Fraud Prevention and Detection. Know at what point your customer’s card was compromised Source as little as two to three cards which have experienced.

Slides:



Advertisements
Similar presentations
Weighing the Risks and Benefits of Online Financial Transactions
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Lecture 6 User Authentication (cont)
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Vice President, e-Business Development Dubai United Nations Conference on Trade & Development Conference on Electronic Commerce.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
LECTURE 7 REF: CHAPTER 11 ELECTRONIC COMMERCE PAYMENT SYSTEMS PREPARED BY : L. Nouf Almujally Copyright © 2010 Pearson Education, Inc. 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Electronic Transaction Security (E-Commerce)
Mar 11, 2003Mårten Trolin1 Previous lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Payment Systems for Electronic Commerce
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Chapter 10: Authentication Guide to Computer Network Security.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Electronic Payment Systems
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
EFTPOS and credit Card payments Jana Skriveris Line 4 Due: 14 th Nov Business Admin.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Confidential – For Discussion & General Information Purposes Only EMV to Card Not Present Fraud Gavin Levin, CTP eReceivables Consultant.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
SABRE VIRTUAL PAYMENTS Karen Frayer Sabre Virtual Payments Manager.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Protecting Your Assets By Preventing Identity Theft 1.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Electronic Banking & Security Electronic Banking & Security.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Confidential and Proprietary - NOT TO BE DISTRIBUTED WITHOUT THE EXPRESS WRITTEN PERMISSION OF BANK OF AMERICA MERCHANT SERVICES. ASTRA EMV Review/Best.
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
A Brief Introduction Radiant Pay, a global provider of payment processing services to all kinds of business, Radiant Pay Services.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Protecting Your Assets By Preventing Identity Theft
Transaction Flow end-end
PCI-DSS Security Awareness
Challenge/Response Authentication
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Office 365 Identity Management
Use of Biometric Technology in Payments to avoid Frauds
Welcome To Money pad November 23, 2018 Sample footer.
Mastercard® Threat scan
Mastercard® Threat scan
Presentation transcript:

Fraud Prevention and Detection

Know at what point your customer’s card was compromised Source as little as two to three cards which have experienced confirmed fraudulent transactions to find the Point of Compromise. A common point of purchase across all cards should emerge Identify other cardholders who may potentially be at risk Write rules to monitor compromised cards for unusual spending activity Use real time decline or automatic blocking to reduce monetary fraud loss if fraud attempts are made on compromised card Early Detection: Point of Purchase/Compromise

Reviewing every transaction manually for signs of fraudulent activity Involves a exceedingly high level of human intervention Can prove to be very expensive and time consuming Unable to detect some of the more prevalent patterns of fraud (use of a single credit card multiple times on multiple locations (physical or web sites) in a short span) Manual Review

Applicable in card-not-present scenarios. Matches the first few digits of the street address and the ZIP code information given for delivering/billing the purchase to the corresponding information on record with the card issuers. A code representing the level of match between these addresses is returned to the merchant. Not much useful in case of international transactions. Address Verification System (AVS)

A 3- or 4-digit numeric code printed on the card but not embossed on the card and not available in the magnetic stripe. Ensures that the person submitting the transaction is in possession of the actual card (the code cannot be copied from receipts or skimmed from magnetic stripe). Doesn’t protect merchants from transactions placed on physically stolen cards. Fraudsters who have temporary possession of a card can, in principle, read and copy the CVM code. Card Verification Methods (CVM)

Automatic card number generators represent one of the new technological tools frequently utilized by fraudsters. These programs, easily downloadable from the Web, are able to generate thousands of ‘valid’ credit card numbers. The traits of frauds initiated by a card number generator are the following: Multiple transactions with similar card numbers (e.g. same Bank Identification Number (BIN)) A large number of declines Acquiring banks/merchant sites can put in place prevention mechanisms specifically designed to detect number generator attacks. Lockout Mechanisms

Negative list : database used to identify high-risk transactions based on specific data fields. Example : SAFE file distributed by MasterCard to merchants and member banks Positive files are used to recognize trusted customers (by their card number or address) and bypass certain checks Important tool to prevent unnecessary delays in processing valid orders. Negative and Positive Lists

Black Lists Proxy server lists Known Fraud IP address lists Known Fraud address lists Zombie/hacked computer lists Fraudulent Merchant Lists List of merchants who have been known for being involved in fraudulent transactions in the past. Provide useful information to acquirers at the time of merchant recruitment MATCH from MasterCard Negative and Positive Lists

The User Data Validation Module gives businesses the ability to verify a customer's contact information. Additionally, to ensure financial loss from returned shipping or inaccurate billing, this module automatically detects and corrects spelling and typographical errors. User Data Validation Matters Will: Identify false names, false addresses, fake phone numbers and stolen banking information Deliver detailed information including actual bank name, phone number, location. Conduct a detailed GeoIP analysis of order to determine user location. Compare all collected data for inconsistent fault points contributing to an overall dynamic fraud score User Data Validation

In the cat and mouse game of fraud and detection, a traditional tactic of fraudsters is to hide their location through the use of proxy servers. This module then compares the true data with the data the customer wants you to see. True IP Detection Will: Identify public visible and local LAN IP address Provide GeoIP lookup information for both visible IP addresses Identify discrepancies between Used Supplied Data and IP data Validate proxy server and net block information True IP Detection

Social Network Validation detects user profiles by searching for them on most common networks. The module compares information made public by the customer against information received in the order. Since fraud typically includes mixed-and-matched contact and billing information from multiple stolen identities, this module is another key in determining the legitimacy of a transaction. Social Network Validation

Discussion: What Would You Do? You have been asked by your manager to assess what type of monitoring product you would need. Your monitoring system will provide a range of results, you have been asked to interpret these results You have been asked by your manager to reduce the false positives results in your fraud detection system. You have been asked to change the rules in your neural network, you are unsure what rules to put in place.

