Preview

cyber fraud

Good Essays
Open Document
Open Document
341 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
cyber fraud
Introduction : We have seen a spate of cyber frauds in the recent past. The frequency and scale of the incidents has created a lot of concerns for the banks, regulators and customers. What do banks in India have to learn from these? Are they doing enough to ensure that we don’t end up as sitting ducks? What preventive measures to take to face this new menace? Before we consider these and other related questions, we need to understand the anatomy of cyber frauds. Cyber Fraud is a generic term used to represent transfer of funds by a fraudster (usually a well connected gang opening across borders) using the login credentials of a victim. The login credentials are obtained through phishing attacks or by using social engineering techniques.

How Cyber Frauds occur?: Frauds in manual payment system were mainly related to tampering of cheques or presentation of fraudulent cheques. These were detectable on close examination at bank level. However, in an e-payment scenario, funds are disbursed on genuine but stolen identities by the fraudsters. The establishment of liability in such cases has become an uphill task. The steps followed for a Cyber Fraud are as:

1. Malware coder writes malicious software to exploit a computer vulnerability and installs a Trojan
2. Victim gets infected with credential-stealing malware
3. Banking credentials are siphoned
4. Hacker retrieves the banking credentials of the victim
5. Remote access to compromised computer
6. Hacker logs into victim’s online bank account and the funds are transferred usually to accounts in the name of fictious persons and then withdrawn as soon as the credit hits.
7. Then there are unsuspecting money mules lured by prospects of easy money
8. This money is then transferred from mule to organizers

Preventive Measures:

• Strengthening security control: Security controls are more important as it involves the usage of technology. The customers should be authenticated, verified and their identities

You May Also Find These Documents Helpful

  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    4. Tiny pieces of programming code that install themselves on an infected computer called a Zombie and transmit data back to the hackers’ computer without awareness of the Zombie computer user…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Each e-commerce have to keep their online data safe such as customers personal details, their bank details and many more and in order to make sure that their data stays safe and secured, they have to be aware of all the frauds that is taking place now days because e-commerce have to deal with payments such as online banking, electronic transactions, using debit cards, credit cards and many other ways and because of these e-commerce’s have more compliance issues as they are at more risk from being targeted than other websites. Data’s can be stolen in many ways such as by hacking and by adding viruses into systems and many other ways.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Swot Analysis Of Jcpenney

    • 4916 Words
    • 20 Pages

    People pose as sellers of a particular product, lure the customer into buying it, and then ask for their credit card number and other personal information like their home phone number, their social security number, address and so on. Later on, they use this information to their benefit by purchasing items for their own use. The person whose identity has been just stolen is then held responsible for the payment. This way, the thieves get what they want and escape from paying even a penny. This has become a big threat to all businesses operating over the net. Companies need to keep checking and updating their online theft-blocking, spam blocking software and assure customers about the same time and time again in order for people to visit their website and make…

    • 4916 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    • The Internet Crime Complaint Center (IC3) processed more than 336,000 complaints related to Internet crime in 2009 in the United States. • Many complaints were related to fraud, including nondelivery of ordered items, credit and debit card fraud, and advanced fee scams. Much of the credit card fraud was perpetrated when credit card numbers were stolen by criminals tricking people into revealing sensitive information or by computer programs that gather credit card data. • Non-fraud-related complaints pertained to issues such as computer intrusions, unsolicited e-mail, and child pornography.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Dashora, K. (2011). Cyber Crime in the Society: Problems and Preventions. Journal of Alternative Perscriptives in the Social Sciences, 240-259.…

    • 2090 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Credit Card Fraud

    • 4212 Words
    • 17 Pages

    To make readers aware of the pervasiveness of credit card fraud and how it affects credit card companies, merchants and consumers. A range of recent publications in journals and information from internet web sites provide corroboration and details of how fraudsters are using credit cards to steal billions of dollars each year. Numerous schemes and techniques are described in addition to recommendations as to how to help control this growing type of fraud. Credit card fraud is a healthy and growing means of stealing billions of dollars from credit card companies, merchants and consumers. This paper offers current information to help understand the techniques used by fraudsters and how to avoid falling prey to them. This fraud relies on technology currently available and the easy ability to obtain machinery to steal individual identities and account information, and to produce fraudulent credit cards. Information cited is…

    • 4212 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    capstone analysis

    • 535 Words
    • 2 Pages

    Cybercrime is an issue that should not be taken lightly. Crimes that are committed online can damage an individual’s life or cause major chaos. This paper will discuss what cybercrime is and how it has contributed to the overall rise in crime rates over the last ten years. This paper will also discuss recommendations to combat cybercrime and crimes associated with cybercrime and hackers, along with how cybercrime will affect the future of the criminal justice system.…

    • 535 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mr Zhu Qi

    • 1893 Words
    • 8 Pages

    As information technology (IT) and information systems (IS) improving rapidly, a massive number of business activities can be done by IT and IS. However, it is inevitable that the risks and threats are increasing at the same time. Thus, new kinds of risks and crimes, which mentioned by Choo and Smith, may emerge during doing the cyber events like online payments, auctions, gaming, social networking sites and blogs (Choo & Smith, 2008). Obviously, in Flayton’s case, the company suffering from data breach which happened at the processes of online payments is a typical and common information technology problem recently.…

    • 1893 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Computer Fraud

    • 2607 Words
    • 7 Pages

    Computer fraud is the use of information technology to commit fraud. In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which provides for jail time and fines.…

    • 2607 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Banking Frauds

    • 3449 Words
    • 14 Pages

    |PROJECT ON | | | |BANKING FRAUDS | | | SUBMITTED BY: • PRAJAKTA JADHAV - 9 • AYESHA KHAN - 12 • SHIRIN PATHAN – 19 • RACHNA RAUT - 24 • SONIA PAL- 40 • RANI RAMRAKHYANI - 49 Project report submitted to: Ms. Darshana Ma’am INDEX |SR.NO |TOPIC | |1. |Introduction to Bank | |2. |Introduction to fraud | |3. |Introduction to Bank Fraud | |4. |Types of Frauds | |5.…

    • 3449 Words
    • 14 Pages
    Powerful Essays