that is identity theft, whether it is to obtain credit, get a loan, open a bank or credit card account or obtain an I.D. card. You can even find yourself accused of a crime you did not commit because someone used your personal identifying information to perpetrate the crime in your name.
The common method crooks use to steal your identity is Shoulder Surfing. This attack may occur anytime you use a password or a device that stores PIN numbers, such as at an ATM. The identity thief attempts to get close enough to you so that when you enter password information, such as a PIN number, the thief records the password. Although this can typically occurs in a public setting, where the victim is and their credentials are in plain sight, it may also occur through a video camera setup by the criminal. To prevent this from happening, you should be aware of your surroundings when you are accessing any accounts that require you to enter a password or PIN in public. Another method you can use is to try to use cash for your transactions, or use a pre-paid credit card. Do not write down your passwords where someone can find them, such as your wallet or purse. Also, take advantage of credit reports, which will help you analyze whether anyone has stolen your identity to access your bank accounts.
Skimming is one of the common method use to steal information. This can happen anytime you use your credit or debit card. The theft occurs when the device which reads your credit card information from the magnetic strip on the back of the card records you’re the information the card’s code numbers to another electronic storage device. This enables the criminal to make a copy of your card to make unauthorized purchases. Skimming can occur through a number of different ways, whether it is a recording device set up on an ATM machine or a salesman who secretly swipes your card onto his personal digital card reader. To prevent skimming, make it a habit to periodically check your credit reports. This helps you discover if anyone made unauthorized purchases or has stolen your identity to access your bank accounts or open other lines of credit in your name.
...