攻击者身兼数职,防止“身份盗窃”

G. Bindra, D. Shrivastava, R. Seth
{"title":"攻击者身兼数职,防止“身份盗窃”","authors":"G. Bindra, D. Shrivastava, R. Seth","doi":"10.1109/ICAICT.2012.6398499","DOIUrl":null,"url":null,"abstract":"An Identity Is Stolen Every 3 Seconds!! Spoofing is a huge issue for most Internet users - in fact, Identity Theft victimized 10.1 Million Americans last year. In this modern digital world, it is very simple to fool the system and pretend to be anyone. With the identity theft getting simpler day-by-day, make sure you are not being digitally spoofed. These days, it doesn't require a computer genius to intrude your privacy or impersonate the victim. And despite various laws, individuals and businesses are still feeling the negative effects of spam alike. The attacker could use your email to send emails to your contacts/anyone or use your caller ID number to call and eventually talk to people. This paper is an attempt to make the readers aware of the various types of spoofing that exists and also how not to fall in prey to them. It is an examination of the various spoofing techniques used by the attackers and their motives. This work intends to increase the awareness and understanding of the Identity Thefts that are and related frauds throughout the world. A few control measures at the users' level are also suggested. This conceptual paper is definitely expected to contribute to future research on similar and related topics as spin off from this study.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"With attackers wearing many hats, prevent your “Identity Theft”\",\"authors\":\"G. Bindra, D. Shrivastava, R. Seth\",\"doi\":\"10.1109/ICAICT.2012.6398499\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An Identity Is Stolen Every 3 Seconds!! Spoofing is a huge issue for most Internet users - in fact, Identity Theft victimized 10.1 Million Americans last year. In this modern digital world, it is very simple to fool the system and pretend to be anyone. With the identity theft getting simpler day-by-day, make sure you are not being digitally spoofed. These days, it doesn't require a computer genius to intrude your privacy or impersonate the victim. And despite various laws, individuals and businesses are still feeling the negative effects of spam alike. The attacker could use your email to send emails to your contacts/anyone or use your caller ID number to call and eventually talk to people. This paper is an attempt to make the readers aware of the various types of spoofing that exists and also how not to fall in prey to them. It is an examination of the various spoofing techniques used by the attackers and their motives. This work intends to increase the awareness and understanding of the Identity Thefts that are and related frauds throughout the world. A few control measures at the users' level are also suggested. This conceptual paper is definitely expected to contribute to future research on similar and related topics as spin off from this study.\",\"PeriodicalId\":221511,\"journal\":{\"name\":\"2012 6th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 6th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2012.6398499\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2012.6398499","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

每3秒就有一个身份被盗!!对大多数互联网用户来说,欺骗是一个大问题——事实上,去年有1010万美国人因身份盗窃而受害。在这个现代数字世界里,愚弄系统并假装成任何人都是非常简单的。随着身份盗窃变得越来越简单,确保你没有被数字欺骗。如今,它不需要一个计算机天才来侵犯你的隐私或冒充受害者。尽管有各种各样的法律,个人和企业仍然感受到垃圾邮件的负面影响。攻击者可以使用你的电子邮件发送电子邮件给你的联系人/任何人,或者使用你的来电显示号码打电话并最终与人交谈。本文试图让读者了解存在的各种类型的欺骗,以及如何不落入他们的猎物。它是对攻击者使用的各种欺骗技术及其动机的检查。这项工作旨在提高对身份盗窃和相关欺诈在世界各地的认识和理解。在用户层面提出了一些控制措施。这篇概念性论文肯定会对未来类似和相关主题的研究做出贡献,因为它是从本研究中衍生出来的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
With attackers wearing many hats, prevent your “Identity Theft”
An Identity Is Stolen Every 3 Seconds!! Spoofing is a huge issue for most Internet users - in fact, Identity Theft victimized 10.1 Million Americans last year. In this modern digital world, it is very simple to fool the system and pretend to be anyone. With the identity theft getting simpler day-by-day, make sure you are not being digitally spoofed. These days, it doesn't require a computer genius to intrude your privacy or impersonate the victim. And despite various laws, individuals and businesses are still feeling the negative effects of spam alike. The attacker could use your email to send emails to your contacts/anyone or use your caller ID number to call and eventually talk to people. This paper is an attempt to make the readers aware of the various types of spoofing that exists and also how not to fall in prey to them. It is an examination of the various spoofing techniques used by the attackers and their motives. This work intends to increase the awareness and understanding of the Identity Thefts that are and related frauds throughout the world. A few control measures at the users' level are also suggested. This conceptual paper is definitely expected to contribute to future research on similar and related topics as spin off from this study.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信