Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book

Identity Assumption

Unlike identity theft, which is usually focused on perpetrating fraud, identity assumption is more commonly used to destroy someone's reputation.

Falsely posting comments in a public forum that specifically digresses from someone's known beliefs is identity assumption in its mildest form. Imagine someone's picture getting uploaded to the tens of thousands of pornography websites. Imagine having a pornographic website created in your own name along with compromising pictures of yourself. And by the way, those pictures can easily be created using image-editing programs such as Photoshop. This is the same software used by magazine and print editors to make teeth whiter, remove an inch or two from waistlines, and so on. A face from one photo can easily be placed on another or edited using commonly available software.

  • + Share This
  • 🔖 Save To Your Account