SlideShare a Scribd company logo
Banking and Bookkeeping
IF4033 Information Security and Assurance
Semester 2 2013/2014
Kelompok 16
 Yogi Salomo Mangontang Pratama
(13511059)
 Habibie Faried (13511069)
 Setyo Legowo (13511071)
Outline
 Definition
 Security Requirement
 Security Incident
◦ Programming
◦ Infrastructure
◦ Process
◦ Organizational
 Security Pitfall
 Why Important
Banking
 In simple words, Banking can be
defined as the business activity of
accepting and saving money owned
by customers.
Bookkeeping
 Record financial activity
 Tracking account transaction
 Verify accuracy of procedures used for
recording financial transaction
HISTORY OF
BOOKKEEPING
Why is this important?
 Tackling Broader Problem of
Electronic Commerce and Fraud
 Mainstay of Computer Industry
 Because Finance is an important
aspect of Human Life
Security Requirement
 Information Security Requirement
 Implement Strong Access Control
Measures
 Maintain a vulnerability management
program
 Build and maintain a secure network
 Protect cardholder data
Security Incident
 Programming
 Infrastructure
 Process
 Organization
Programming
 Wrong ATM Card's PIN Verification
 Same PIN to all customer
 Wrong Assumption
 Test System as Live System
 No Authentication Probable
Wrong Assumption
An assumption was made by bank programmers.
Here is the algorithm
Then, how about Inserted ATM’s PIN?. Simply
peek it out 
Infrastructure and Technology
 Physical Credit Card Skimmer
 Online Credit Card sniffing
 Smart Card Information Sniffing
 Not authenticated RFID Transaction
 SWIFT Wiretapping link from branch
to mainframe computer's bank
Not authenticated RFID
Transaction
 Simple Wireless-based transaction
 Put RFID reader near to RFID Card
location’s victim
 Get control over it (steal data, etc)
 Done? Time to get away 
Process
 Unverified Address Change Process
 Mules for Money Laundering
 Age Verification With Credit Card
Number
 Misuse of Bank's Suspense Account
 Shoulder Surfing
Shoulder Surfing
 Stone
 Process Attacked: usage of ATM.
 New York
 1990’s
How does it work?
Stand
behind
someone in
ATM and
Peek their
PIN
Take the
receipt they
have
thrown
away and
find the
account
information
Create
Duplicate
Key using
retrieved
information
Use The
Duplicated
Key to
Access
Account in
any ATM
Organizational
 Bank Reset Clerk Authority Abuse
 ATM Repairman accessibility
 SWIFT Bogus Transaction Message
 Traditional Banking Law and Practices
 Internal Control Failure
Bank Reset Clerk Authority
Abuse
 Paul Stubbs
 Bank Reset Clerk
 HSBC Bank, 2000’s
 $20 Million Loss
How does it work?
Paul Stubbs, as
Reset Password
Clerk change
the password of
AT&T Account
Using the New
Password, He
and comrades
Access the
Account of AT&T
and Transfer
$20 Million to
Offshore
Company
Return the
Password to its
initial so that the
account owner
doesn’t realize
Security Pitfall
 Bad Authentication in accessing
system
 Tamper-able Infrastructure
 Abuse of Power
Thank you

More Related Content

What's hot

Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
VASCO Data Security
 
Internet banking
Internet bankingInternet banking
Internet banking
msarifff
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605
SovanChanda
 
Sim registration
Sim registrationSim registration
Sim registration
bansi bharadwaj
 
Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
chethu6391
 
Internet Banking PPT
Internet Banking PPTInternet Banking PPT
Internet Banking PPT
ayush goyal
 
E commerce
E commerceE commerce
Online banking
Online bankingOnline banking
Online banking
Preet Raj
 
Internet banking
Internet bankingInternet banking
Internet banking
SHIVA MOTURI
 
FinTech, Internet of Things & Patents
FinTech, Internet of Things & PatentsFinTech, Internet of Things & Patents
FinTech, Internet of Things & Patents
Alex G. Lee, Ph.D. Esq. CLP
 
e-banking
e-bankinge-banking
e-banking
Anmol Marya
 
online banking
online bankingonline banking
online banking
Rajat Goyal
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryption
ijcisjournal
 
ISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de EntrustISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de Entrust
Information Security Services SA
 
E banking
E bankingE banking
Online banking||
Online banking||Online banking||
Online banking||
hemanth sanju
 
INTERNET BANKING PPT
INTERNET BANKING PPTINTERNET BANKING PPT
INTERNET BANKING PPT
Anchit Rajawat
 
E banking and M-banking
E banking and M-bankingE banking and M-banking
E banking and M-banking
Kishan Dholakiya
 
FircoSoft Stripping detector
FircoSoft Stripping detectorFircoSoft Stripping detector
FircoSoft Stripping detector
FircoSoft
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 

What's hot (20)

Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
Internet banking
Internet bankingInternet banking
Internet banking
 
E commerce security system 0605
E commerce security system 0605E commerce security system 0605
E commerce security system 0605
 
