0% found this document useful (0 votes)
16 views8 pages

I.P Notes

Identity theft involves criminals stealing personal information like identities, banking credentials, and other data to commit fraud. There are several types of identity theft including financial identity theft where stolen identities are used for monetary gain, criminal identity theft where identities are used to avoid detection, and medical identity theft where identities are used to seek medical treatment or drugs. Ransomware is a type of cybercrime where attackers encrypt users' data and demand ransom payments to regain access, sometimes also threatening to publish stolen personal information. To reduce cybercrime risks, it is important to take regular backups, use antivirus software, avoid suspicious websites and downloads, and practice safe online behaviors like using strong unique passwords.

Uploaded by

neelamjk01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views8 pages

I.P Notes

Identity theft involves criminals stealing personal information like identities, banking credentials, and other data to commit fraud. There are several types of identity theft including financial identity theft where stolen identities are used for monetary gain, criminal identity theft where identities are used to avoid detection, and medical identity theft where identities are used to seek medical treatment or drugs. Ransomware is a type of cybercrime where attackers encrypt users' data and demand ransom payments to regain access, sometimes also threatening to publish stolen personal information. To reduce cybercrime risks, it is important to take regular backups, use antivirus software, avoid suspicious websites and downloads, and practice safe online behaviors like using strong unique passwords.

Uploaded by

neelamjk01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Identity Theft

Identity thieves increasingly use personal


information stolen from computers or
computer networks, to commit fraud by using
the data gained unlawfully. A user’s identifiable
personal data like demographic details, email
ID, banking credentials, passport, PAN, Aadhaar
number and various such personal data are
stolen and misused by the hacker on behalf of
the victim. This is one type of phishing attack
where the intention is largely for monetary
gain. There can be many ways in which the
criminal takes advantage of an individual’s
stolen identity. Given below are a few
examples:
• Financial identity theft: when the stolen
identity is
used for financial gain.
• Criminal identity theft: criminals use a victim’s
stolen identity to avoid detection of their
true identity.
• Medical identity theft: criminals can seek
medical
drugs or treatment using a stolen identity.

Ransomware
This is another kind of cyber crime where the
attacker gains access to the computer and
blocks the user from accessing, usually by
encrypting the data. The attacker blackmails
the victim to pay for getting access to the data,
or sometimes threatens to publish personal and
sensitive information or photographs unless a
ransom is paid.
Ransomware can get downloaded when the
users visit any malicious or unsecure websites
or download software from doubtful
repositories. Some ransomware are sent as
email attachments in spam mails. It can also
reach our system when we click on a malicious
advertisement on the Internet.

Following points can be considered as safety


measures to reduce the risk of cyber crime:
• Take regular backup of important data.
• Use an antivirus software and keep it updated
always.
• Avoid installing pirated software. Always
download software from known and secure
(HTTPS) sites.
• Always update the system software which
include the Internet browser and other
application software
• Do not visit or download anything from
untrusted websites.
• Usually the browser alerts users about
doubtful websites whose security certificate
could not be verified; avoid visiting such sites.
• Use strong password for web login, and
change it periodically. Do not use same
password for all the websites. Use different
combinations of alphanumeric characters
including special characters. Ignore common
words or names in password.
• While using someone else’s computer, don’t
allow browser to save password or auto fill
data, and try to browse in your private browser
window.
• For an unknown site, do not agree to use
cookies when asked for through a Yes/No
option.
• Perform online transaction like shopping,
ticketing, and other such services only through
well-known and secure sites.
• Always secure wireless network at home with
strong password and regularly change it.
Networking

You might also like