Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
26 Chapter 1 • Hacking Methodology
Theft of Identity
Another popular reason for hacking is for theft of identity. There is no dif-
ference whether the information is obtained by stealing mail through
the U.S. Postal Service or if the information is stolen over the Internet.
With theft of identity, an attacker would need to acquire certain pieces
of private information about their target victim. In addition to the vic-
tims’ name, this information could be any number of the following:
Address
Social security number
Credit card information
Date of birth
Driver’s license number
These critical pieces of information can help an attacker to assume
the victims’ ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312