21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March 2003 www.paymentech.net.

Slides:



Advertisements
Similar presentations
How is money accounted at the Front Desk?. Hotels and Money Hotels provide a number of financial services to guests These services include: Cash Paid.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
Credit Card Fraud The Scale of the Problem Michael Moore Regional Security & Fraud Investigation Manager 14 – 17 Nov 2005 Security & Safety – Middle East.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
TCLEOSE Course No th Legislature SB – 473; SECTION 8. Section , Occupations Code, is amended by adding Subsection (i) to read as follows:
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Credit Card Fingerprint Scanner Dennis Seran CS 410 / Spring 2004.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
CREDIT CARD FRAUDS. Objectives Identify and describe examples of Credit Card frauds. List ways to protect yourself from Credit Card fraud in card present.
Protect Yourself from Identity Theft
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
FIRST LOOK.
Combating cyber-crime: the context Justice Canada March 2005.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Your Identity While Attending College.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
PKI Issues: The Payment Perspective March 6, 2000 Ann Terwilliger eCommerce Authentication Visa International.
Performance and Security of Internet Applications John Buten Manager, Enterprise Industries
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
An Investigation into E-Banking Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 20 March 2004.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Dimensions of E – Commerce Security
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Identity Theft.
Identity Fraud By: Owen DeBalko. Explanation Identity fraud means the fraudulent use of an individual's identifying information to commit crimes, unlawfully.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
CONTROLLING INFORMATION SYSTEMS
Langara College PCI Awareness Training
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Loss caused by customer theft, fraudulent payment, or nonpayment is a human risk.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
By: Micah Stevens Identity Theft in the World Today.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Identity Theft Chelsea Weser.
Antisocial use of ICT and Computer Fraud
Gift Card Risk Mitigation – Presentation A
And Digital Bait How content theft sites and malware are exploited by cybercriminals to hack into internet users’ computers and personal data.
Entrepreneurship Secure Ordering Presented By Mrs. Bowden.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Chapter 5 Electronic Commerce | Security
Chapter 5 Electronic Commerce | Security
Personnel Training for Privacy
“Credit score vocabulary”
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Identity Theft Samuel H. Slater.
Is someone pretending to be you?
Presentation transcript:

21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March Hackers on the Rise 82,094 reported instances in ,658 in 2001 and 21,756 in 2000 (Source: CERT, 2003)) 55% increase – How many go unreported? Symantec reported 689 attacks on FI’s 48% of those attacks were severe (Source: Symantec, 2003) Symantec reported 616 attacks on e- commerce merchants 19% of those attacks were severe (Source: Symantec, 2003)

21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March Hackers 24% of hacker attacks are intended 76% are opportunistic (Symantec, 2003) Hackers fall into 2 groups: Thrill Seekers – hack for the challenge Professionals – usually work for foreign governments and organized criminal gangs

21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March Credit Card Fraud Projected Visa fraud in Canada is over $92 million 330,686 fraudulent transactions Average sale = $ Average loss = $ <1% of transactions are fraudulent Internet fraud accounts for 5% ($4.6 MM) of Visa Canada’s total fraud loss Source: Visa Canada

21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March Credit Card Fraud

21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March Credit Card Fraud

21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March Identity Theft Definition: “Identity theft or fraud involves “stealing” another person’s identifying information, such as SIN number, DOB and mother’s maiden name, in order to to fraudulently establish credit, run up debt, and take over any financial or miscellaneous accounts, and obtain false documents” - Ariana-Michele Moore Celent Communications

21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March Identity Theft Over 100,000 identities are stolen every year in the U.S. (Source: Celent Communications) Rising at a CAGR of 20.7% from 2002 – 2006 (Source: Celent Communications) The Internet has given criminals a new way to obtain personal information Example – Criminals created a spoof eBay site and had customers enter credit card details and personal information. Example – Job posting sites

21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March Identity Theft

21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March Identity Theft Impact on Financial Services Industry Over the past 5 years identity fraud has cost close to $2 billion USD. (Source: Celent Communications) Intangible loss – brand equity and consumer confidence. Increase in security spending and employee training.

21/01/03 Paymentech proprietary and confidential information By John Florinis, Scotiabank As presented to FCA 240 at Seneca March Identity Theft