Sim registration
Sim registrationSim registration
Sim registration
 
Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
 
Internet Banking PPT
Internet Banking PPTInternet Banking PPT
Internet Banking PPT
 
E commerce
E commerceE commerce
E commerce
 
Online banking
Online bankingOnline banking
Online banking
 
Internet banking
Internet bankingInternet banking
Internet banking
 
FinTech, Internet of Things & Patents
FinTech, Internet of Things & PatentsFinTech, Internet of Things & Patents
FinTech, Internet of Things & Patents
 
e-banking
e-bankinge-banking
e-banking
 
online banking
online bankingonline banking
online banking
 
An Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On SigncryptionAn Improvement To The Set Protocol Based On Signcryption
An Improvement To The Set Protocol Based On Signcryption
 
ISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de EntrustISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de Entrust
 
E banking
E bankingE banking
E banking
 
Online banking||
Online banking||Online banking||
Online banking||
 
INTERNET BANKING PPT
INTERNET BANKING PPTINTERNET BANKING PPT
INTERNET BANKING PPT
 
E banking and M-banking
E banking and M-bankingE banking and M-banking
E banking and M-banking
 
FircoSoft Stripping detector
FircoSoft Stripping detectorFircoSoft Stripping detector
FircoSoft Stripping detector
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 

Viewers also liked

APPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTERAPPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTER
Arpita Singh
 
Social Media and Local Governments
Social Media and Local GovernmentsSocial Media and Local Governments
Social Media and Local Governments
Mariana Salazar
 
PhD Defense: Computer-Based Support and Feedback for Collaborative Chat Conve...
PhD Defense: Computer-Based Support and Feedback for Collaborative Chat Conve...PhD Defense: Computer-Based Support and Feedback for Collaborative Chat Conve...
PhD Defense: Computer-Based Support and Feedback for Collaborative Chat Conve...
Traian Rebedea
 
Deepak sh
Deepak shDeepak sh
Green Banking - A Perspective on Bangladesh
Green Banking - A Perspective on BangladeshGreen Banking - A Perspective on Bangladesh
Green Banking - A Perspective on Bangladesh
Sanjidul Anwar
 
Applications of computers in law enforcement and government
Applications of computers in law enforcement and governmentApplications of computers in law enforcement and government
Applications of computers in law enforcement and government
Reina Niña Camano
 
Green banking
Green bankingGreen banking
Green banking
Kiruthika Kirthi
 
Indian banking 2020 opportunities and challenges
Indian banking 2020   opportunities and challengesIndian banking 2020   opportunities and challenges
Indian banking 2020 opportunities and challenges
Saurav Dasgupta
 
Challenges before banking sector in india b.v.raghunandan
Challenges before banking sector in india b.v.raghunandanChallenges before banking sector in india b.v.raghunandan
Challenges before banking sector in india b.v.raghunandan
SVS College
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
Sheril Daniel
 
E banking
E bankingE banking
E banking
Abhishek Tanna
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in Education
Allana Delgado
 
E Banking
E BankingE Banking
E Banking
cssangoram
 

Viewers also liked (13)

APPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTERAPPLICATIONS OF COMPUTER
APPLICATIONS OF COMPUTER
 
Social Media and Local Governments
Social Media and Local GovernmentsSocial Media and Local Governments
Social Media and Local Governments
 
PhD Defense: Computer-Based Support and Feedback for Collaborative Chat Conve...
PhD Defense: Computer-Based Support and Feedback for Collaborative Chat Conve...PhD Defense: Computer-Based Support and Feedback for Collaborative Chat Conve...
PhD Defense: Computer-Based Support and Feedback for Collaborative Chat Conve...
 
Deepak sh
Deepak shDeepak sh
Deepak sh
 
Green Banking - A Perspective on Bangladesh
Green Banking - A Perspective on BangladeshGreen Banking - A Perspective on Bangladesh
Green Banking - A Perspective on Bangladesh
 
Applications of computers in law enforcement and government
Applications of computers in law enforcement and governmentApplications of computers in law enforcement and government
Applications of computers in law enforcement and government
 
Green banking
Green bankingGreen banking
Green banking
 
Indian banking 2020 opportunities and challenges
Indian banking 2020   opportunities and challengesIndian banking 2020   opportunities and challenges
Indian banking 2020 opportunities and challenges
 
Challenges before banking sector in india b.v.raghunandan
Challenges before banking sector in india b.v.raghunandanChallenges before banking sector in india b.v.raghunandan
Challenges before banking sector in india b.v.raghunandan
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
E banking
E bankingE banking
E banking
 
Uses of Computers in Education
Uses of Computers in EducationUses of Computers in Education
Uses of Computers in Education
 
E Banking
E BankingE Banking
E Banking
 

Similar to Computer Security in Banking and bookkeeping

Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
sathyananda prabhu
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
IRJET Journal
 
E Banking
E BankingE Banking
E Banking
Arshad85
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
Kartik Mehta
 
Online Trading
Online TradingOnline Trading
Online Trading
koolzub
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
Kartik Mehta
 
ATM2.pdf.pdf
ATM2.pdf.pdfATM2.pdf.pdf
ATM2.pdf.pdf
Rashmibansal15
 
Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!
Halo Metrics
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
Anil Jain
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3
Sunny Fei
 
