Bank Crime Investigation Techniques by means of Forensic IT

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

© Peter Readings Data Leakage Pete Readings CISSP.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Cyber X-Force-SMS alert system for threats.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Information Security Technological Security Implementation and Privacy Protection.
The Office Procedures and Technology
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Computer Crime and Information Technology Security
Cyber Crimes.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Safe Computing Practices. What is behind a cyber attack? 1.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Securing Information Systems
Cybersecurity Awareness
I have many checklists: how do I get started with cyber security?
Andy Hall – Cyber & Tech INSURANCE Specialist
Introduction to Computer Forensics
Network Intrusion Responder Program
Red Flags Rule An Introduction County College of Morris
Forensic and Investigative Accounting
Presentation transcript:

Bank Crime Investigation Techniques by means of Forensic IT Technological Crime Trends Gina Carletti’s Scotiabank Canada

Agenda Risk Mitigation Prevent, Detect & Respond Focus on Technological Crime and Forensics Technological Crime Trends Business Impact/ Potential Risk Computer Forensics Forensic Tools Technology as an Investigation tool Recommendations Q&A

Technological Crime Investigators: Risk Mitigation Technological Crime Investigators: Understand the value of the business assets. Identify the threats in the environment. Review security measures in place. Mitigate residual risk to an acceptable level.

Prevent, Detect and Respond Strategies Prevent: the act of preventing the unwanted event The best protection Anti-Skimming Devices Monitors Systems Staff and Customer Education, Training/Awareness Detect: the act of detecting the unwanted event Identification of high risk customers and services. Detection of attacks either being planned or in progress. Respond: after the fact investigation Investigations gather facts, reports to business lines with recommendations and risk assessments.

Focus on Technological Crime and Forensics Profile of an Investigator Manage and respond to time sensitive Electronic Crime Investigations. Intelligence analysis used to identify new suspect profiles that may be involved in money laundering, fraud or other criminal activity. The identification of new technological crime trends and exploit vectors. Provide computer forensic support to investigations such as: Defalcation, Irregular practice, Bank Card Fraud, etc. Provide technical assistance in personal security incidents.

Technological Crime Trends Computer crimes have become increasingly common due to the prevalence of computers today. As technology advances and becomes more sophisticated, so does computer-based crime. Computers have been used for embezzlement, money laundering, fraud, organized crime and various other illegal activities, e.g. identity theft. Note: Computer and cyber forensics as well as electronic surveillance are now common tools used to investigate fraud.

Technological Crime Trends - Continue… Phishing - A form of social engineering personal information from victims (customers) via spoofed emails/websites. Pharming – Criminals hack a Domain Name Server, or a user’s computer/wireless router, to direct unsuspecting individuals to a fake website to steal their user ID and password. Crimeware - Malicious software/hardware that can infect the victim’s (customers) computer to capture, record and transmit data to be used fraudulently. e.g. keyloggers, trojans.

Technological Crime Trends - Continue… Online Social Networks – websites that allow people of common interest to share experiences. In the social networking site Myspace, the fraudsters have discovered ways to inject malicious code and deceive users to divulge confidential information. Vishing - Is also a social engineering method that incorporates the use of Voice Over Internet Protocol (VOIP) and traditional phishing tactics to garner confidential personal information. Skimming (ATM/POS) - is where the data in the card's magnetic strip is copied to a duplicate card without the card owner's knowledge

Technological Crime Trends - Continue… Mobile Devices - is a pocket-sized computing device, typically utilizing a small visual display screen for user output and a miniaturized keyboard for user input. May result in confidential information being lost Unsecured data warehouses and/or tape backup delivery channels - Security breach resulting in loss of confidential information, putting consumers and organizations at risk of crimes, such as identity theft. Regulations - Compliance with SOX, AML/ATF, Basil II and others regulatory requirements are driving security improvements and policy.

Business Impact/ Potential Risk Reputation Risk Identity Theft Financial Losses Information leakage and targeted attacks Threat to network security Hinder user productivity Bandwidth Consumption Legal Risk

Computer Forensics The simple definition of computer forensics ... is the art and science of applying computer science to aid the legal process Computer forensics is done in a fashion that adheres to the standards of evidence that are admissible in a court of law e-discovery, requires the proper tools and qualifications to meet the Court's procedural criteria

Digital Media Acquisition & Examination Forensic Tools Digital Media Acquisition & Examination Computer Hard Drive DVD USB Phones Smart phones Servers Email accounts Log analysis: Web logs Systems logs Application logs Telephone logs

Technology as an Investigation tool Types of Investigations: Irregular Practices Insider Threats Fraud Investigations Money Laundering and Terrorist Financing Harassment Inappropriate Internet Use Pornography Privacy Technological Tools: Email Analysis Forensic Analysis of Digital Media Forensic Analysis of Systems Cyber Forensics

Recommendations We need to focus on understanding and mitigating fraud related risks We all need to embrace the idea of becoming “Anti-Fraud Professionals” Employee, customer and police awareness training Security development training Implantation of new technology such as: one time passwords and anti-skimming devices Separation of duties in critical security functions Strict policy restrictions Regular auditing Monitoring systems/trigger programs Adequate logging Encryption

Thank you! Gina Carletti, Bcomm - ITM, CISSP Senior Manager Technological Crime & Forensics Tel: (416) 933-3020 Mobile: (647) 282-7067 Email: gina.Carletti@scotiabank.com