Abstract

Objectives: To analyse the cybersecurity risks and their impact on the organizations. Researcher attempts to list down the issues and mitigation of Identity theft as a risk. Methods: This study develops a theoretical framework for future researchers and organizations for awareness and impact of Identity theft in area of cybercrime. The study has dogged various mechanisms by which watermarking can be applied to overcome to prevent identity theft attack. Findings: Researcher has emphasized the need for security solution and listed the steps to achieve security. An integrated view of identity theft and watermarking is formulated and proposed. The right balance between the application and techniques of watermarking opted will protect the user against the various types of identity theft attacks. Applications: Identity Theft has gained momentum in online space. The study highlighted various issues, consequences and economy of identity theft attacks with securing networks for unauthorized access. Watermarking plays an important role in authentication and authorization of data and proved a viable solution to mitigate identity theft attack. Keywords: Cyberspace; identity theft; Security intelligence; watermarking

Highlights

  • Internet and advanced technologies have an influence on modern society covering a large spectrum of businesses, academic institutions, governments, and information technology (IT) sector[1]

  • Cybersecurity is the extension or advanced version of the information technology (IT) security which is used to protect systems, applications, and data that are exposed to a variety of attacks via the internet, ranging from data theft to denial of service attacks [2]

  • The upcoming section highlights various techniques which are used by criminals to deploy identity theft attack

Read more

Summary

INTRODUCTION

Internet and advanced technologies have an influence on modern society covering a large spectrum of businesses, academic institutions, governments, and IT sector[1]. The latest technologies like viz. E-commerce, net banking, healthcare and personal data on cloud storage need high security as large number of users is active on this advanced technology. Cybersecurity is the extension or advanced version of the information technology (IT) security which is used to protect systems, applications, and data that are exposed to a variety of attacks via the internet, ranging from data theft to denial of service attacks [2]. There are growing threat at the advent of social networking usage through whatsapp, instagram, twitter, linkedin, Facebook where sharing of personal information is often misused and users become more vulnerable in the hands of hackers

Classification of Frauds
Classification of Identity Theft
Techniques to deploy Identity Theft
Digital watermarking
Watermarking techniques
Case Study
An Integrated view of Identity Theft and Watermarking
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call