Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions

Author(s):  
HongQian Karen Lu ◽  
Asad Ali
2020 ◽  
Vol 7 (1) ◽  
pp. 1832825
Author(s):  
Abdul Bashiru Jibril ◽  
Michael Adu Kwarteng ◽  
Raphael Kwaku Botchway ◽  
Jürgen Bode ◽  
Miloslava Chovancova

Author(s):  
R. Dhanalakshmi ◽  
C. Prabhu ◽  
C. Chellapan

Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web site spoofing techniques to trick a user into revealing confidential information. It steals the user’s personal identity data and financial credentials. Most of the phishing attacks emerge as spoofed E-Mails appearing as legitimate ones which makes the users to trust and divulge into them by clicking the link provided in the E-Mail. To detect a Phishing website, human experts compare the claimed identity of a website with features in the website. For example, human experts often compare the domain name in the URL against the claimed identity. Most legitimate websites have domain names that match their identities, while Phishing websites usually have less relevance between their domain names and their claimed (fake) identities. In addition to blacklists, white lists, heuristics, and classifications used in the state-of-the-art systems, we propose to consider websites’ identity claims. To enable secure transactions ,Password hashing has been done with MD5 hashing algorithms that strengthens web password authentication. It is also shown that getting original password from hashed form is not an easy task due to addition of salt value. If the user is valid, get a session key via mobile, through which further access can be done


2015 ◽  
Author(s):  
Patrick Hille ◽  
Gianfranco Walsh ◽  
Mark Cleveland

Author(s):  
Annamaria Szakonyi ◽  
Brian Leonard ◽  
Maurice Dawson

The explosion of the internet has given rise to cybercrimes, online identity theft, and fraud. With the internet, these crimes are able to occur anywhere in the world and limitless to whatever selected target. The anonymity of the internet allows criminal activity to flourish, and the number of unsuspecting victims is growing. From script kiddies to nation-states, this new method of internet-enabled crimes has strained governments. This chapter provides insight into how crimes related to online identity theft and fraud are carried out. Examined within this chapter are the evolution of cybercrime, history of identity theft, applications for internet anonymity, and discussion on effects caused by romance scams and data breaches. Finally, recommendations are provided on what organizations and individuals can do to protect themselves against these vicious crimes.


Sign in / Sign up

Export Citation Format

Share Document