• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2020, Volume: 13, Issue: 25, Pages: 2529-2536

Original Article

Analysis of cyber attacks and security intelligence: Identity theft

Received Date:11 May 2020, Accepted Date:10 June 2020, Published Date:17 July 2020

Abstract

Objectives: To analyse the cybersecurity risks and their impact on the organizations. Researcher attempts to list down the issues and mitigation of Identity theft as a risk. Methods: This study develops a theoretical framework for future researchers and organizations for awareness and impact of Identity theft in area of cybercrime. The study has dogged various mechanisms by which watermarking can be applied to overcome to prevent identity theft attack. Findings: Researcher has emphasized the need for security solution and listed the steps to achieve security. An integrated view of identity theft and watermarking is formulated and proposed. The right balance between the application and techniques of watermarking opted will protect the user against the various types of identity theft attacks. Applications: Identity Theft has gained momentum in online space. The study highlighted various issues, consequences and economy of identity theft attacks with securing networks for unauthorized access. Watermarking plays an important role in authentication and authorization of data and proved a viable solution to mitigate identity theft attack.

Keywords: Cyberspace; identity theft; Security intelligence; watermarking

References

  1. Braun SK. Forensic evidence of copyright infringement by digital audio sampling analysis - identification - marking. International Journal of Cyber-Security and Digital Forensics (IJCSDF). 2014;3(3):170–182. Available from: https://doi.org/http://dx.doi.org/10.17781/P001337
  2. Anderson KB, Durbin E, Salinger MA. Identity Theft. Journal of Economic Perspectives. 2008;22(2):171–192. Available from: https://dx.doi.org/10.1257/jep.22.2.171
  3. Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS. Cyber threats to health information systems: A systematic review. Technology and Health Care. 2016;24(1):1–9. Available from: https://dx.doi.org/10.3233/thc-151102
  4. Mercuri RT. Scoping identity theft. Communications of the ACM. 2006;49(5):17. Available from: https://dx.doi.org/10.1145/1125944.1125961
  5. Nagunwa T, . Behind Identity Theft and Fraud in Cyberspace: The Current Landscape of Phishing Vectors. International Journal of Cyber-Security and Digital Forensics. 2014;3(1):72–83. Available from: https://dx.doi.org/10.17781/p001287
  6. Romanosky S, Telang R, Acquisti A. Do data breach disclosure laws reduce identity theft? Journal of Policy Analysis and Management. 2011;30(2):256–286. Available from: https://dx.doi.org/10.1002/pam.20567
  7. Hille P, Walsh G, Cleveland M. Consumer Fear of Online Identity Theft: Scale Development and Validation. Journal of Interactive Marketing. 2015;30:1–19. Available from: https://dx.doi.org/10.1016/j.intmar.2014.10.001
  8. Weijer SGAvd, Leukfeldt R, Bernasco W. Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking. European Journal of Criminology. 2019;16(4):486–508. Available from: https://dx.doi.org/10.1177/1477370818773610
  9. Ricks A, Irvin-Erickson Y. 2019. Available from: http://hdl.handle.net/20.500.11990/1196
  10. Zaeem RN, Manoharan M, Yang Y, Barber KS. Modeling and analysis of identity threat behaviors through text mining of identity theft stories. Computers & Security. 2017;65:50–63. Available from: https://dx.doi.org/10.1016/j.cose.2016.11.002
  11. Sproule S, Archer N. Measuring identity theft and identity fraud. International Journal of Business Governance and Ethics. 2010;5(1/2):51. Available from: https://dx.doi.org/10.1504/ijbge.2010.029555
  12. Manap NA, Rahim AA, Taji H. Cyberspace Identity Theft: An Overview. Mediterranean Journal of Social Sciences. 2015. Available from: https://dx.doi.org/10.5901/mjss.2015.v6n4s3p290

Copyright

© 2020 Virmani,Kaushik, , Mathur, Saxena.This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.