New Delhi, India, 14 March 2013 Innovating Cyber Defense Approaches to Combat Online Financial Fraud in Developing Economies Charles Iheagwara, Director,

Slides:



Advertisements
Similar presentations
Usably Secure, Low-Cost Authentication for Mobile Banking* Saurabh Panjwani, Ed Cutrell Microsoft Research India * Many thanks to Anupam Varghese (EKO.
Advertisements

M-PAYMENT SYSTEM (e–WALLET ).
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
G-Xchange, Inc., (GXI) the mobile money service arm of Globe Telecom, operator of GCash, is the world’s first Telco- led, bank agnostic mobile money platform.
Cyber Security and the Global Business Environment Jeremy Schaar:)
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
Mobile Technology And Cyber Security K. N. ATUAHENE Director, Domestic Trade and Distribution Ministry of Trade and Industry.
The M-Pesa Payment Platform FDCF project (DFID) An Introduction Nick Hughes November 2005.
Microfinance and Technology Building Operational Solutions for Microfinance and SME Projects May 24, 2010.
Mobile money and microfinance European Microfinance Week
Best games in the world are free!. Agenda 1. About Game Insight 2. Why Android 3. Market Opportunity 4. Emerging Markets 5. Secrets to success.
AFRALTI1 The Impact of the Mobile Money Revolution in Africa The Impact of the Mobile Money Revolution in Africa.
BANK IN A BOX Baku, Azerbaijan October 2012.
Technology and Online Spaces Claro Parlade Director for Software Policy Asia-Pacific.
1 Mobile Phones As a Communication Platform in Africa Joseph Ogutu Chief Corporate Affairs Officer Safaricom Ltd.
ITEC0722: Mobile Business and Implementation: Mobile Payment and Security Suronapee Phoomvuthisarn, Ph.D.
International Telecommunication Union Committed to Connecting the World The World in 2009: ICT Facts and Figures Jaroslaw K. PONDER Strategy and Policy.
A future global ODR system A future global ODR system A developing country perspective Mrs. Cécile Barayre ICT Analysis Section.
Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia September 2013.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Phillippa Biggs Coordinator, Broadband Commission for Digital Development Palais des Nations, UN, 21 September 2015.
Public Utility Research Center Mobile Paradigm in Developing Countries Mark A. Jamison Public Utility Research Center University of.
THE MOBILE CHANNEL IN FINANCIAL SERVICES TARIK HUSAIN BUSINESS DEVELOPMENT DIRECTOR ASIAN BANKER SUMMIT APRIL 2011.
Key Issues facing Mobile Carriers Matt Davey Deputy Managing Director OPTUS MOBILE 25 th September 2003.
THE LONG VIEW: 2013 ENERGY OUTLOOK AND MARKET IMPLICATIONS THE GOVERNOR’S CONFERENCE ON ENERGY OCTOBER 16, 2013.
Tunis, Tunisia, 28 January 2014 BuffaloGrid Power as service to the off-grid world Daniel Becerra, Managing Director, BuffaloGrid,
“Card Diversity and Novel Prepaid Card Applications Spur Growth in the Prepaid Cards Market” © Global Industry Analysts, Inc., 6150 Hellyer Ave., San Jose,
MarketsandMarkets Presents Cross-Platform and Mobile Advertising Market worth $76.57 Billion by 2018
Why m-Commerce will be on a Growth Spree in 2015?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Global ATM Market forecast.
Global Hardware Encryption Market Risk Analysis, Competitor Analysis, Choice Modelling, Trends and Forecast by 2022 Phone No.: +1 (214)
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Fraud Detection and Prevention.
Global Hardware Encryption Market Risk Analysis, Competitor Analysis, Choice Modelling, Trends and Forecast by 2022 Phone No.: +1 (214)
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Physical Security Market share research by applications and regions for.
Kbv Research | +1 (646) | Executive Summary (1/2) Global Application Delivery Controllers Market Knowledge Based Value (KBV)
The Public Safety LTE & Mobile Broadband Market:
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Firewall as a Service Market to grow at 25% CAGR from 2017 to 2024: Global.
Kbv Research | +1 (646) | Executive Summary (1/2) Global Streaming Analytics Market Knowledge Based Value (KBV) Research.
Kbv Research | +1 (646) | Global High-End Lighting Market Knowledge Based Value (KBV) Research Full report:
Kbv Research | +1 (646) | Global Automated Test Equipment Market Knowledge Based Value (KBV) Research Full report:
Cloud Security Market Share
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024Low Power Wide Area Network.
Kbv Research | +1 (646) | Executive Summary (1/2) Global Route Optimization Software Market Knowledge Based Value (KBV)
Kbv Research | +1 (646) | Global Out-of-band (OOB) Authentication Market Knowledge Based Value (KBV) Research Full report:
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
Kbv Research | +1 (646) | Structured Cabling Market Knowledge Based Value (KBV) Research Full report :
Kbv Research | +1 (646) | Executive Summary (1/2) Global Critical Infrastructure Protection Market Knowledge Based Value.
Digital Banking Market
Global Market Insights, Inc.
Carrier Wi-Fi Market
Opportunity Analysis and Industry Forecast, Pages: 110 Tables: 43 Charts: 56 Global Opportunity Analysis and Industry Forecast, Online.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Operations & Business Support.
E-Commerce for Developing Countries (EC-DC)
Kbv Research | +1 (646) | Global Internet Security Market Knowledge Based Value (KBV) Research Visit:
Kbv Research | +1 (646) | Global Wireless Audio Devices Market Knowledge Based Value (KBV) Research Visit:
Industry Overview The global AI in cyber security market is predicted to grow at 35.0% CAGR during the forecast period with the market size reaching USD.
Identity Analytics Market
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Automotive Advanced Gear Shifter.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fingerprint Sensor Market Size Growth During Forecast Period.
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Global Smart Card Market to hit $65 Bn by 2025: Global Market Insights.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Radio Access Network Market.
Global Telemedicine Market (by End-Users, Specialty, Component, Service Types, Delivery Mode & Regional Analysis), Mergers and Acquisitions, Recent Trends, Key Company Profiles and Recent Developments - Forecast to 2026
Market Research Future +1 (339) (US) (UK) IoT Managed Services Market Research Report- Global Forecast 2022 Innovation and the.
Global Medical Ceramics Market (By Type of Materials, Applications, Regions), Key Company Profiles - Forecast to 2025
Global Cyber Security Market (By Product Segments, Service Segments, Industry Verticals, Geography, Recent Developments) - Forecast to 2025
Presentation transcript:

