In the next few minutes we’ll teach you how to: Maximize your RFID Solution Take the profit out of counterfeiting Keep accurate track of your chip inventory.

Slides:



Advertisements
Similar presentations
Using software for Firearm Acquisition and Disposition
Advertisements

1 Auditing Sales and Trade Receivables 1 Audit Objectives The audit objectives for sales and trade receivables relate to obtaining sufficient evidence.
Accounting for Stock Chapter 8. Stock Stock – goods purchased by a trading firm for the purpose of resale at a profit. Note - shelving, business vehicles.
A business makes payments for what it buys, In return it receives payments for goods it sells or services it provides.
Secure Your Store Understand the measures used in securing a retail store.
It the responsibility of the executive head of your state agency to maintain the property records of those assets under the control of the agency. This.
Hashimoto: Casino Management: A Strategic Approach © 2008 Pearson Education, Upper Saddle River, NJ All Rights Reserved. Hashimoto: Casino Management:
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Computer Fraud Chapter 5.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Hashimoto: Casino Management: A Strategic Approach © 2008 Pearson Education, Upper Saddle River, NJ All Rights Reserved. Chapter 11 PRICING: REVENUE.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
SalesPad SalesPad delivers an all-in-one order entry, inventory and sales management solution integrate seamlessly with Dynamics GP SalesPad simplifies.
LOSS PREVENTION AND RETURN ON INVESTMENT Point of Sale Software and Video Integration.
ACCOUNTING FOR MERCHANDISING OPERATIONS
Bank Reconciliation Other Terms Review Potpourri $100100$100100$ $200200$200200$ $300300$300300$ $400400$400400$ $ Sales.
Gifting and Charity are the cornerstones of The WORLD CASH CLUB Program.
Executive Summary Nokia's net sales in 2003 decreased by 2% compared with 2002 and totaled EUR million (EUR million in 2002). Operating.
Chris Gravatt Mallory De Kovessey Tina Vargas Tim Hogenhouser The ChoicePoint Attack.
IBM SPSS Solutions A SELECT INTERNATIONAL COMPANY.
Section 16.1 Cash Registers
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Journalizing INVENTORY-Related Transactions Slideshow 8 B.
Safeguarding Financial Institutions with Pixim ® ’s Digital Pixel System ® Technology July 2008.
In today’s world technological advances are taking place at a rapid pace. One of the goals of everyone is working towards is to satisfy customer needs.
Maintaining timecards to facilitate accurate attendance tracking Overview of attendance programs About entering timecard edits that impact attendance About.
Property Custodian Meeting July 10, Review of USM Internal Auditor Findings  Excerpt from the USM Internal Auditors report dated May 31, 2012:
CIS—100 Chapter 13--Outlook 1. Using Your Mail to Take Action 2 Outlooks allows you to take several actions to organize, categorize, and respond to your.
Chapter 4 How Businesses Work McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
The Social Effect of Information System
What have you known about cybercrime? What do you want to know about cybercrime?
Journal Question ► Why is it important for a company to focus on having excellent customer service? Give three examples.
 ReadSoft 2004 Review of Multi-Site Implementation At Canadian Helicopter Corporation Christine Whyte, ReadSoft.
Accounting Information Systems System Descriptions.
AIMS –Asset Inventory Management System. After the scanner information is uploaded into AIMS What’s next?
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Chapter 10 Identifying and preventing fraud Qiang Jiang School of Business Sichuan University, China
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
By: Devi Sumadi The Administration information system design and construction of UD. Usaha Jaya Engineering Equipment Company.
Created By: Rohit SahajpalJames AasmanDamon GuardMatt HudonEric BlackMartin Matthiesen.
System Descriptions. What we will do today… Today, we will describe the billing and cash receipts systems of a simple company The points to think about.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Cage Investigations Steve Allensworth. Cage Investigations A frontline casino cashier is responsible for several thousand dollars during their shift.
Chapter 3 Statements and Ratios © 2012 Pearson Prentice Hall. All rights reserved. 1-1.
Prior to each transaction, the cashier at FoodWays enters a code into the cash register to let the cash register know that a new transaction is being processed.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Need of Document Management Systems From Infocrew Solutions Pvt.Ltd.
Controlling By: Mrs. Belen Apostol. What is controlling refers to the process of ascertaining whether organizational objectives have been achieved; if.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Website Monitoring Services: Who Is Keeping Your Web Host In Check?
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Mock Action Research Proposal Presentation Michael Leazer EDU/671 June 9, 2016.
The Use of Metrics in Operations Management. Operations Management & Metrics So far in class we have learned about what operations management is, how.
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
Final Topics in Chp. 6 BUA111: Weeks 14 and 15.
Chapter 9 Non-Cash Assets.
Frauds in retail practices
Consider cards over cash
Consider cards over cash
Chapter 9 Non-Cash Assets.
UK Start up – sub 50 employees, with light VC funding (about a quarter million). It’s making use of the bitcoin and ethereum type block chains and before.
Consider cards over cash
Cherwell Asset and Configuration Item (CI) Management
Presentation transcript:

