SlideShare a Scribd company logo
Holistic, Proactive, Real-time, Integrated
Approach of
Fraud & Risk Management system
Project Proposed & Developed By: Jerome Salecious J
Fraud & Risk Management Professional ,Expert & Domain Architect
PRO HAWK Highlights
Current Fraud & Risk Trend
3
4
5
Contents
2
1
Fraud & Risk Opportunities
PRO HAWK – Working Structure
Process Re-engineering
PRO HAWK - Highlights
Project Proposed & Developed By: Jerome Salecious J
Fraud & Risk Management Professional ,Expert & Domain Architect
PRO HAWK
Evolving the Fraud & Risk opportunity landscape around
the Banking, Financial, Non Financial & E-Commerce
Industries. And increase in Fraud & Risk related damages
and impacts requires Holistic Proactive Real-time
Integrated automated detection systems and Robust the
fraud defense processes & Mechanisms.
PRO HAWK linked and integrated with required sources
and apply dynamic profiling techniques for every
transactions, based on Fraud and Risk scoring
methodology.
PRO HAWK is full pack detection system , its developed
based on most effective technical paraphernalia and
strategic methods to deal with Fraud & Risk . Selecting the
right frame work and seamless integration on
Bank/Financial systems to safeguard the business and
customer interests.
Reputation of
Risk
Regulatory
Compliance
Loss Protection
Proactive &
Real-time
Monitoring
Process
Reengineering
Current Fraud & Risk Trend
Who Is Fraudster?
A fraudster is one that commits fraud. It might be a person or an organization. However, it is very practicable to
profile the fraudster personal characteristics and features of the organization environment that fraudsters thrive.
What KPMG Survey Says:
The perpetrator of the fraud trends to be male between the ages 36 and 55, working with the victim organization
more than 6 years and holding an executive position in operation, finance or general management .
It means there is no limit & level for the fraudster.
Fraudster
Outside the
Organization
Internal
Employee
Vendor /
Business
Partner
Customer
Merchant
Fraudster HooksFraudster Sources
Non Effective KYC
Non Validating
Documents
Non update of
customer profile
Inadequate
Dedupe /
Precheck Process
Failure in Blacklist
Management
Bio Metric
identity
Twin / Siblings /
Marital status info
No Address
Verification
No Customer
Background
Verification
Customer
personal Info
Mobile, & Digital
Devices
Computer &
Laptops
Personal Dairy /
Notes
Account details
Physical Survey
Copies of
document
Failure of InfoSec
Hacking the
Server
Password Sharing
Password Hacking
Loose Password
Unauthorized
Access
Data Leakage –
Integrity
Delay in Response
Non Monitor -
Interaction
Management
Ineffective
Communication
Un availability
contact Info
Wrong Contact
Info
Partial Contact
Info
Mismatch
Information
Manual Error –
Contact Info
Delay in
communication
Social Media Info
E-Commerce &
Online Shopping
LinkedIn,
Facebook, Twitter
etc..
Matrimony & Job
Portals
Chat & Dating
Games
Black Market
Solutions
Bug Apps
Phishing Website
Inefficient FRM
tool
Outdated
Configurations
Limited
Configuration
Delay in
Identification
Process
Loopholes
Non Effective
Rule
Management
Atomistic FRM
tool
Telecalling,
Phishing Emails &
SMS
Job Offer –
Resume
Collection
Lottery
Reward
Donation
Online Survey
Honey Trap
Internal
Resources
Internal Employee
Business Partner
Vendors
Information's
Sources
Mobile & Digital Device Computer & Laptop Dairies & Personal Note BUG APP Survey Resume Email
Customer Address Proof     
Customer Identity Proof     
Family Information       
Personal Information       
Contact Information       
Account Number      
Customer ID     
User ID's     
PIN Numbers    
Passwords    
User ID's    
Operation Procedures      
Operation Updates      
Social Media Accounts       
Customer Queries     
Resume     
Email    
SMS  
Fraudster Information Source
9 of 94
PRO HAWK – Working Structure
PRO HAWK
Blacklist
Data
Pattern /
Behavior
Data
Simswap /
Clone,
Mobile
number
change Data
Geotag Data
Amount
Deposit Data
Unused
Account/
Unclaimed
Amount
Data
Unauthorized
Status
Change
Unauthorized
Access
Customer
Information
Access Data
Dispute /
Refund Data
Failure
Attempt
Data
PRO HAWK System Integration
PRO HAWK
Blacklist Data
Pattern / Behavior Data
Simswap/Clone, Mobile number change Data
Geotag Data
Amount Deposit Data
Unused Account / Unclaimed Amount Data
Unauthorized Status Change Data
Unauthorized Access– Info Sec
Customer Information Access Data
Dispute / Refund Data
Failure Attempt Data
Customer
POS / PG
Acquirer Bank
Association
Issuer Bank
PRO HAWK – How it work?
1
2
3
45
6
7
8
1A
4A
6A
F&R Avenues
PRO HAWK – Fraud & Risk Score
Transaction Initiation
PRO HAWK Validate the
transaction
PRO HAWK generate the F&R
score
Transaction will Approve /
Reject Or Additional
confirmation need to approve
• Transaction Count slightly high
• Transaction value slightly increased
Risk Score – 0 to 20 - Approve
• Previous transaction is failed due to wrong pin
• Customer called Customer care but call disconnected
Risk Score 21 to 35 - Approve
• MAC address is differ – OTP or customer need to confirm the
identity
• High value amount deposited in customer account.
Risk Score 36 to 50 – Additional
Confirmation Required from customer
• Previous and current transaction initiated location are differ and
distance between two location is huge and it very difficult to
cover the distance with in short time.
Risk Score 51 to 60 - Reject