Intelligent Fraud-Detection Systems Spot Fraud Before it is Reported by the Cardholder Card companies continue to increase the effectiveness and sophistication of customer-profiling neural network systems that can identify unusual spending patterns and potentially fraudulent transactions. The card company will then contact the cardholder to check whether the suspect transaction is genuine. If not, an immediate block can be put on the card.

Automated Transaction alerting Method used to improve customer service and detection: Use automated alerts to decrease fraud staff workload and enable more efficient work practices Use auto alerting to allow customers to set their own security parameters and enable you to deliver a more personalized banking service

Simple Rule Systems Involve the creation of ‘if...then’ criteria to filter incoming authorisations/transactions. Rely on a set of expert rules designed to identify specific types of high-risk transactions. Effectiveness increases over time (more rules are added to the system) ✘ Disadvantage: can increase the probability of throwing valid transactions as exceptions − This limitation can be overcome to some extent by prioritising the rules and fixing limits on number of filtered transactions.

Neural Network Technologies Based on the ‘statistical knowledge’ contained in extensive databases of historical transactions, and fraudulent ones in particular. A neural network is a computerized system that sorts data logically by performing the following tasks: Identifies cardholder’s buying and fraudulent activity patterns. Processes data by trial and elimination (excluding data that is not relevant to the pattern). Finds relationships in the patterns and current transaction data

Neural Network Technologies Advantages: These models are able to learn from the past and thus, improve results as time passes. Can extract rules and predict future activity based on the current situation. Disadvantage Needs feeding with fraud data continually No data the profile built up will decay

Basien Technology A more advanced form of Neural Networks Self learning. Does not need continual data to preserve profiles June 16Caribbean Electronic Payments LLC20

Fraud analytics Allows to have a better view/perspective on trends in fraud occurrences Enables using trends identified to improve preventive measures and controls Added benefit of customer profiling using data mining Defines false positives and false negatives as what they are

Risk Scoring Technologies Tools based on statistical models designed to recognize fraudulent transactions, based on a number of indicators derived from the transaction characteristics Provide one of the most effective fraud prevention tools available. Comprehensive evaluation of a transaction being captured by a single number. Transactions can be prioritized based on the risk score and given a limited capacity for manual review, only those with the highest score would be reviewed.

Products Alaric AI Corporation Fraud Labs Volance FICO BankCard Quatrro Analytics Ethoca Adeptra Oscar Kilo CyberSource Visa/MasterCard Monitoring Tools

Agenda and Learning Objectives Emerging technology that brings in a new level of security to business-to-consumer. Various solutions can be implemented: Two-factor Authentication EMV/Chip 3D-Secure Discussion

Two-factor Authentication Two-factor authentication (TFA, T-FA or 2FA) is an approach to authentication which requires the presentation of "two or more" of the three authentication "factors: Something the user knows (e.g., password, PIN); Something the user has (e.g., ATM card, smart card); and Something the user is (e.g., biometric characteristic, such as a fingerprint).

Something you have Tokens with a display (disconnected tokens) Connected tokens USB tokens Virtual token MFA Smartcards Audio Port tokens Wireless Dallas iButton Casque Magnetic stripe cards Soft tokens One-time pads – UniOTP Mobile phones – Vulnerability to attacking – Assignment to the bearer – SMS one time password – Smartphone push – Additional phone token – Mobile signature – Mobile applications

Something you are Biometrics Biometric authentication also satisfies the regulatory definition of true multi- factor authentication. Users may biometrically authenticate via: finger print verification hand based verification retinal and iris scanning dynamic signature verification. Disadvantages: vulnerable to a replay attack user resistance positive and negative outputs compromised data cannot be changed. Hybrid or two-tiered authentication methods (private keys encrypted by fingerprint inside of a USB device)

EMV/Chip Global standard for credit and debit payment cards based on chip card technology. Payment chip cards contain an embedded microprocessor providing strong security features More secure than a traditional magnetic stripe card. EMV chip card payment provides security benefits in the following areas: With online authorization, a dynamic cryptogram protects against the use of skimmed data and stolen account data With offline authorization, a PIN capability protects against lost and stolen card fraud, and data authentication protects against counterfeit cards Limits on offline activity protects against credit overruns and fraud

3D Secure 3-D Secure is an XML-based protocol used as an added layer of security for online credit and debit card transactions. Developed by Visa (Verified by Visa), MasterCard (SecureCode), and by JCB International (J/Secure). American Express (SafeKey) This authentication is based on a three domain model: Acquirer Domain Issuer Domain Interoperability Domain (the infrastructure provided by the credit card scheme to support the 3-D Secure protocol). A transaction will initiate a redirect to the website of the card issuing bank to authorize the transaction. Each issuer can use chosen authentication method: password authentication; smart card readers; security tokens

3D Secure Implementing 3D Secure Visa/MasterCard member banks must use compliant software supporting protocol specifications, and perform integration testing with payment system server ACS providers: Access Control Server is implemented on issuer side. MPI providers: merchant plug-in providers are authorised to send requests to card system servers Disadvantages of 3D Secure Cardholder may see their browser connect to unfamiliar domain names, which may make it easier to perform phishing attacks. Mobile browsing may throw up compatibility problems (no popups) Users are generally discouraged if the authentication process is too complicated or take too long