New Delhi, India, 14 March 2013 Innovating Cyber Defense Approaches to Combat Online Financial Fraud in Developing Economies Charles Iheagwara, Director, Unatek, Inc. ITU Workshop on “ICT Innovations in Emerging Countries” (New Delhi, India, 14 March 2013)

Mobile World At the end of 2011, there were 6 billion mobile subscriptions, estimates The International Telecommunication Union (2011).The International Telecommunication Union That is equivalent to 87% of the world population. is a huge increase from 5.4 billion in 2010 and 4.7 billion mobile subscriptions in Mobile subscribers in the developed world has reached saturation point with at least one cell phone subscription per person. This means market growth is being driven by demand developing world, led by rapid mobile adoption in China and India, the world's most populous nations.

Mobile World Cont. At the end of 2011 there were 4.5 billion mobile subscriptions in the developing world (76 percent of global subscriptions). Mobile penetration in the developing world now is 79 percent, with Africa being the lowest region worldwide at 53 percent. Portio Research –free Mobile Factbook 2012Mobile Factbook 2012 Predicts that mobile subscribers worldwide will reach 6.9 billion by the end of 2013 and 8 billion by the end of estimates that Asia Pacific’s share of the mobile subscribers will rise from 50.7 percent in 2011 to 54.9 percent in By 2016 Africa and Middle East will overtake Europe as the second largest region for mobile subscribers Africa. New Delhi, India, 14 March

Mobile Banking Not all mobile subscribers have bank accounts The estimate of subscribers with mobile phones but no bank accounts could be anywhere from 15 – 40% of all mobile subscribers Banks say, “Let’s use phones to serve these people!” Several mobile banking services exist today – M-PESA (Kenya) – Wizzit (S.A.) – GCash (Philippines) – > 100 million dollars transacted per day

How does it work? Courtesy: Microsoft Research India A network of human agents mediate transactions – Run small businesses: mobile recharge, pharmacy etc – Commissioned by m-banking provider M-banking outlet in Delhi An m-banking agent sends an SMS to the bank for a deposit transaction Courtesy: CKS

How does it work? Courtesy: Microsoft Research India Agent Bank Hari deposits 100/- “Credit Hari’s a/c with 100/-” “Hari’s a/c credited” Hari

How does it work? Courtesy: Microsoft Research India Agent Bank Hari withdraws 100/- “Credit agent’s a/c with 100/-” “Agent’s a/c credited” Hari

Security Challenges Physical: Phones can be lost or stolen. If stolen, can login credentials be extracted from the memory card? Logical: Banks must authenticate users. How is authentication via wireless medium sure proof

Security Challenges Cont. Courtesy: Microsoft Research India Phones can be lost or stolen. Banks must authenticate users. Hari Bank “Credit agent’s a/c with 100/-” Is this really Hari? ‘

Challenges How do we authenticate via a phone like this? No GPRS, Can’t install software Typical m-banking user’s phone Courtesy: EKO … while also ensuring A simple interface (want low-literate users to use it) Low cost (want it to scale)

Banking Authentication for Mobile Users Current practice by banks is not sure proof: Most banks use PINs to authenticate users For good security, PINs must be protected There is evidence that some banks have holes in the way the implement PIN management Wireless (GSM, etc.) security is grossly inadequate – The problem is wireless leak of information – The security architecture profers Network-layer protection

Cyber Attacks on Mobile Banking Hacking incidents from well-known attacks characterize current mobile banking practice Attacks on network-layer is difficult to track and quantity over wireless media Skimming attacks result to losses by some estimates well over $1 billion in 2009.) – Attack type includes shoulder-surfing and phishing attacks. New Delhi, India, 14 March

Unatek’s Solution Unatek’s subsidiary intrusiononline, Inc. ( is developing a wireless intrusion analytics that aides in analyzing authentication-based applicationswww.intrusiononline.net A commercial product/service is projected to be released next year Our approach is to address wireless authentication threat vectors peculiar to delivery of PIN over wireless medium Current practice mostly center on cryptographic means which have proven to be inadequate New Delhi, India, 14 March

Unatek’s Solution Every user has a PIN & holds a unique codebook – Appends a “coat” that is tamper-proof to each transaction message – A fresh coat each time – The technology addresses network- and application-layers issues Our approach revolves around the belief that if wireless transaction is carried over a medium that can authenticate the issues mentioned above will be addressed. We envisage developing an application that will track PINS on cooperating devices and coat them with protective shields both on the fly and at rest on the handsets

Conclusion Mobile banking in developing economies are vulnerable to several attacks resulting into losses worth several billions of dollars Current Cyber security measures are inadequate to combat the attacks Unatek is incubating solutions that extends the current strategies into a new and more effective way of combating the attacks.