SlideShare a Scribd company logo
1 of 2
Download to read offline
‫منع‬
‫االحتيال‬
‫في‬
‫التشفير‬
‫باستخدام‬
‫القياسات‬
‫الحيوية‬
‫ا‬ً‫ق‬‫وف‬
‫للسيد‬
‫بهاء‬
‫عبد‬
،‫الهادي‬
‫فإن‬
‫العملة‬
‫المشفرة‬
‫موجودة‬
‫في‬
‫األخبار‬
‫ومعظمها‬
‫ألسباب‬
.‫خاطئة‬
‫ومختلف‬
‫حاالت‬
‫المسائل‬
‫األمنية‬
‫جعلت‬
‫من‬
‫الضروري‬
‫اتخاذ‬
‫تدابير‬
‫ذات‬
‫حلول‬
‫جذرية‬
‫لمنع‬
‫االحتيال‬ .
‫المشكلة‬
‫في‬
‫العملة‬
‫المشفرة‬
‫هي‬
‫إخفاء‬
.‫الهوية‬
‫وقد‬
‫أدى‬
‫ذلك‬
‫إلى‬
‫محاولة‬
‫المحتالين‬
‫التالعب‬
‫في‬
‫عمليات‬
.‫االحتيال‬
‫قوة‬
‫العملة‬
‫المشفرة‬
‫هي‬
‫في‬
‫سلسلتها‬
،‫المغلقة‬
‫وهي‬
‫دفتر‬
‫أستاذ‬
‫ثابت‬
‫ومشترك‬
‫يسمح‬
‫بتسجيل‬
.‫المعامالت‬
‫فائدة‬
‫السلسلة‬
‫الغلقة‬
‫هي‬
‫أنه‬
‫ال‬
‫يمكن‬
‫التالعب‬
‫بسجالت‬
‫المعامالت‬
‫كما‬
‫اشار‬
‫بهاء‬
‫عبد‬
‫الهادي‬ .
‫يعمل‬
‫النظام‬
‫على‬
‫افتراض‬
‫أن‬
‫المعلومات‬
‫التي‬
‫تم‬
‫إدخالها‬
‫في‬
‫البداية‬
.‫دقيقة‬
‫إذا‬
‫كانت‬
‫المعلومات‬
‫األولية‬
‫غير‬
‫مشروعة‬
‫او‬
‫غير‬
،‫صحيحة‬
‫فيمكن‬
‫أن‬
‫تحتوي‬
‫المعامالت‬
‫الالحقة‬
‫بعد‬
‫ذلك‬
‫على‬
‫بيانات‬
.‫خاطئة‬
‫وهنا‬
‫يكمن‬
‫مربط‬
،‫الفرس‬
‫حيث‬
‫هذه‬
‫هي‬
‫الثغرة‬
‫التي‬
‫يركز‬
‫عليها‬
‫المحتالون‬ .
‫ماذا‬
‫يفعل‬
‫المحتالون؟‬
● ‫يقومون‬
‫بعملية‬
‫االستحواذ‬
‫على‬
‫الحساب‬
‫عن‬
‫طريق‬
‫استخدام‬
‫بيانات‬
‫االعتماد‬
‫المسروقة‬
‫لربط‬
‫حساب‬
‫الضحية‬
‫بحساب‬
‫التشفير‬.
● ‫ما‬
‫ان‬
‫يتم‬
،‫ذلك‬
‫يتحكم‬
‫المحتالون‬
‫اآلن‬
‫في‬
‫حساب‬
‫التشفير‬
‫وحساب‬
‫المصدر‬
‫في‬
‫آن‬
‫واحد‬ .
● ‫إنهم‬
‫يديرون‬
‫عمليات‬
‫احتيال‬
‫حيث‬
‫يقنعون‬
‫الناس‬
‫بتحويل‬
‫األموال‬
‫إلى‬
‫حسابات‬
‫التشفير‬
‫التي‬
‫تعد‬
‫بتقديم‬
.‫المنتجات‬
‫بمجرد‬
،‫الدفع‬
‫يفرون‬
‫باألموال‬ .
● ‫يتم‬
‫مهاجمة‬
‫أي‬
‫نقاط‬
‫ضعف‬
‫في‬
‫بورصات‬
‫العمالت‬
.‫المشفرة‬
‫يتيح‬
‫هذا‬
‫للمحتالين‬
‫سحب‬
‫األموال‬
‫التي‬
‫يتم‬
‫تحويلها‬
‫بين‬
‫محافظ‬
