From the course: Threat Modeling: Repudiation in Depth
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Identity theft and repudiation
From the course: Threat Modeling: Repudiation in Depth
Identity theft and repudiation
- [Instructor] The phrase identity theft is used in many ways. And the mechanisms can be pretty country-specific, which is a challenge for a global course. Generally, there's a couple of phases to identity theft. They are first, an initial crime of impersonation, second, repudiation of the charges or debts that the criminal has accumulated, and potentially third, an ongoing process of trying to clear up one's good name against credit agencies. If the impersonation starts with a fraudster getting key information like a social security number, then that cycle can repeat over and over, to the great frustration of the victim. The deepest systemic problem is shifting responsibility to the victim. They don't design the authentication process. They don't issue the driver's license or credit card. But they have to fight a bureaucracy that treats all repudiation as false. But it's there that the label of identity theft makes…