PHISHING & IDENTITY THEFT: AN EXPOSITION OF POLITICAL, ECONOMIC, SOCIAL & TECHNOLOGICAL (PEST) ANALYSIS AS CHANGE AGENT FOR RECESSED ECONOMY IN NIGERIA

1Ogundoju B. M., 2Alaba O. B., 3Adekunle A. O. & 4Aroyehun A. A. 1,3,4Department of Computer Science, Adeyemi College of Education, Ondo, Nigeria 2Department of Computer and Information Science, Tai Solarin University of Education, Ijebu-Ode, Nigeria

 

Adeyemi College of Education, Ondo

Email Address:ogundojubm@gmail.com

Abstract: Abstract
The application of Internet technology has transformed virtually all areas of life. It may be difficult to list precisely what can be done with internet technology. There are numerous advantages in the application of Internet technology. However, some desperate users are applying Internet technology to launch attacks on other users with the motive of tricking them believe that they are communicating with trusted entities for the purpose of stealing private information, such as credit card numbers, social security numbers, password and PINs etc. This continuous attack on Internet users’ data is consistently increasing, phishing remains one of the main means of performing these attacks. Identity theft on the other hand is a means of identifying an individual or organization in order to commit a fraudulent activity. Phishing, although a simple attack but has become an economic menace for both individuals and organizations (even government) that are doing online business. IT industry and researchers have identified the immediate need for anti-phishing solutions and currently some techniques to identify and mitigate these attacks have been proposed. This paper presented phishing in detail (attack process and attack classification) and analyzed these attacks and identify that almost all of them make use of the advantage that many Internet users have insufficient awareness of the secure site identification techniques in browsers. The paper also analyzed four major factors – political, economic, social and technological (PEST) which reveals that social and technological factors are the major sources of identity theft, and in