ID theft schemes take many forms and involves many types of exploits, often within the same scheme. First, we’ll take a brief look at some of the ID theft trends and schemes, and separate facts from some of the myths and exaggerations. Then, we explore a prominent consumer ID theft scheme. We unravel how this scheme was hatched and how it was operationalized, and we delve into the scheme’s human and technical dimensions – all from the insider perspective of the perpetrator.
- What's real and what's hype? Exploring trends.
- A largescale ID theft scheme: human & technical dimensions
- Unraveling the scheme from an insider's perspective
About Firasat Khan
Dr. Firasat Khan serves as the Director of Academic Initiatives at Advance IT Minnesota, a Minnesota State Colleges and Universities (MnSCU) Center of Excellence in IT and Security. He helps develop new curriculum, conducts risk and security assessments and manages various technology projects. He has a bachelors in civil engineering, masters in MIS, doctorate in business administration, and has earned multiple industry certifications in information technology, security, and forensics. Firasat has coached cybersecurity teams and manages competitions for Minnesota. He has been a presenter at Secure360 and numerous ITS, eLearning, and management conferences in the US and Canada. Professionally, his past roles include directing an institute for computer security and forensics, directing an eLearning environment, and serving as the chief information officer for a large higher education institution. As an adjunct he teaches MIS, security, forensics, and business management.