Abstract
Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal information. Leakage of such information can facilitate large-scale identity theft. This paper determines how personal information leaks from online systems of national importance, discusses proof of concept software to demonstrate the seriousness of the problem, and suggests how to improve the situation.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kent, S.T., Millett, L.I. (eds.): Who Goes There? Authentication Through the Lens of Privacy. National Academies Press, Washington (2003)
Schneier, B.: Risks of third-party data. Communications of the ACM 48(5), 136 (2005)
Privacy Rights Clearinghouse: A chronology of data breaches (Last checked February 20, 2008), http://www.privacyrights.org/ar/ChronDataBreaches.htm
Symantec Inc.: Symantec internet security threat report xi (Last checked February 20, 2008), http://www.symantec.com/threatreport/
Wikipedia: National identification number (Last checked February 20, 2008), http://en.wikipedia.org/wiki/National_identification_number
Moen, V., Klingsheim, A.N., Simonsen, K.I.F., Hole, K.J.: Vulnerabilities in e-governments. International Journal of Electronic Security and Digital Forensics 1(1), 89–100 (2007)
Selmer, E.S.: Personnummerering i norge: Litt anvendt tallteori og psykologi. Nordisk Matematisk Tidsskrift 12, 36–44 (1964); (in Norwegian)
Morris, R., Thompson, K.: Password security: a case history. Communications of the ACM 22(11), 594–597 (1979)
Tor: Anonymity online (Last checked February 20, 2008), http://tor.eff.org
von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Communications of the ACM 47(2), 56–60 (2004)
Kent, S.T., Millett, L.I. (eds.): IDs—Not That Easy: Questions About Nationwide Identity Systems. National Academies Press, Washington (2002)
Klingsheim, A.N., Hole, K.J.: Personal information leakage: A study of online systems in norway. Technical Report 370, Department of Informatics, University of Bergen (2008)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Klingsheim, A.N., Hole, K.J. (2008). Identity Theft: Much Too Easy? A Study of Online Systems in Norway. In: Tsudik, G. (eds) Financial Cryptography and Data Security. FC 2008. Lecture Notes in Computer Science, vol 5143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85230-8_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-85230-8_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85229-2
Online ISBN: 978-3-540-85230-8
eBook Packages: Computer ScienceComputer Science (R0)