Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia 10-12 September 2013.

Slides:



Advertisements
Similar presentations
Presentation by Ms Siboniselizulu Maseko, Analyst, Mergers and Acquisitions Department Presented to the 5 th Annual African Dialogue on Consumer Protection.
Advertisements

Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Management information systems
M-PAYMENT SYSTEM (e–WALLET ).
Breaking Trust On The Internet
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
Fair competition commission Mobile and Cyber Threat Issues Joshua Msoma Tanzania Fair Competition Commission Sixth Annual African Dialogue Conference Lilongwe,
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Electronic Transaction Security (E-Commerce)
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Presentation by Siphe-okuhle Fakudze, Research Analyst, Competition Policy and Research Department Presented to the 6 th Annual African Dialogue on Consumer.
Access · convergence · management security · performance Margins in Mobility – Ian Kilpatrick, Wick Hill.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
E-commerce E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. In this section: E-commerce.
Choosing an Internet Service Providers (ISP) A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Electronic Payment Systems University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2010 March 2010 ITSS 4201 Internet.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Securing Information Systems
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
Cyber Crimes.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
BTA Online system Financial portal for business customers.
Copyright © 2007 Pearson Education, Inc. Slide 6-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Banking Online Safely. What can you use online banking to do? Immediate access to real-time account balances Pay bills and make transfers anytime.
Mobile and Cyber Threat Issues Consumer Perspective on Uganda by Kimera Henry Richard, Chief Executive, CONSENT The Fifth Annual African Dialogue Consumer.
Fifth Annual African Consumer Protection Dialogue Conference Mobile and Cyber Threat Issues Competition and Fair Trading Commission, Malawi Livingstone,
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
IT security By Tilly Gerlack.
Google Wallet By: Amanda Tazbaz ITMG 10. How it works ● Download application on Android smartphone ● Set up payment information ● Shop in store ● Click.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
BTA Online system 2012 y. Financial portal for business customers.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
Payment Systems. Payment Revolution 1970: Electronic Funds Transfer between banking industries 1980: Electronic Data Interchange (EDI) for e- commerce.
By Kovtunenko Inna. Payment risks Protection measures Safety rules.
Chapter 4 E-commerce Security and Payment.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
The rising standards of EU Mobile Payments October 2015 Jeremy King, International Director.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Introduction We are India's leading directional media marketing company enabling SME discovery. Pioneers in discovery of platforms across B2B,B2C & C2C.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Mobile Money 1/37 Fiserv Mobile Money Staff Education © 2010 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. All trademarks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Payment gateway is the service to process credit card transactions for the online customers, these gateway transactions are offered by different banks.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
CASE STUDY: ELECTRONIC BANKING By: Sarah Baig, Laura Logan, Agyakwa Tenkorang.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
The Benefits of Using Virtual Merchant. EMV cards have been extremely popular in recent times and it’s one of the greatest technological advances in recent.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
E-commerce Pay-pal and other concepts PayPal: The Money’s in the Class Discussion Why was it difficult for individuals to accept credit card payments.
E-Commerce Payment System
Chapter 4 E-commerce Security and Payment.
Digital $$ Quiz Test your knowledge.
Internet safety By DAGAS YACMAS team.
Security in mobile technologies
Presentation transcript:

Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia September 2013

ZIMBABWE COMPETITION AND TARIFF COMMISSION Presented by Tausha Isaac The views and opinions expressed herein are those of the author and do not necessarily reflect the views or opinions of the Zimbabwe Competition and Tariff Commission or any government agency of the Republic of Zimbabwe. 2

T HE Z IMBABWEAN M OBILE M ARKET 3 Zimbabwean’s mobile market has million subscribers as at March million are on mobile internet. 2.2 million currently use them to make mobile payments According to POTRAZ mobile payments subscription is exponentially growing such that in a very short space of time it would have covered the mainstream payment system. Zimbabwe’s internet charges are believed to be the most expensive in the region. Few mobile devices have antivirus protection The current mobile payment systems are believed to be secure for now on the part of the service provider. Security on the part of the consumer depends on how one keeps his or her pass word. the use of mobile payment is more safe and convenient to the consumer relative to credit card.

M OBILE P AYMENTS SMS Payments Is currently one of the most popular method used in Zimbabwe by the Banks and MNOs. It entails using mobile phones to pay for goods or services, or even for person-to-person payments. All the MNOs and Banks uses it is the most dominant in this platforms. WAP Payments Is the one that use the Wireless Application Protocol (WAP) facility on the Smart phone to connect to the internet and then using an online payment method such as PayPal, Google Wallet or Yahoo Wallet or simply entering your credit card details into the payment box on a company’s website. This is not a popular method of mobile payment in Zimbabwe. 4

P ROTECTION AND S ECURITY OF M OBILE P AYMENTS Mobile payments market is a very young market in Zimbabwe Consumer Bill Ensures the upholding of consumers’ rights Cyber Security Act Protection on online transactions Data Protection Protection of consumers’ personal data given on opening of credit accounts. Electronic Transaction Act Protect consumers’ private information i.e. PIN Account number, credit card number, 5

C ONSUMER B ODIES I NITIATIVES Embark on consumer awareness campaigns Lobby for consumer rights Address consumer complaints through referring cases of internet fraud to the relevant organisations like Interpol for investigations. 6

C YBER THREATS The mobile threat landscape is ever-evolving, and thus presenting institutions and consumers to high risks. Among today's growing concerns: Mobile Malware - Trojans, viruses and rootkits migrating from traditional online banking and designed specifically for the mobile marketplace. Researchers see an increase in mobile malware development - in pace with market growth. Third-Party Apps - Consumers often download mobile devises applications, some which come mainly from third parties with questionable security practices. Or worse, the apps are created by fraudsters and loaded with malware. Unsecured Wi-Fi - The unsecured wireless network is a toll- free highway for fraudsters to gain access to mobile devices, either to seize control of or gain access to account information. User Behavior - Consumers are prone to download third- party apps, use unsecured wireless networks, open and click links in SMS text messages and s, and lose their mobile devices and in some cases account information. 7

C OUNTERMEASURES Anti-virus software Firewalls Intrusion detection systems Authentication systems Encryption Consumer education on the use of Wi Fi and downloading of mobile devices applications. 8

E ND !! THANK YOU 9