• Transaction initiated from blacklisted MAC address.
• With in the short time previously two more transaction initiated
from same customer
Risk Score greater than 60 – Reject
Raise the fraud protocol
13 of 94
Fraud & Risk Avenues
Fraud Customer Profile
Fraud Impact
Information
Name, Account &
Location
Email & Contact
numbers
Social Media accounts
Cards and Account
transfer information's
Fraud Merchant Profile
Fraud Impact
Information
Name & Location
Email & Contact
numbers
Social Media accounts
Cards and Account
transfer information's
Digital Fingerprint
IP & Geo Tag
information
MAC address
IMEI number
Mobile /SIM Number
PoS / Electronic device
Unique device number
Blacklist Data
• Every new fraud or suspected details will be add in blacklisted base.
• Refreshed blacklisted base help to stop, reduce & control the fraud impact & damage
• Blacklisted base will be refresh multiple times in a day.
Pattern / Behavior Data
Sequential patterns Data is one of data mining technique that seeks to discover or
identify analogous patterns, progressions and general trends in transactions and
mode of transaction over a business period. Data leads to discovery of various
hidden trends, which is highly predictive of future events.
Account / Transaction Pattern
• Rule Alert Mechanism
• Customer Threshold and
categorization
• Merchant Threshold and
categorization
• Customer account management
• Multi Frequency - Transaction count
and value
• Multi Frequency - Mode of
transaction
• Device & location Information
Fraud Behavior Pattern - Dynamic
• Transaction initiated similar to
previous Modus operandi of fraud.
• Changes in customer profile
information
• Changes in customer contact
information
• Changes in customer location
• Abnormal Transaction trend
• Opportunity on split transaction
SIMswap/clone, Mobile number change Data
• Fraudster not allow the any information to reach customer during the fraud attack.
• Fraudster change or disconnect the customer communication purposely from the institute.
• RBI & TRAI should come to work collaboratively.
• Bank or Institute share the customer mobile number details to mobile operators.
• There is any changes in Mobile number or SIM, mobile operator not allow any incoming SMS service for 24 hours.
• And mobile operator share the report to Bank / Institute on regular frequencies.
Transaction Initiation
• Transaction initiated after
Mobile or SIM change
• Mobile operator share
the details to Bank /
Institute
Pro Hawk
• Dual Confirmation
required
• Validating other Risk
opportunity
• Arriving Risk Scores
F&R Risk Score
• Approve Transaction –
Low Risk
• Dual Confirmation –
Medium Risk
• Reject – High Risk & raise
the fraud protocol.
Geotag Data
• Geotag must be capture for all transaction initiations and enquiries over the phone or direct.
• Geotag helps to arrive the customer transaction pattern.
• Customer information hacked by the fraudster then fraud abuse can initiate from any global location.
• And the transaction initiated from two different location , within short time period.
• Even the distance not covered by fasted mode of travel it should be triggered in Pro Hawk.
• F&R score derived based on customer categorization and frequent travel mode.
• Geotag information can collected from PoS device and IP location.
Transaction Initiated
• Within short time or consecutive transaction initiated from different
locations.
• Fraudster creating or created the impact, Geotag information
required for further investigation.
Pro Hawk
• Dual Confirmation required
• Validating other Risk opportunity
• Arriving Risk Scores
F&R Risk Score
• Approve Transaction – Low Risk
• Dual Confirmation – Medium Risk
• Reject – High Risk & raise the fraud protocol
Amount deposit
• High Value
Amount deposit
• Amount
Transferred
from some
other accounts.
Transaction
Initiation
• Failure attempts
of ATM PIN /
Net Banking PIN
/ OTP / GRID
• Transaction
Initiated within
short time.
• Transaction
initiated from
different
location
• Change in
Customer
profile and
communication.
PRO HAWK
• Validate the
transaction with
other channel
reports.
• Validating the
risk opportunity
• Arriving the F&R
Score
F&R Score
• Approve
Transaction –
Low Risk
• Dual
Confirmation –
Medium Risk
• Reject – High
Risk & raise the
fraud protocol.
• After cash deposit or amount transfer most of the fraud attempts are happening to
transfer the amount to other accounts.
• Fraudster will wait for the right moment with available resource & information.
• Fraudster purposely do some changes in customer communication information.
Amount Deposit Data
Unused Account & Unclaimed Amount Data
• Unused Account: If any active account not used for long time for any transaction purpose, with or without balance of amount.
• Unclaimed Amount: If amount not claimed or not utilized for any transaction for a longtime from a customer or Bank /
Institute suspense account.
• Mostly these type of fraud abuse done by Internal employees or vendors who have access to customer account information.
• Internal employees and Vendors know the process and loophole to claim the amount or use the account.
• Unused customer active account or old account may be used for fraud abuse, illegal money deposit / transfer without
customer knowledge.
Transaction Initiation
Transaction initiated
after long time
Any customer service
request raised
Changes in profile and
communication info
Repeated interaction
Failure attempts
Pro Hawk
Dual Confirmation
