Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Identification and Verification

Handbook of Research on Threat Detection and Countermeasures in Network Security
Techniques used to identify and verify individuals, an example of the tools and techniques used for identification and verification is biometric features as photograph and fingerprint.
Published in Chapter:
Cyber Crimes: Types, Sizes, Defence Mechanism, and Risk Mitigation
Hasan L. Al-Saedy (British Institute of Technology and E-Commerce, UK)
DOI: 10.4018/978-1-4666-6583-5.ch009
Abstract
The financial cost of cyber crime now has an annual cost estimated in the UK in eleven figures. In this chapter an ethic based definition of cyber crime is introduced and cyber crimes are classified. The impact of each class of cyber crime on society, individual, government and international security is highlighted. The cost of cyber crime is evaluated and a technique to prevent and mitigate the effect of these crimes on individual, government and international security and world peace is indicated. The forensic techniques and tools used in cyber crime evidence gathering and prosecuting procedure is also indicated. Finally, recommendations and suggestion are given to mitigate the impact of cyber crime on individuals, societies, world finance and international security.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR