CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)

Slides:



Advertisements
Similar presentations
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Personal Identity Theft in the Web-based Business World Presenter – Rick Weatherspoon Xtreme Computing, LLC.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Recommendations on the future of online GyroScope & Databse implementation.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
DO YOU LOVE FISHING “PHISHING” ? OR Global Wealth Management Group MORGAN STANLEY & SMITH BARNEY A term used to describe fraudulent attempts to steal.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Personal Identity Theft in the Web-based Business World Presenter – Rick Weatherspoon Xtreme Computing, LLC.
Threats To A Computer Network
Phishing – Read Behind The Lines Veljko Pejović
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
EFFECTS & USES OF ICT.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Drive-by pharming is an interesting type of networking attack that combines multiple networking vulnerabilities and average user laziness to create an.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
Topic 5: Basic Security.
Computer crimes.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Jeff loses his identity! Lesson 5: Identity Theft.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Identity Theft It’s a crime!
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
I S P S loss Prevention.
Phishing is a form of social engineering that attempts to steal sensitive information.
Information Security Session October 24, 2005
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Security in mobile technologies
Protecting Yourself from Fraud including Identity Theft
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

CNP Fraud

Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept) Mail redirect request Replacement/Lost Card claim Hacking, data breach Identity theft affected more than 9.93 million people during Average costs per victim was $1,200, 175 hours needed to rectify the problem. ID Theft, Application Fraud & Account Takeover

Typical Online Identity Theft Fraud Cycle

Phishing Method used to acquire sensitive data (usernames, passwords and credit card details) by masquerading as a trustworthy entity in an electronic communication. Communications which purport to be from popular social web sites, auction sites, banks, online payment processors Person thinks the is genuine and clicks on link provided Normally message requests the user to authenticate or validate their banking data Redirected to website which mirrors authentication site Online

Site Cloning/Phishing Example of a Phishing Site Posing as the Official HSBC Website

Pharming Method used to redirect a website's traffic to another, fake website. Conducted by : Changing the “hosts file” on victim computer Exploitation of vulnerable DNS server software (Poisoned Server) Circumvents name lookup with its own local name to IP address mapping. A legitimate request for a sensitive website can direct the user to a fraudulent copy Eg Bank Name Online

Pharming Online

Spy-phishing combines phishing and spyware Vishing combines social engineering and telephone, mostly using Voice over IP (VoIP) to gain access to private personal and financial information Online Scams

Compromising systems and networks where CHD is stored, processed and/or transmitted Not necessarily difficult High rewards – low risk Hacking & Data Compromise

Collaborative networks of individuals with specific skills and/or access to information. They interact on Forums & Blogs where they trade: Track Data, Authentication Data, CV2, exp.date, etc… Account Numbers Personal Information Counterfeited Notes Credit Card Number Generators Software & Hardware (readers/writers, skimming equipment…) Underground Market

Identity Theft (Third Party): Large purchases; bust-0ut activity (maxing out of cards in short time periods) Social Engineering (Third Party): Attempting to find information by asking questions, or to change information through social interaction. Hijack orders by changing shipping information or changing billing data on an existing credit card account. Convenience (Third Party): Testing cards to see if they work by making small purchases at safe locations like gas stations, electronic download services, or fee-for-service locations. Identifying Fraudulent Activities

Internal Fraud: Organized fraudulent activity by person or persons working in a company, sharing information on how to perpetrate fraud on conducting actual theft. Affiliate Fraud: The creation or facilitation of bad transaction in or to receive commission payments. Friendly Fraud (First Party): Transactions where fraud is claimed but the consumer is actually the legitimate account holder. Identifying Fraudulent Activities

Merchant Collusion Merchant Collusion particularly when there is a recession, times are hard etc. can be a problem. Very much seen in the past in the physical world But now happening in the internet world, where it can be carried out be triangulation where a real site links back to a fraudster site as the transaction occurs, allowing card data to be trapped and then cloned. July 16Caribbean Electronic Payments LLC13

High Risk Merchants High Risk merchants like gambling sites, pornography providers etc. have always been a target for fraudsters. If a persons card is compromised on this type of site there is reluctance to complain. This is now moving into other types of high risk areas, like prescription drugs, gaming sites and even sites like low cost airlines. July 16Caribbean Electronic Payments LLC14