required
Validating other Risk
opportunity
Arriving Risk Scores
F&R Score
Approve Transaction –
Low Risk
Dual Confirmation –
Medium Risk
Reject – High Risk &
raise the fraud
protocol.
Unauthorized Status Change Data
Unauthorized Status Change: Bank or Institute maintain “N” number of processes status to categorize the customer and account .
If there is any status changes happened unauthorized manner its called Unauthorized status change.
 Mostly these type of fraud abuse & non compliance done by Internal employees or vendors who have access to customer account
information.
 Otherwise fraudster may hack the Bank or institute system from outside and do the unauthorized access.
 For example due to risk prospective or proactive manner the customer account status tagged under Block, Closed, Inactive or
Freeze.
 If any one change the status to active in unauthorized way and initiated any transaction it will be capture in PRO HAWK.
Transaction Initiation
• If there is any transaction
initiated status changed account
PRO HAWK
• Validate the transaction with
other channel reports.
• Validating the risk opportunity
• Arriving the F&R Score
F&R Score
• Approve Transaction – Low Risk
• Dual Confirmation – Medium
Risk
• Reject – High Risk & raise the
fraud protocol.
Unauthorized Access Data
Unauthorized Access: To create the fraud impact, if there is any repeated interaction on any customer account by single user id or
multiple user id in same or different location.
 Mostly these type of fraud abuse & non compliance done by Internal employees or vendors who have access to customer account
information.
 Otherwise fraudster may hack the Bank or institute system from outside and do the unauthorized access.
• If there is any of the transaction initiated from those accounts it will be captured in PRO HAWK.
F&RScore
PROHAWK
TransactionInitiationMultiple
interaction in
single account
by single ID
and
transaction
initiated on
the account
Multiple
interaction in
single account
by multiple ID
and
transaction
initiated on
the account
Validate the
transaction
with other
channel
reports.
Validating the
risk
opportunity
Arriving the
F&R Score
Approve
Transaction –
Low Risk
Dual
Confirmation –
Medium Risk
Reject – High
Risk & raise
the fraud
protocol.
Customer Information access Data
Transaction
Initiation
• Transaction initiated fraud enquiry account.
PRO HAWK
• Validate the transaction with other channel reports.
• Validating the risk opportunity
• Arriving the F&R Score
F&R Score
• Approve Transaction – Low Risk
• Dual Confirmation – Medium Risk
• Reject – High Risk & raise the fraud protocol.
Customer Information Access Data: Fraudster call customer care or visit the Bank / Institute directly with limited or without
information about customer and to get more information about customer or customer account.
• Employee or customer care unit tagged information about the enquiry on respective account.
• Transaction initiated from these accounts it will be capture in PRO HAWK
Dispute / Refund Data
If any fraudster or customer aware about the benefit of chargeback
dispute or other dispute or refund, and initiated the any transaction
to get one more benefit from the institute. it will be triggered and
alerted in PRO HAWK.
• Duplicate Dispute / Refund
Request
• Same Merchant
• Less value transaction
• From same failure network
& device
Transaction Initiation
• Validate the transaction
information
• Validating other Risk
opportunity
• Arriving Risk Scores
PRO HAWK
• Approve Transaction – Low
Risk
• Dual Confirmation –
Medium Risk
• Reject – High Risk & raise
the fraud protocol.
F&R Score
Failure attempt Data
• Every failure alerts are warning sign to the institute.
• Failure attempts are leads to the Fraud and Risk Management team.
• User ID failed to login and there is changes happened in customer
account / profile or raising the service request.
• All failure attempts to be rigorously monitored.
Failure Attempts
• ATM / IPIN attempt
• Net banking password
• Grid / OTP attempt
• Failure to confirm
identity – Bank
• Failure to confirm
identity – customer
care
Transaction Initiation
• Transaction initiated
after failure attempt
• Transaction Initiated
within short time.
• Transaction initiated
from different location
• Changes in Customer
profile and
communication
PRO HAWK
• Validate the transaction
with other channel
reports.
• Validating the risk
opportunity
• Arriving the F&R Score
F&R Score
• Approve Transaction –
Low Risk
• Dual Confirmation –
Medium Risk
• Reject – High Risk &
raise the fraud
protocol.
Process Reengineering
Fraud & Risk Process Reengineering
• Fraud & Risk control mechanism is not a standard one, it’s a dynamic and it can change over the period.
• Fraud & Risk take different dimension based on process effectiveness & control of the system, New Technology and Knowledge of
the fraudster.
• The process reengineering is most important for Fraud & Risk Management team and process.
• Process Reengineering involves the radical redesign of the processes to achieve dramatic improvements in control the fraud
attack and reducing the fraud impact with in short time.
Control the Fraud
& Take Action
Collect –
Fraud Impact
Info
Root Cause
AnalysisIdentify the
Fraud
Derive – Modus
Operandi
Process
Reengineering
Risk
Assessment
Validating Existing
Controls
Thank You
Project Proposed & Developed By: Jerome Salecious J
Fraud & Risk Management Professional ,Expert & Domain Architect

