Skip to Content
How Personal & Internet Security Work
book

How Personal & Internet Security Work

by Preston Gralla
May 2006
Beginner
288 pages
2h 32m
English
Que
Content preview from How Personal & Internet Security Work

Chapter 18. How Identity Theft Works

How Identity Theft Works

One of the most well-publicized threats to personal security in recent years has been identity theft, in which someone’s private financial information is stolen and then used illegally.

This information can be used in a variety of ways. In the simplest way, someone uses the stolen credit card or bank account. However, the information can also be used to open bank accounts, get new credit cards, and take out bank loans in the victim’s name—and the criminal gets off scot-free, while the victim may have to spend years clearing his name.

Identity theft can also be used by terrorists or illegal aliens who want to establish ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses

Absolute Beginner’s Guide To: Security, Spam, Spyware & Viruses

Andy Walker
Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi

Publisher Resources

ISBN: 0789735539Purchase book