Fraud Detection and Prevention
What is prevention?
What is fraud?
What are the common myths about fraud?
What is spyware?
- Prevention controls are designed to keep fraud from occurring..
- Detection controls are designed to detect frauds.
What is fraud?
- An illegal act involving the obtaining of something of value through willful misrepresentations.
What are the common myths about fraud?
- It won't happen to me.
- Its not big deal.
- We have our controls in place.
- Someone else will take the loss.
- Check Fraud
- Cyber Crimes
- ACH Fraud
- Wire Fraud
Types of Cyber Crime?
- Hacking
- Trojan Horse
- Phishing
- Spyware
- Keylogger
- Illegal intrusion into a computer systems without the permission of the owner.
- Virus Dissemination
- Virus, Key-logger, Trojan Horse
- High school friends, unknown senders
- Hyperlink
- They know what you like
- Software download
- Games, screen savers.
What is Trojan horse?
- Virus hidden in file or a program
- Downloaded from internet
- Downloaded from emails.
- Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden form the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer.
- Watch sites you visit
- Read you emails
- Keystroke logging (often called key-logging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a convert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous key logging methods, ranging from hardware and software-based to electromagnetic and acoustic analysis.
- From virus
- USB Port
- Purchase online
- Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as trustworthy entity in a electronic communication. Communications purporting to be from popular social websites, auction sites, online payment processors or IT administrations are commonly used to lure the unsuspecting public.
- A technique of pulling our confidential information from the bank account holder by deceptive means.
- Fake login page.
- Deceptive login(looks like bank website)
- Sometime link to real website
- phishing email with link verify important information
- Are attacks in which bank customers are contacted by email or phone told that their checking accounts have been compromised. Instead of referring to a website you are given a toll-free number to call.
- Watch for warning signs.
- Listen to employees
- Follow established hiring practices
- SCAN Computers often
- Follow policies and procedures
- Strong internal controls
Key Points in Detection:
- Bank reconciliations
- Positive pay
- ACH Debit Blocks and Filters
- Alters
- Audit
- Watch for warning signs
- Something is different
- Alert Employees
Comments
Post a Comment