44.5k views
3 votes
Describe two high-tech forms of identity theft and two low-tech forms

1 Answer

2 votes

Final answer:

Phishing and hacking are two high-tech forms of identity theft, where scammers use fraudulent emails and gain unauthorized access to computer systems to steal personal information. Dumpster diving and shoulder surfing are two low-tech forms of identity theft, where thieves retrieve discarded documents or observe someone entering sensitive information.

Step-by-step explanation:

Two high-tech forms of identity theft include phishing and hacking.

Phishing is a form of identity theft where scammers send fraudulent emails or messages pretending to be from legitimate organizations in order to trick individuals into revealing their personal information, such as passwords or credit card numbers. For example, a person may receive an email claiming to be from their bank, asking them to click on a link and enter their login details, which the scammer then uses to gain access to their account.

Hacking is another high-tech form of identity theft, where cybercriminals gain unauthorized access to computer systems or networks to steal valuable information. This can include sensitive personal data, financial records, or login credentials. For instance, hackers may exploit vulnerabilities in a company's website to gain access to customer data.

Two low-tech forms of identity theft include dumpster diving and shoulder surfing.

Dumpster diving involves rummaging through someone's trash to find discarded documents or bills that contain personal information. For example, a person may throw away bank statements or credit card bills without shredding them, allowing an identity thief to retrieve this information and use it for fraudulent purposes.

Shoulder surfing is when someone looks over a person's shoulder while they are entering sensitive information, such as a PIN number or password. This can happen at an ATM, a computer terminal, or even while making a phone call. The identity thief can then use this information to gain unauthorized access to the victim's accounts or personal information.

User Aloong
by
8.3k points