Assess the Virtual or Internet-facilitated methods by which computer criminals steal an identity.

Assess the Virtual or Internet-facilitated methods by which computer criminals steal an identity. Elaborate with examples of your own.