From the course: Threat Modeling: Repudiation in Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Identity theft and repudiation

Identity theft and repudiation

From the course: Threat Modeling: Repudiation in Depth

Start my 1-month free trial

Identity theft and repudiation

- [Instructor] The phrase identity theft is used in many ways. And the mechanisms can be pretty country-specific, which is a challenge for a global course. Generally, there's a couple of phases to identity theft. They are first, an initial crime of impersonation, second, repudiation of the charges or debts that the criminal has accumulated, and potentially third, an ongoing process of trying to clear up one's good name against credit agencies. If the impersonation starts with a fraudster getting key information like a social security number, then that cycle can repeat over and over, to the great frustration of the victim. The deepest systemic problem is shifting responsibility to the victim. They don't design the authentication process. They don't issue the driver's license or credit card. But they have to fight a bureaucracy that treats all repudiation as false. But it's there that the label of identity theft makes…

Contents