2017 has seen some of the most considerable changes and fraud threats in the field of digital identity. With Equifax Data breach affecting millions of consumer data, it is imperative to understand the issues arising from digital identity theft.
The presentation probes deep into the basics of digital identity and its characteristics. A significant emphasis is laid on the drivers of digital identity theft and guidelines to not fall victim to it.
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
Digital Identity Theft Prevention Guide
1. Prepared by – Sumit Kumar
Approved by – Ganesh Viswanathan
Document Released – 9-Nov-2017
Digital Identity – Threats and
Prevention
v 1.0
2. www.Quatrro.com
Agenda
Background : Digital Identity Theft in News
Identity : Definition
What is Digital Identity
Digital Identity Theft – Drivers
Digital Identity Theft – Ramifications
Digital Identity Protection – Guidelines
2Quatrro Confidential
3. www.Quatrro.com
Background : Digital Identity Theft in News
Equifax said its system struck had been by a cybersecurity incident that
may have affected about 143 million US consumers.
As per Norton Cyber Security Insights Report 2016, 49% of India’s online
population, or more than 115 million Indians are affected by cybercrime
at some point in time.
3Quatrro Confidential
4. www.Quatrro.com
Identity : Definition
We are unique, irreplaceable individuals, right?
iden·ti·ty “the condition of being the same with something described or
asserted.” (Merriam-Webster)
Identity is how one is described either by self-assertions or by assertions
of another.
Real-world example: buying books
4Quatrro Confidential
5. www.Quatrro.com
What is Digital Identity (DI)
Digital Identity - Digital identity is a set of characteristics asserted “by
one digital subject about itself or by another digital subject, in a digital
realm.” (Microsoft)
How well can we identify someone in real life?
Identification is never perfect. Authentication: three factors
• Something you are
• Something you have
• Something you know
5Quattro Confidential
6. www.Quatrro.com
Digital Identity - Characteristics
Digital Identity is comprised of characteristics, or data attributes, such as
the following:
• Username and password
• Aadhaar Number
• Name, Phone number, Date of Birth, Email Address
• Social Security Number
• Medical history, blood group
• Purchasing history or behavior
• Online search activities, like electronic transactions
• Social media profiles
• Bank Transactions
• IP Address of the device
6Quatrro Confidential
7. www.Quatrro.com
Digital Identity Theft - Drivers
In today’s world, its lot more easier to extract, collate
information about any individual or organization and build a
profile. This is due to various sources like :
• Rampant data leakages / theft by various threat vectors like hackers, poor
implementation of security in application, database, not enough security measures
taken to protect website, non-compliant with the standard laws, regulations.
• Huge amount of personal information available on Social Media
• Bulk SMS service providers
• Cookies captures internet / website usage behavior
• Shopping websites which asks you to mark favorites
• Data Analytics is now getting utilized in medical / pharma industry. A parent of new
born baby starts receiving calls from kid schools to register for guaranteed seat for pre-
school admissions.
7Quatrro Confidential
8. www.Quatrro.com
Digital Identity Theft - Ramifications
Impersonation , Pretexting – unauthorized usage of ones’ identity by
other for financial or other gains.
Data Fudging – Health insurance, buying restricted medicines misusing
ones’ prescription.
Money Laundering – unlawful usage of ID proofs like passport for foreign
exchange transactions
Compromising income tax declarations
8Quatrro Confidential
9. www.Quatrro.com
Digital Identity Protection - Guidelines
Following guidelines can be our savior :
• Do not give away your mobile numbers at your disposal.
• All photocopies of all the documents that are submitted need to be stated with purpose
and countersigned by the individual with the date. The person can also strike the
document by pen to avoid misuse.
• Browse in Incognito / In-Private mode
• Google search without logging in
• Look for Opt-out options in your mobile devices, advertising emails, or while taking new
mobile connections.
• If need be to store important files in cloud storage / email, then password protect all
your files.
• Restrict your social media footprints by restricting who can view , comment on post ,
pictures in your profile.
• Do not click on any email, attachments from unknown sender.
• Do not download from websites having pirated software, music, videos, documents.
9Quatrro Confidential