‫التشفير‬ .
● ‫عندما‬
‫يسرقون‬
‫أوراق‬
‫االعتماد‬
‫إلى‬
‫حسابات‬
،‫التشفير‬
‫فإنهم‬
‫يسحبون‬
‫األموال‬
‫من‬
‫تلك‬
‫الحسابات‬ .
‫ما‬
‫هو‬
‫الحل؟‬
‫يعتقد‬
‫بهاء‬
‫عبد‬
‫الهادي‬
‫أن‬
‫الحلول‬
‫البايومترية‬
‫ستلعب‬
‫ا‬ً‫دور‬
‫ًا‬‫م‬‫مه‬
‫في‬
‫تالفي‬
‫ومنع‬
‫مثل‬
‫هذا‬
.‫االحتيال‬
‫يمكن‬
‫بناء‬
‫مستويات‬
‫دفاع‬
‫مختلفة‬
‫لتأمين‬
‫النظام‬
‫ومنع‬
‫االحتيال‬ .
● ‫ستستخدم‬
‫أدوات‬
‫التحقق‬
‫من‬
‫الهوية‬
‫للتحقق‬
‫من‬
‫هوية‬
‫األفراد‬ .
● ‫يمكن‬
‫تحديد‬
‫السلوك‬
‫الشاذ‬
‫مثل‬
‫الحسابات‬
‫المستخدمة‬
‫من‬
‫جنوب‬
‫شرق‬
‫آسيا‬
‫لفتح‬
‫حسابات‬
‫في‬
‫المملكة‬
.‫المتحدة‬
،‫ًا‬‫ض‬‫أي‬
‫يفتح‬
‫المحتالون‬
‫العديد‬
‫من‬
‫الحسابات‬
‫في‬
‫وقت‬
.‫واحد‬
‫يمكن‬
‫تحديد‬
‫مثل‬
‫هذا‬
‫السلوك‬
‫من‬
‫خالل‬
‫األنظمة‬
‫الذكية‬ .
● ‫سيستخدم‬
‫تحليل‬
‫الشبكة‬
‫ذكاء‬ ISP ‫واستخبارات‬ IP ‫ومراقبة‬
‫أنماط‬
‫حركة‬
.‫المرور‬
‫هذا‬
‫من‬
‫شأنه‬
‫أن‬
‫يساعد‬
‫في‬
‫منع‬
‫االحتيال‬.
● ‫القياسات‬
‫الحيوية‬
‫السلوكية‬
‫هي‬
‫تدبير‬
‫واجراء‬
‫وقائي‬
‫مهم‬
‫لمنع‬
.‫االحتيال‬
‫يسمح‬
‫بفهم‬
‫كيفية‬
‫تشغيل‬
‫المستخدمين‬
.‫لألجهزة‬
‫هذا‬
‫يمكن‬
‫أن‬
‫يساعد‬
‫في‬
‫اكتشاف‬
‫االحتيال‬ .
● ‫يمكن‬
‫استخدام‬
‫بيانات‬
‫أرقام‬
‫الهواتف‬
‫المحمولة‬
‫وإشارات‬
‫الهاتف‬
‫المحمول‬
‫للتشغيل‬
‫والمصادقة‬ .
● ‫يمكن‬
‫التحقق‬
‫من‬
‫الوثائق‬
‫من‬
‫خالل‬
‫الفيديو‬
‫للتوثيق‬ .
● ‫يمكن‬
‫تحديد‬
‫أي‬
‫هجوم‬
‫منظم‬
‫باستخدام‬
‫تقنية‬
‫تحليل‬
‫الروابط‬ .
● ‫يمكن‬
‫لقدرات‬
‫رسم‬
‫الهوية‬
‫أن‬
‫تجمع‬
‫البيانات‬
‫الرقمية‬
‫وغير‬
‫الرقمية‬
‫ًا‬‫ع‬‫م‬
‫لفهم‬
‫نشاطها‬
‫في‬
‫أنظمة‬
‫التشفير‬
‫البيئية‬
‫المختلفة‬.
‫من‬
‫المهم‬
‫أن‬
‫يتم‬
‫تنفيذ‬
‫كل‬
‫هذه‬
‫دون‬
‫التأثير‬
‫على‬
‫راحة‬
.‫العمالء‬
‫ويجري‬
‫إدماج‬
‫البيانات‬
‫البايومترية‬
‫في‬
‫قطاعات‬
‫مختلفة‬
‫لتحديد‬
.‫الهوية‬
‫سيساعد‬
‫هذا‬
‫االجراء‬
‫في‬
‫زيادة‬
‫ثقة‬
‫العمالء‬ .

