Susan was looking at her credit report and noticed that several new credit cards had been opened lately in her name. Susan has not opened any of the credit card accounts herself.
Which type of cybercrime has been perpetrated against Susan?
Comprehensive and Detailed Explanation From Exact Extract:
Identity theft occurs when an attacker unlawfully obtains and uses another person's personal information to open accounts, access credit, or commit fraud. The opening of credit cards without the victim's consent is a classic example.
SQL injection is a web application attack method that does not directly relate to this case.
Cyberstalking involves harassment via digital means and is unrelated.
Malware is malicious software and may be used to facilitate identity theft but is not the crime itself.
[Reference:According to the U.S. Federal Trade Commission (FTC) definitions and NIST Cybersecurity Framework, identity theft is defined as the unauthorized use of someone’s personal information for fraudulent purposes, perfectly matching Susan’s situation.]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit