SlideShare a Scribd company logo
- Understand what measures should be taken to
prevent fraud in e-commerce.
- Understand How to detect E-Business Fraud
- Preventing E-C fraud involves reducing
or eliminating the elements that
motivate fraud.
- Detecting E-C fraud needs more
computer expertise
1. Security Through Obscurity
2. the control environment
3. risk assessment
4. control activities or Procedures
5. information and communication
6. monitoring
1. Security Through Obscurity
Keeping security holes, encryption algorithms,
and processes secret in an effort to confuse
attackers.
» The key to the front door is stashed under a
rock nearby, or under the welcome mat.
» It is right out in the open for the hackers to
grab, but mostly he won't be able to find it
without huge efforts of searching.
2. The Control Environment
The components of the control environment
 Integrity and Ethical Values
 Board of Directors and Audit Committee Participation
 Management’s Philosophy and Operating Style
 Human Resources Policies and Practices
tone at the top
A repeated commitment from corporate
leadership throughout the company to emphasize
the importance to the company of compliance
and ethical conduct, which is embraced and
integrated into every level of business operations.
Michael Volkov, Kreller Group, September 2012
3. Risk Assessment
» Risk assessment identifies the risks of doing
business with e-business partners.
Focus on
- the control environment of those organizations
&
- The electronic exchange of information
and money.
Procedures that counter the risk of
 data theft
 Sniffing
 unauthorized access to passwords
 falsified identity
 Spoofing
 customer impersonation
 false Web sites
 e-mail or Web site hijacking
4. Control Activities
» control activities generally fall into the following
five types:
A. Adequate separation of duties.
B. Proper authorization of transactions and activities.
C. Adequate documents and records.
D. Physical control over assets and records.
E. Independent checks on performance.
What control is useful for each example?
1.Employees forget or fail to follow procedures, or
become careless.
2. locks on doors, 24-hour monitoring and safe
storage space are examples of …..
3. sales invoices, purchase orders, employee time
cards in hard-copy and electronic form.
4. servers and computers access.
5. kickbacks and bribery, when one individual
becomes too close to suppliers or customers.
Video
» Proper authorization of transactions and
activities.
Biometrics as an example.
https://www.youtube.com/watch?v=eZTfgNIiNUA
Remember. Chapter 6
Steps to proactive fraud examination:
1. Endeavour to understand the business or operation of the
organization.
2. Identify what frauds can occur in the operation.
3. Determine the symptoms that the most likely frauds would
generate.
4. Use databases and information systems to search for those
5. analyse the results, and investigate the symptoms to determine if
they are being caused by actual fraud or by other factors.
» Use technology to catch technology fraud.
- fraud investigators who specialize in e-
commerce should understand the tools and
methods that perpetrators use.
As
- hacker tools could be use in troubleshoot
networks and catch perpetrators rather than to
hack into systems.
» What skills are required to detect and
investigate e-business fraud?
1. Web servers
2. E-mail clients and servers
3. intrusion programs like Nmap, Airsnort, and
Wire shark
What other skills are required to detect and
investigate e-business fraud?
Challenge
» e-business transactions make fraud easier to
commit. (Access everywhere and every time)
Opportunity
» they also make it much easier and faster to
detect. (electronic databases to analyse)
Focus On
more computer expertise
 Security through obscurity should be supported
by other tools.
 Standards based systems like VPNs, firewalls,
public and private, and other means should be
employed and monitored at all times.
 Regular audits of user behaviour on the system
should be done.
 Employees need to be trained on e-commerce
fraud.
E commerce fraud chapter 17 B Ahmed

More Related Content

What's hot

Computer crime
Computer crimeComputer crime
Computer crime
Uc Man
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
FCA - Future Chartered Accountants
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
Abhishek Hirapara
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
Mustufain Ahmed Ansari
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
Mumbai University
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
Mike Spaulding
 
Information security
Information securityInformation security
Information security
Laxmiprasad Bansod
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Phishing
PhishingPhishing
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Adeel Rasheed
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rafel Ivgi
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerce
abe8512000
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
Mary Rayme
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
sadaf tst
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
blogzilla
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
S.M.Mustofa Kauser
 

What's hot (20)

Computer crime
Computer crimeComputer crime
Computer crime
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
Information security
Information securityInformation security
Information security
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Phishing
PhishingPhishing
Phishing
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerce
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to E commerce fraud chapter 17 B Ahmed

Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
Network Intelligence India
 
Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentation
johnjamesahearn
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
cyberprosocial
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
Felix Maromo, CFE, CPFA, MSc
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentation
Mustapha Mugisa
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
Cybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to know
Cordium
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Protecting Your Trade Secrets
Protecting Your Trade SecretsProtecting Your Trade Secrets
Protecting Your Trade Secrets
ashishjoshi
 
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Lucien Pierce
 
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
PascalOtieno
 
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H..."Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
SkilCamp
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
Case IQ
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Improving and Implementing Internal Controls
Improving and Implementing Internal ControlsImproving and Implementing Internal Controls
Improving and Implementing Internal Controls
Tommy Seah
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
Michael Annis
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja
 

Similar to E commerce fraud chapter 17 B Ahmed (20)

Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentation
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentation
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Cybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to know
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Protecting Your Trade Secrets
Protecting Your Trade SecretsProtecting Your Trade Secrets
Protecting Your Trade Secrets
 
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
 
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
 
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H..."Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
"Unlocking Cybersecurity Fortitude: Exploring the Art and Ethics of Ethical H...
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Improving and Implementing Internal Controls
Improving and Implementing Internal ControlsImproving and Implementing Internal Controls
Improving and Implementing Internal Controls
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 

More from VidaB

Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by Emma
VidaB
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B Artika
VidaB
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by Rachel
VidaB
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
VidaB
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosures
VidaB
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory Fraud
VidaB
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet
VidaB
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud
VidaB
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud
VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
VidaB
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen
VidaB
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
VidaB
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud
VidaB
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraud
VidaB
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance services
VidaB
 

More from VidaB (16)

Chapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by EmmaChapter 16 bankruptcy, divorce and tax fraud by Emma
Chapter 16 bankruptcy, divorce and tax fraud by Emma
 
Chapter 16 B Artika
Chapter 16 B ArtikaChapter 16 B Artika
Chapter 16 B Artika
 
Chapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by RachelChapter 15Consumer Fraud by Rachel
Chapter 15Consumer Fraud by Rachel
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
 
Chapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosuresChapter 13 Inadequate disclosures
Chapter 13 Inadequate disclosures
 
Chapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory FraudChapter 12 B: Revenue And Inventory Fraud
Chapter 12 B: Revenue And Inventory Fraud
 
Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet Chapter 12:Revenue and Inventory Fraud by J Hachet
Chapter 12:Revenue and Inventory Fraud by J Hachet
 
Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud Chapter 11 b :Financial Statement fraud
Chapter 11 b :Financial Statement fraud
 
Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud  Chapter 11 a:Financial statement fraud
Chapter 11 a:Financial statement fraud
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen Chapter 8 investigating concealment david shen
Chapter 8 investigating concealment david shen
 
Chapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraudChapter 5:Recognizing the symptoms of fraud
Chapter 5:Recognizing the symptoms of fraud
 
Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud Chapter 3: Fighting Fraud
Chapter 3: Fighting Fraud
 
Chapter 1 the nature of fraud
Chapter 1 the nature of fraudChapter 1 the nature of fraud
Chapter 1 the nature of fraud
 
Week 1 audit and assurance services
Week 1 audit  and assurance servicesWeek 1 audit  and assurance services
Week 1 audit and assurance services
 

Recently uploaded

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

E commerce fraud chapter 17 B Ahmed

  • 1.
  • 2. - Understand what measures should be taken to prevent fraud in e-commerce. - Understand How to detect E-Business Fraud
  • 3. - Preventing E-C fraud involves reducing or eliminating the elements that motivate fraud. - Detecting E-C fraud needs more computer expertise
  • 4. 1. Security Through Obscurity 2. the control environment 3. risk assessment 4. control activities or Procedures 5. information and communication 6. monitoring
  • 5. 1. Security Through Obscurity Keeping security holes, encryption algorithms, and processes secret in an effort to confuse attackers.
  • 6. » The key to the front door is stashed under a rock nearby, or under the welcome mat. » It is right out in the open for the hackers to grab, but mostly he won't be able to find it without huge efforts of searching.
  • 7. 2. The Control Environment The components of the control environment  Integrity and Ethical Values  Board of Directors and Audit Committee Participation  Management’s Philosophy and Operating Style  Human Resources Policies and Practices
  • 8. tone at the top A repeated commitment from corporate leadership throughout the company to emphasize the importance to the company of compliance and ethical conduct, which is embraced and integrated into every level of business operations. Michael Volkov, Kreller Group, September 2012
  • 9. 3. Risk Assessment » Risk assessment identifies the risks of doing business with e-business partners. Focus on - the control environment of those organizations & - The electronic exchange of information and money.
  • 10. Procedures that counter the risk of  data theft  Sniffing  unauthorized access to passwords  falsified identity  Spoofing  customer impersonation  false Web sites  e-mail or Web site hijacking
  • 11. 4. Control Activities » control activities generally fall into the following five types: A. Adequate separation of duties. B. Proper authorization of transactions and activities. C. Adequate documents and records. D. Physical control over assets and records. E. Independent checks on performance.
  • 12. What control is useful for each example? 1.Employees forget or fail to follow procedures, or become careless. 2. locks on doors, 24-hour monitoring and safe storage space are examples of ….. 3. sales invoices, purchase orders, employee time cards in hard-copy and electronic form. 4. servers and computers access. 5. kickbacks and bribery, when one individual becomes too close to suppliers or customers.
  • 13. Video » Proper authorization of transactions and activities. Biometrics as an example. https://www.youtube.com/watch?v=eZTfgNIiNUA
  • 14. Remember. Chapter 6 Steps to proactive fraud examination: 1. Endeavour to understand the business or operation of the organization. 2. Identify what frauds can occur in the operation. 3. Determine the symptoms that the most likely frauds would generate. 4. Use databases and information systems to search for those 5. analyse the results, and investigate the symptoms to determine if they are being caused by actual fraud or by other factors.
  • 15. » Use technology to catch technology fraud. - fraud investigators who specialize in e- commerce should understand the tools and methods that perpetrators use. As - hacker tools could be use in troubleshoot networks and catch perpetrators rather than to hack into systems.
  • 16. » What skills are required to detect and investigate e-business fraud? 1. Web servers 2. E-mail clients and servers 3. intrusion programs like Nmap, Airsnort, and Wire shark
  • 17. What other skills are required to detect and investigate e-business fraud?
  • 18. Challenge » e-business transactions make fraud easier to commit. (Access everywhere and every time) Opportunity » they also make it much easier and faster to detect. (electronic databases to analyse) Focus On more computer expertise
  • 19.  Security through obscurity should be supported by other tools.  Standards based systems like VPNs, firewalls, public and private, and other means should be employed and monitored at all times.  Regular audits of user behaviour on the system should be done.  Employees need to be trained on e-commerce fraud.