Report on Online Banking for Women
Report on Online Banking for WomenReport on Online Banking for Women
Report on Online Banking for Women
Rahul Shah
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET Journal
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Merchants
 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sector
suhasmcomplex
 
43394328 e-banking
43394328 e-banking43394328 e-banking
43394328 e-banking
gurpreet3131
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
Syeful Islam
 
Dmtm --final
Dmtm --finalDmtm --final
Dmtm --final
Rima Dave
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011
jhatch9418
 
Introductiontoebanking 1234532813570145-1
Introductiontoebanking 1234532813570145-1Introductiontoebanking 1234532813570145-1
Introductiontoebanking 1234532813570145-1
Rama Chandaran
 
Asto card into
Asto card intoAsto card into
Asto card into
IB Kang
 

Similar to Computer Security in Banking and bookkeeping (20)

Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
 
E Banking
E BankingE Banking
E Banking
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Online Trading
Online TradingOnline Trading
Online Trading
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
ATM2.pdf.pdf
ATM2.pdf.pdfATM2.pdf.pdf
ATM2.pdf.pdf
 
Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!Data Breach Prevention - Start with your POS Terminal!
Data Breach Prevention - Start with your POS Terminal!
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3
 
Report on Online Banking for Women
Report on Online Banking for WomenReport on Online Banking for Women
Report on Online Banking for Women
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
Tech developments in banking sector
Tech developments in banking sectorTech developments in banking sector
Tech developments in banking sector
 
43394328 e-banking
43394328 e-banking43394328 e-banking
43394328 e-banking
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
Dmtm --final
Dmtm --finalDmtm --final
Dmtm --final
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011
 
Introductiontoebanking 1234532813570145-1
Introductiontoebanking 1234532813570145-1Introductiontoebanking 1234532813570145-1
Introductiontoebanking 1234532813570145-1
 
Asto card into
Asto card intoAsto card into
Asto card into
 

Recently uploaded

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

Computer Security in Banking and bookkeeping

  • 1. Banking and Bookkeeping IF4033 Information Security and Assurance Semester 2 2013/2014
  • 2. Kelompok 16  Yogi Salomo Mangontang Pratama (13511059)  Habibie Faried (13511069)  Setyo Legowo (13511071)
  • 3. Outline  Definition  Security Requirement  Security Incident ◦ Programming ◦ Infrastructure ◦ Process ◦ Organizational  Security Pitfall  Why Important
  • 4. Banking  In simple words, Banking can be defined as the business activity of accepting and saving money owned by customers.
  • 5. Bookkeeping  Record financial activity  Tracking account transaction  Verify accuracy of procedures used for recording financial transaction
  • 7. Why is this important?  Tackling Broader Problem of Electronic Commerce and Fraud  Mainstay of Computer Industry  Because Finance is an important aspect of Human Life
  • 8. Security Requirement  Information Security Requirement  Implement Strong Access Control Measures  Maintain a vulnerability management program  Build and maintain a secure network  Protect cardholder data
  • 9. Security Incident  Programming  Infrastructure  Process  Organization
  • 10. Programming  Wrong ATM Card's PIN Verification  Same PIN to all customer  Wrong Assumption  Test System as Live System  No Authentication Probable
  • 11. Wrong Assumption An assumption was made by bank programmers. Here is the algorithm Then, how about Inserted ATM’s PIN?. Simply peek it out 
  • 12. Infrastructure and Technology  Physical Credit Card Skimmer  Online Credit Card sniffing  Smart Card Information Sniffing  Not authenticated RFID Transaction  SWIFT Wiretapping link from branch to mainframe computer's bank
  • 13. Not authenticated RFID Transaction  Simple Wireless-based transaction  Put RFID reader near to RFID Card location’s victim  Get control over it (steal data, etc)  Done? Time to get away 
  • 14. Process  Unverified Address Change Process  Mules for Money Laundering  Age Verification With Credit Card Number  Misuse of Bank's Suspense Account  Shoulder Surfing
  • 15. Shoulder Surfing  Stone  Process Attacked: usage of ATM.  New York  1990’s
  • 16. How does it work? Stand behind someone in ATM and Peek their PIN Take the receipt they have thrown away and find the account information Create Duplicate Key using retrieved information Use The Duplicated Key to Access Account in any ATM
  • 17. Organizational  Bank Reset Clerk Authority Abuse  ATM Repairman accessibility  SWIFT Bogus Transaction Message  Traditional Banking Law and Practices  Internal Control Failure
  • 18. Bank Reset Clerk Authority Abuse  Paul Stubbs  Bank Reset Clerk  HSBC Bank, 2000’s  $20 Million Loss
  • 19. How does it work? Paul Stubbs, as Reset Password Clerk change the password of AT&T Account Using the New Password, He and comrades Access the Account of AT&T and Transfer $20 Million to Offshore Company Return the Password to its initial so that the account owner doesn’t realize
  • 20. Security Pitfall  Bad Authentication in accessing system  Tamper-able Infrastructure  Abuse of Power