More Related Content

Viewers also liked

Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
тестовая презентация
тестовая презентациятестовая презентация
тестовая презентацияwinterlady
 
Datos personales patricia
Datos personales patriciaDatos personales patricia
Datos personales patricia
Patricia Bonilla
 
Земля наш общий дом
Земля наш общий домЗемля наш общий дом
Земля наш общий дом
Валентина Леонтьева
 
Lendas de origem Africanas - A Mula Sem Cabeça
Lendas de origem Africanas - A Mula Sem CabeçaLendas de origem Africanas - A Mula Sem Cabeça
Lendas de origem Africanas - A Mula Sem Cabeça
Emef25
 
Photo story
Photo storyPhoto story
Brosura SCIENT ANALYTICS
Brosura SCIENT ANALYTICSBrosura SCIENT ANALYTICS
Brosura SCIENT ANALYTICSIon Radu
 
Universalismo crstico apostila - 010 - 2011 - lar (1)
Universalismo crstico   apostila - 010 - 2011 - lar (1)Universalismo crstico   apostila - 010 - 2011 - lar (1)
Universalismo crstico apostila - 010 - 2011 - lar (1)
Instituto de Psicobiofísica Rama Schain
 
Unidad 5 termodinamica
Unidad 5 termodinamicaUnidad 5 termodinamica
Unidad 5 termodinamica
careto12
 
Psiquiatria - Drogas Definição
Psiquiatria - Drogas DefiniçãoPsiquiatria - Drogas Definição
Psiquiatria - Drogas Definição
Adriana Bonadia dos Santos
 
A Notade500 Euros
A Notade500 EurosA Notade500 Euros
A Notade500 Euros
Armin Caldas
 
Ficha tecnica
Ficha tecnicaFicha tecnica
Ficha tecnica
Hernan Serrato
 
کاشت موی استانبول
کاشت موی استانبولکاشت موی استانبول
کاشت موی استانبول
کاشت مو و زیبایی ترکیه
 
Escalofriante realidad Area 51
Escalofriante realidad Area 51Escalofriante realidad Area 51
Escalofriante realidad Area 51
0 agape
 
Actividad n 01_1_edgar (2)
Actividad n 01_1_edgar (2)Actividad n 01_1_edgar (2)
Actividad n 01_1_edgar (2)
Gledsi
 
Emergenetics Jim Sohl Profile November 2010
Emergenetics Jim Sohl Profile November 2010Emergenetics Jim Sohl Profile November 2010
Emergenetics Jim Sohl Profile November 2010
jimsohl
 
Fraud risk management lahore oct 15
Fraud risk management lahore oct 15Fraud risk management lahore oct 15
Fraud risk management lahore oct 15
Tahir Abbas
 
Machine Learning Experimentation at Sift Science
Machine Learning Experimentation at Sift ScienceMachine Learning Experimentation at Sift Science
Machine Learning Experimentation at Sift Science
Sift Science
 

Viewers also liked (18)

Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 
тестовая презентация
тестовая презентациятестовая презентация
тестовая презентация
 
Datos personales patricia
Datos personales patriciaDatos personales patricia
Datos personales patricia
 
