Download presentation
Presentation is loading. Please wait.
1
Chapter 9 Banking and Book keeping Protecting yourself from you
2
Why bankbook keeping?? Main business of computer industry Transaction Processing systems launched commercial cryptography Must understand to tackle problems of E- commerce Multilateral security aimed at Authenticity rather than confidentiality
3
Origins of Bookkeeping 8500 BC Invented right after agriculture Keep track of stored food Double entry bookkeeping 1300 AD Each transaction in 2 separate books Debit and credit Books should balance at end of day
4
Bank computer systems Very early automators (60’s and 70’s) Nightly Batch processing Applies transactions to ledgers Ledgers must balance Therefore can not “make money” Must take it from somewhere to assure everything balances Installation of new code tightly controlled Clark-Wilson Security Policy Model
5
Separation of Duties Really against human nature Dual control 2 people must act together to authorize transaction Nuclear 2 or more people must turn keys at same time to launch missiles Functional separation 2 or more people act on a transaction at different points in the path Purchase transaction manager makes purchase decision purchase clerk, writes PO warehouse records arrival of goods invoice arrives accounts clerk matches invoice to PO and warehouse receipt creates check accounts manager signs check.
6
Separation of Duties in OS Spilt signings using digital signatures Put users in separately administered domains Separate controls between sys admin and auditor Logs, rights,…… Tends to be tedious to set-up and people are lax with it, meaning system admins have to much control and often can commit fraud If back-office balancing controls are in place this should catch this fraud, unless these are computerized also…..
7
What goes wrong? 82% is employees Most times controls were ignored Or adjustments to circumvent controls were exploited There will always be risk, manage it
8
Wholesale Payment Systems SWIFT (Society for Worldwide International Financial Telecommunications) Encryption Authentication Nonrepudiation services SWIFT ran for 20 years with out fraud MAC keys now shared using PK Cryptography Digital signatures also used
9
ATMs Block Ciphers Tamper-resistant hardware Supporting protocols
10
ATM Basics Operations on clear pins on tamper resistant hardware Cards and PINs handled by different facilities Terminal master keys supplied to each ATM via 2 printed components PINs can be encrypted locally or on network If locally encrypted PIN sent to ATM If on network centrally PIN encrypted and sent PIN translation done in hardware security module, therefore clear value not available to programmers
11
What goes wrong Processing errors Theft by mail Fraud by bank staff List pages 201 – 202 Fake PIN harvesting machines Enter card and PIN get cigarettes Software glitches Lack of procedures Bottom line most ATM fraud was not sophisticated attacks on machines
12
Discussion articles Article dealing with multiple being involved in fraud to break separation of duties Good current article on successful bank fraud Article on ATM fraud
13
Articles Here is an article about bank fraud: http://www.usdoj.gov/criminal/cybercrime/th omasIndict.htm http://www.usdoj.gov/criminal/cybercrime/th omasIndict.htm Here are some articles on the genetic database in Iceland. http://www.mannvernd.is/frettir/abc.wnt9902 18_iceland.html http://www.mannvernd.is/frettir/abc.wnt9902 18_iceland.html http://www.actionbioscience.org/genomic/hl odan.html http://www.actionbioscience.org/genomic/hl odan.html
14
List of Resources History http://en.wikipedia.org/wiki/Accountancy Double entry http://en.wikipedia.org/wiki/Double- entry_accounting_system http://en.wikipedia.org/wiki/Double- entry_accounting_system Clark-Wilson security model http://www.answers.com/topic/clark-wilson- model http://www.answers.com/topic/clark-wilson- model
15
List of Resources Separation of duties http://szabo.best.vwh.net/separationofduties.html http://szabo.best.vwh.net/separationofduties.html http://hissa.nist.gov/rbac/paper/node6.html SWIFT http://www.swift.com/
16
List of Resources ATM security http://partnernetwork.visa.com/dv/pin/main.j sp http://partnernetwork.visa.com/dv/pin/main.j sp http://partnernetwork.visa.com/dv/pin/pdf/Vi sa_ATM_Eval_Vendor_Quest.pdf http://partnernetwork.visa.com/dv/pin/pdf/Vi sa_ATM_Eval_Vendor_Quest.pdf http://usa.visa.com/business/accepting_visa /ops_risk_management/cisp.html?ep=v_sy m_cisp http://usa.visa.com/business/accepting_visa /ops_risk_management/cisp.html?ep=v_sy m_cisp http://www.atmmarketplace.com/research.ht m?article_id=25310&pavilion=4&step=story http://www.atmmarketplace.com/research.ht m?article_id=25310&pavilion=4&step=story
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.