2.3.1 Identity Theft Overview
It is difficult to defend against attacks that seem to be from legitimate users. Identity theft involves hijacking connections and hidden identities such that automatic detection mechanisms are fooled into believing the attackers traffic is safe. Different types of identity theft include access through a back door and spoofing. |