Земля наш общий дом
Земля наш общий домЗемля наш общий дом
Земля наш общий дом
 
Lendas de origem Africanas - A Mula Sem Cabeça
Lendas de origem Africanas - A Mula Sem CabeçaLendas de origem Africanas - A Mula Sem Cabeça
Lendas de origem Africanas - A Mula Sem Cabeça
 
Photo story
Photo storyPhoto story
Photo story
 
Brosura SCIENT ANALYTICS
Brosura SCIENT ANALYTICSBrosura SCIENT ANALYTICS
Brosura SCIENT ANALYTICS
 
Universalismo crstico apostila - 010 - 2011 - lar (1)
Universalismo crstico   apostila - 010 - 2011 - lar (1)Universalismo crstico   apostila - 010 - 2011 - lar (1)
Universalismo crstico apostila - 010 - 2011 - lar (1)
 
Unidad 5 termodinamica
Unidad 5 termodinamicaUnidad 5 termodinamica
Unidad 5 termodinamica
 
Psiquiatria - Drogas Definição
Psiquiatria - Drogas DefiniçãoPsiquiatria - Drogas Definição
Psiquiatria - Drogas Definição
 
A Notade500 Euros
A Notade500 EurosA Notade500 Euros
A Notade500 Euros
 
Ficha tecnica
Ficha tecnicaFicha tecnica
Ficha tecnica
 
کاشت موی استانبول
کاشت موی استانبولکاشت موی استانبول
کاشت موی استانبول
 
Escalofriante realidad Area 51
Escalofriante realidad Area 51Escalofriante realidad Area 51
Escalofriante realidad Area 51
 
Actividad n 01_1_edgar (2)
Actividad n 01_1_edgar (2)Actividad n 01_1_edgar (2)
Actividad n 01_1_edgar (2)
 
Emergenetics Jim Sohl Profile November 2010
Emergenetics Jim Sohl Profile November 2010Emergenetics Jim Sohl Profile November 2010
Emergenetics Jim Sohl Profile November 2010
 
Fraud risk management lahore oct 15
Fraud risk management lahore oct 15Fraud risk management lahore oct 15
Fraud risk management lahore oct 15
 
Machine Learning Experimentation at Sift Science
Machine Learning Experimentation at Sift ScienceMachine Learning Experimentation at Sift Science
Machine Learning Experimentation at Sift Science
 

Similar to PRO HAWK - Holistic, Proactive, Real-time, Integrated Approach of Fraud & Risk Management system

Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
European Merchant Services
 
PragmasysConsulting
PragmasysConsultingPragmasysConsulting
PragmasysConsulting
Manish Raghuvanshi
 
EFT.ppt
EFT.pptEFT.ppt
EFT.ppt
DimpyJindal4
 
PayU Biz Product Deck (1)
PayU Biz Product Deck (1)PayU Biz Product Deck (1)
PayU Biz Product Deck (1)
ICICI Bank
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
Ashraf Bashir
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Christopher Uriarte
 
Introducing: Powered by Avant and AvantVerify
Introducing: Powered by Avant and AvantVerify Introducing: Powered by Avant and AvantVerify
Introducing: Powered by Avant and AvantVerify
Kevin Lewis
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance Workshop
Parcus Group
 
Commercial Fraud
Commercial FraudCommercial Fraud
Commercial Fraud
epacey
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
Kartik Mehta
 
Falcon 012009
Falcon 012009Falcon 012009
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
Kartik Mehta
 
Managing complaints from electronic frauds and achieving customers
Managing complaints from electronic frauds and achieving customersManaging complaints from electronic frauds and achieving customers
Managing complaints from electronic frauds and achieving customers
Talent Ajieh
 
Payments 2015 01-29
Payments 2015 01-29Payments 2015 01-29
Payments 2015 01-29
Infor
 
CRIF Products Fraud Model
CRIF Products Fraud ModelCRIF Products Fraud Model
CRIF Products Fraud Model
Lawrence Billson
 
Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2
Sam Monarch
 
Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017
Chanchal Chatterjee
 
pravin ghatage
pravin ghatagepravin ghatage
pravin ghatage
pravin ghatage
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
Vesta Corporation
 
Active Insight Overview
Active Insight OverviewActive Insight Overview
Active Insight Overview
Mike Telem
 

Similar to PRO HAWK - Holistic, Proactive, Real-time, Integrated Approach of Fraud & Risk Management system (20)

Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
 
PragmasysConsulting
PragmasysConsultingPragmasysConsulting
PragmasysConsulting
 
EFT.ppt
EFT.pptEFT.ppt
EFT.ppt
 
PayU Biz Product Deck (1)
PayU Biz Product Deck (1)PayU Biz Product Deck (1)
PayU Biz Product Deck (1)
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
 
Introducing: Powered by Avant and AvantVerify
Introducing: Powered by Avant and AvantVerify Introducing: Powered by Avant and AvantVerify
Introducing: Powered by Avant and AvantVerify
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance Workshop
 