In the next few minutes we’ll teach you how to: Maximize your RFID Solution Take the profit out of counterfeiting Keep accurate track of your chip inventory And so much more

Three security issues concerning Casinos today are: Counterfeiting Employee Theft Larceny …but before discussing these issues and our solutions, we will demonstrate chip scanning…

CHIP SCANNING Your Cx3 powered computer can continue to scan until it sees RFID tags… When RFID tags are seen, serial numbers are read and processed… AF3245C7 B496F28A C96DAF84 926BE82A Now that you have seen how chip scanning happens, let’s move on to our first issue…

COUNTERFEITING No matter how perfect a counterfeit chip may look, if it has no RFID tag, it will not be recognized or processed by Cx3…

COUNTERFEITING If the counterfeit chip was created perfectly, AND somehow contains a bogus RFID tag, Cx3 still cannot be fooled… AF3245C7 B496F28A C96DAF84 926BE82A Cx3 can notify you if the serial numbers just scanned are unknown… These chips are unknown…

COUNTERFEITING …even if the counterfeit chip was created by painting over one of your existing chips, Cx3 is still on the ball… AF3245C7 B496F28A C96DAF84 926BE82A Cx3 tells you the denomination it knows to be associated with the scanned serial numbers… Thee look like $25 chips… These are really $5 chips… These “look” like $25 chips… According to serial numbers, these are $5 chips…

COUNTERFEITING In fact, even if a counterfeiter were able to: Cx3 would alert you of the database intrusion, and inform you of any changes… Thee look like $25 chips… These are really $5 chips… Create a truly authentic looking counterfeit… Somehow, embed a valid RFID tag… Bypass all of YOUR internal security and hack YOUR secure corporate database…

COUNTERFEITING Remove the profit… Counterfeiting goes away!

Whether Employee Theft is the result of an accidental invalid payout, or outright theft of chips, the consequence is lost revenue. EMPLOYEE THEFT Along with counterfeiting and larceny, this cost the global gaming community a projected $300 million during According to research conducted by Price- Waterhouse Cooper, the cumulative loss from 2006 through 2010 will exceed $1.9 billion

EMPLOYEE THEFT As demonstrated previously, our Cx3 software verifies every RFID chip scanned… Is the serial number valid ? What denomination is in our database ? But that’s just the tip of the iceberg…

EMPLOYEE THEFT Every transaction is recorded to continue the security and validation process. AF3245C7 B496F28A C96DAF84 926BE82A $300 Scanned $25 x 12 = $300 CASH OUT $300 Cash Out Transaction Recorded…

EMPLOYEE THEFT Cx3 alerts your personnel of the transaction value, and provides them full detail showing the count of each chip denomination… but it does so much more to protect your assets… YOU define transaction types… YOU define transaction conflicts… YOU define your business rules… For Example… I defined a “CASH OUT” transaction… I defined a business rule that says “CASH OUT” chips cannot be “CASH OUT” again before they are recorded in a “BUY IN” or “FILL” transaction.

EMPLOYEE THEFT  Reduce the likelihood of invalid payouts  By displaying transaction details, Cx3 is a verification step designed to help reduce accidental overpayment.  Eliminate chip theft  If a chip marked as part of a “CASH OUT” transaction appears at another cage window to be redeemed, or at a table to be wagered before a corresponding “BUY IN” or “FILL” transaction, surveillance is alerted.

EMPLOYEE THEFT …and Cx3 does away with another problem facing casinos

So far, we have shown how Cx3 protects you against some very serious issues…   Counterfeiting   Employee Theft  Larceny LARCENY In the gambling mecca of Las Vegas, there are an average of 18 casino robberies each year. Although these criminals rarely succeed, their recklessness affects personnel and patrons alike. …and Cx3 is there to help keep this heinous crime from ever happening to you…

LARCENY Although Cx3 cannot eliminate larceny, we can eliminate profit of larcenous behavior. Full implementation of Cx3 grants perpetual knowledge of every gaming token wherever you have RFID scanners.

LARCENY If chips are stolen from a table, cage window, or anywhere else with chips and scanners… simply set the last transaction type for each of the missing chips to “STOLEN”. The next time those gaming tokens appear, surveillance can be immediately notified… AF3245C7 B496F28A C96DAF84 926BE82A These chips were stolen! Stolen chips on table 5 Security alerted!

It’s about THE SECURITY… Cx3 is designed to: Heighten your security measures. Protect you against fraud and larceny. Immediately alert surveillance of infractions. Provide complete audit detail of all transactions. AND… Keep accurate records of where each and every chip was last known to be. It’s about THE CUSTOMER… Cx3 runs silently and efficiently in the background, allowing your employees to return their focus to the customer… It’s about time…