More Related Content

More from Bahaa Abdulhadi

Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBahaa Abdulhadi
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Bahaa Abdulhadi
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for HealthcareBahaa Abdulhadi
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Bahaa Abdulhadi
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) Bahaa Abdulhadi
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics Bahaa Abdulhadi
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric PatternsBahaa Abdulhadi
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric PatternsBahaa Abdulhadi
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in HealthcareBahaa Abdulhadi
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & SecurityBahaa Abdulhadi
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsBahaa Abdulhadi
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric PatternsBahaa Abdulhadi
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementBahaa Abdulhadi
 
Biometrics & Citizen Services
Biometrics & Citizen ServicesBiometrics & Citizen Services
Biometrics & Citizen ServicesBahaa Abdulhadi
 
Implementing Biometrics in Smart Cities
Implementing Biometrics in Smart CitiesImplementing Biometrics in Smart Cities
Implementing Biometrics in Smart CitiesBahaa Abdulhadi
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBahaa Abdulhadi
 
AI/ML in Wearable Biometric Analysis
AI/ML in Wearable Biometric AnalysisAI/ML in Wearable Biometric Analysis
AI/ML in Wearable Biometric AnalysisBahaa Abdulhadi
 
Wearable Biometrics and Data Privacy
Wearable Biometrics and Data PrivacyWearable Biometrics and Data Privacy
Wearable Biometrics and Data PrivacyBahaa Abdulhadi
 
Biometric Authentication on Wearable Devices
Biometric Authentication on Wearable DevicesBiometric Authentication on Wearable Devices
Biometric Authentication on Wearable DevicesBahaa Abdulhadi
 

More from Bahaa Abdulhadi (20)

Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of Security
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for Healthcare
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram)
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & Security
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric Patterns
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
 
BAHADI - AUG06.pdf
BAHADI - AUG06.pdfBAHADI - AUG06.pdf
BAHADI - AUG06.pdf
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
 
Biometrics & Citizen Services
Biometrics & Citizen ServicesBiometrics & Citizen Services
Biometrics & Citizen Services
 
Implementing Biometrics in Smart Cities
Implementing Biometrics in Smart CitiesImplementing Biometrics in Smart Cities
Implementing Biometrics in Smart Cities
 
Biometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart CitiesBiometrics: The Key to Securing Smart Cities
Biometrics: The Key to Securing Smart Cities
 
AI/ML in Wearable Biometric Analysis
AI/ML in Wearable Biometric AnalysisAI/ML in Wearable Biometric Analysis
AI/ML in Wearable Biometric Analysis
 
Wearable Biometrics and Data Privacy
Wearable Biometrics and Data PrivacyWearable Biometrics and Data Privacy
Wearable Biometrics and Data Privacy
 
Biometric Authentication on Wearable Devices
Biometric Authentication on Wearable DevicesBiometric Authentication on Wearable Devices
Biometric Authentication on Wearable Devices
 

مفهوم كلمة المرور.pdf