Commercial Fraud
Commercial FraudCommercial Fraud
Commercial Fraud
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Managing complaints from electronic frauds and achieving customers
Managing complaints from electronic frauds and achieving customersManaging complaints from electronic frauds and achieving customers
Managing complaints from electronic frauds and achieving customers
 
Payments 2015 01-29
Payments 2015 01-29Payments 2015 01-29
Payments 2015 01-29
 
CRIF Products Fraud Model
CRIF Products Fraud ModelCRIF Products Fraud Model
CRIF Products Fraud Model
 
Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2Collaborate_VPASession_CSC_GRC_FINAL v2
Collaborate_VPASession_CSC_GRC_FINAL v2
 
Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017
 
pravin ghatage
pravin ghatagepravin ghatage
pravin ghatage
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
 
Active Insight Overview
Active Insight OverviewActive Insight Overview
Active Insight Overview
 

Recently uploaded

Budgeting as a Control Tool in Govt Accounting in Nigeria Prof Oyedokun.pptx
Budgeting as a Control Tool in Govt Accounting in Nigeria Prof Oyedokun.pptxBudgeting as a Control Tool in Govt Accounting in Nigeria Prof Oyedokun.pptx
Budgeting as a Control Tool in Govt Accounting in Nigeria Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
Alexander Belyaev
 
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docxTiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
lamluanvan.net Viết thuê luận văn
 
China's Investment Leader - Dr. Alyce SU
China's Investment Leader - Dr. Alyce SUChina's Investment Leader - Dr. Alyce SU
China's Investment Leader - Dr. Alyce SU
msthrill
 
Accounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptxAccounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptx
TIZITAWMASRESHA
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
asukqco
 
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
28xo7hf
 
PM pre reads for the product manager framework
PM pre reads for the product manager frameworkPM pre reads for the product manager framework
PM pre reads for the product manager framework
KishoreKatta6
 
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
mukeshomran942
 
Chapter 25: Economic Growth Summary from Samuelson and Nordhaus
Chapter 25: Economic Growth Summary from Samuelson and NordhausChapter 25: Economic Growth Summary from Samuelson and Nordhaus
Chapter 25: Economic Growth Summary from Samuelson and Nordhaus
iraangeles4
 
Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike BaumannNavigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
mikebaumannfinancial
 
Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]
Commonwealth
 
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdfSeeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Ashis Kumar Dey
 
Call Girls Chennai 8824825030 Independent Call Girl Service Chennai
Call Girls Chennai 8824825030 Independent Call Girl Service ChennaiCall Girls Chennai 8824825030 Independent Call Girl Service Chennai
Call Girls Chennai 8824825030 Independent Call Girl Service Chennai
namratasinha41
 
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
Neil Day
 
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7 Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
shaankumar98663
 
Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)Economic trends from a business point of view (May 2024)
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
yeuwffu
 
Fabular Frames and the Four Ratio Problem
Fabular Frames and the Four Ratio ProblemFabular Frames and the Four Ratio Problem
Fabular Frames and the Four Ratio Problem
Majid Iqbal
 
Singapore 2024 Sustainability Slides.pdf
Singapore 2024 Sustainability Slides.pdfSingapore 2024 Sustainability Slides.pdf
Singapore 2024 Sustainability Slides.pdf
International Federation of Accountants
 

Recently uploaded (20)

Budgeting as a Control Tool in Govt Accounting in Nigeria Prof Oyedokun.pptx
Budgeting as a Control Tool in Govt Accounting in Nigeria Prof Oyedokun.pptxBudgeting as a Control Tool in Govt Accounting in Nigeria Prof Oyedokun.pptx
Budgeting as a Control Tool in Govt Accounting in Nigeria Prof Oyedokun.pptx
 
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
Calculation of compliance cost: Veterinary and sanitary control of aquatic bi...
 
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docxTiểu luận: PURPOSE OF BUDGETING IN SME.docx
Tiểu luận: PURPOSE OF BUDGETING IN SME.docx
 
China's Investment Leader - Dr. Alyce SU
China's Investment Leader - Dr. Alyce SUChina's Investment Leader - Dr. Alyce SU
China's Investment Leader - Dr. Alyce SU
 
Accounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptxAccounting Information Systems (AIS).pptx
Accounting Information Systems (AIS).pptx
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
 
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
 
PM pre reads for the product manager framework
PM pre reads for the product manager frameworkPM pre reads for the product manager framework
PM pre reads for the product manager framework
 
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
 
Chapter 25: Economic Growth Summary from Samuelson and Nordhaus
Chapter 25: Economic Growth Summary from Samuelson and NordhausChapter 25: Economic Growth Summary from Samuelson and Nordhaus
Chapter 25: Economic Growth Summary from Samuelson and Nordhaus
 
Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike BaumannNavigating Your Financial Future: Comprehensive Planning with Mike Baumann
Navigating Your Financial Future: Comprehensive Planning with Mike Baumann
 
Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]
 
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdfSeeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
 
Call Girls Chennai 8824825030 Independent Call Girl Service Chennai
Call Girls Chennai 8824825030 Independent Call Girl Service ChennaiCall Girls Chennai 8824825030 Independent Call Girl Service Chennai
Call Girls Chennai 8824825030 Independent Call Girl Service Chennai
 
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
 
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7 Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
Call Girls Bangalore 9024918724 Verified Service Available Near Me 24x7
 
Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)Economic trends from a business point of view (May 2024)
Economic trends from a business point of view (May 2024)
 
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
快速办理(RWTH毕业证书)德国亚琛工业大学毕业证录取通知书一模一样
 
Fabular Frames and the Four Ratio Problem
Fabular Frames and the Four Ratio ProblemFabular Frames and the Four Ratio Problem
Fabular Frames and the Four Ratio Problem
 
Singapore 2024 Sustainability Slides.pdf
Singapore 2024 Sustainability Slides.pdfSingapore 2024 Sustainability Slides.pdf
Singapore 2024 Sustainability Slides.pdf
 

PRO HAWK - Holistic, Proactive, Real-time, Integrated Approach of Fraud & Risk Management system

  • 1. Holistic, Proactive, Real-time, Integrated Approach of Fraud & Risk Management system Project Proposed & Developed By: Jerome Salecious J Fraud & Risk Management Professional ,Expert & Domain Architect
  • 2. PRO HAWK Highlights Current Fraud & Risk Trend 3 4 5 Contents 2 1 Fraud & Risk Opportunities PRO HAWK – Working Structure Process Re-engineering
  • 3. PRO HAWK - Highlights Project Proposed & Developed By: Jerome Salecious J Fraud & Risk Management Professional ,Expert & Domain Architect
  • 4. PRO HAWK Evolving the Fraud & Risk opportunity landscape around the Banking, Financial, Non Financial & E-Commerce Industries. And increase in Fraud & Risk related damages and impacts requires Holistic Proactive Real-time Integrated automated detection systems and Robust the fraud defense processes & Mechanisms. PRO HAWK linked and integrated with required sources and apply dynamic profiling techniques for every transactions, based on Fraud and Risk scoring methodology. PRO HAWK is full pack detection system , its developed based on most effective technical paraphernalia and strategic methods to deal with Fraud & Risk . Selecting the right frame work and seamless integration on Bank/Financial systems to safeguard the business and customer interests. Reputation of Risk Regulatory Compliance Loss Protection Proactive & Real-time Monitoring Process Reengineering
  • 5. Current Fraud & Risk Trend
  • 6. Who Is Fraudster? A fraudster is one that commits fraud. It might be a person or an organization. However, it is very practicable to profile the fraudster personal characteristics and features of the organization environment that fraudsters thrive. What KPMG Survey Says: The perpetrator of the fraud trends to be male between the ages 36 and 55, working with the victim organization more than 6 years and holding an executive position in operation, finance or general management . It means there is no limit & level for the fraudster. Fraudster Outside the Organization Internal Employee Vendor / Business Partner Customer Merchant
  • 7. Fraudster HooksFraudster Sources Non Effective KYC Non Validating Documents Non update of customer profile Inadequate Dedupe / Precheck Process Failure in Blacklist Management Bio Metric identity Twin / Siblings / Marital status info No Address Verification No Customer Background Verification Customer personal Info Mobile, & Digital Devices Computer & Laptops Personal Dairy / Notes Account details Physical Survey Copies of document Failure of InfoSec Hacking the Server Password Sharing Password Hacking Loose Password Unauthorized Access Data Leakage – Integrity Delay in Response Non Monitor - Interaction Management Ineffective Communication Un availability contact Info Wrong Contact Info Partial Contact Info Mismatch Information Manual Error – Contact Info Delay in communication Social Media Info E-Commerce & Online Shopping LinkedIn, Facebook, Twitter etc.. Matrimony & Job Portals Chat & Dating Games Black Market Solutions Bug Apps Phishing Website Inefficient FRM tool Outdated Configurations Limited Configuration Delay in Identification Process Loopholes Non Effective Rule Management Atomistic FRM tool Telecalling, Phishing Emails & SMS Job Offer – Resume Collection Lottery Reward Donation Online Survey Honey Trap Internal Resources Internal Employee Business Partner Vendors
  • 8. Information's Sources Mobile & Digital Device Computer & Laptop Dairies & Personal Note BUG APP Survey Resume Email Customer Address Proof      Customer Identity Proof      Family Information        Personal Information        Contact Information        Account Number       Customer ID      User ID's      PIN Numbers     Passwords     User ID's     Operation Procedures       Operation Updates       Social Media Accounts        Customer Queries      Resume      Email     SMS   Fraudster Information Source
  • 9. 9 of 94 PRO HAWK – Working Structure
  • 10. PRO HAWK Blacklist Data Pattern / Behavior Data Simswap / Clone, Mobile number change Data Geotag Data Amount Deposit Data Unused Account/ Unclaimed Amount Data Unauthorized Status Change Unauthorized Access Customer Information Access Data Dispute / Refund Data Failure Attempt Data PRO HAWK System Integration
  • 11. PRO HAWK Blacklist Data Pattern / Behavior Data Simswap/Clone, Mobile number change Data Geotag Data Amount Deposit Data Unused Account / Unclaimed Amount Data Unauthorized Status Change Data Unauthorized Access– Info Sec Customer Information Access Data Dispute / Refund Data Failure Attempt Data Customer POS / PG Acquirer Bank Association Issuer Bank PRO HAWK – How it work? 1 2 3 45 6 7 8 1A 4A 6A F&R Avenues
  • 12. PRO HAWK – Fraud & Risk Score Transaction Initiation PRO HAWK Validate the transaction PRO HAWK generate the F&R score Transaction will Approve / Reject Or Additional confirmation need to approve • Transaction Count slightly high • Transaction value slightly increased Risk Score – 0 to 20 - Approve • Previous transaction is failed due to wrong pin • Customer called Customer care but call disconnected Risk Score 21 to 35 - Approve • MAC address is differ – OTP or customer need to confirm the identity • High value amount deposited in customer account. Risk Score 36 to 50 – Additional Confirmation Required from customer • Previous and current transaction initiated location are differ and distance between two location is huge and it very difficult to cover the distance with in short time. Risk Score 51 to 60 - Reject • Transaction initiated from blacklisted MAC address. • With in the short time previously two more transaction initiated from same customer Risk Score greater than 60 – Reject Raise the fraud protocol
  • 13. 13 of 94 Fraud & Risk Avenues
  • 14. Fraud Customer Profile Fraud Impact Information Name, Account & Location Email & Contact numbers Social Media accounts Cards and Account transfer information's Fraud Merchant Profile Fraud Impact Information Name & Location Email & Contact numbers Social Media accounts Cards and Account transfer information's Digital Fingerprint IP & Geo Tag information MAC address IMEI number Mobile /SIM Number PoS / Electronic device Unique device number Blacklist Data • Every new fraud or suspected details will be add in blacklisted base. • Refreshed blacklisted base help to stop, reduce & control the fraud impact & damage • Blacklisted base will be refresh multiple times in a day.
  • 15. Pattern / Behavior Data Sequential patterns Data is one of data mining technique that seeks to discover or identify analogous patterns, progressions and general trends in transactions and mode of transaction over a business period. Data leads to discovery of various hidden trends, which is highly predictive of future events. Account / Transaction Pattern • Rule Alert Mechanism • Customer Threshold and categorization • Merchant Threshold and categorization • Customer account management • Multi Frequency - Transaction count and value • Multi Frequency - Mode of transaction • Device & location Information Fraud Behavior Pattern - Dynamic • Transaction initiated similar to previous Modus operandi of fraud. • Changes in customer profile information • Changes in customer contact information • Changes in customer location • Abnormal Transaction trend • Opportunity on split transaction
  • 16. SIMswap/clone, Mobile number change Data • Fraudster not allow the any information to reach customer during the fraud attack. • Fraudster change or disconnect the customer communication purposely from the institute. • RBI & TRAI should come to work collaboratively. • Bank or Institute share the customer mobile number details to mobile operators. • There is any changes in Mobile number or SIM, mobile operator not allow any incoming SMS service for 24 hours. • And mobile operator share the report to Bank / Institute on regular frequencies. Transaction Initiation • Transaction initiated after Mobile or SIM change • Mobile operator share the details to Bank / Institute Pro Hawk • Dual Confirmation required • Validating other Risk opportunity • Arriving Risk Scores F&R Risk Score • Approve Transaction – Low Risk • Dual Confirmation – Medium Risk • Reject – High Risk & raise the fraud protocol.
  • 17. Geotag Data • Geotag must be capture for all transaction initiations and enquiries over the phone or direct. • Geotag helps to arrive the customer transaction pattern. • Customer information hacked by the fraudster then fraud abuse can initiate from any global location. • And the transaction initiated from two different location , within short time period. • Even the distance not covered by fasted mode of travel it should be triggered in Pro Hawk. • F&R score derived based on customer categorization and frequent travel mode. • Geotag information can collected from PoS device and IP location. Transaction Initiated • Within short time or consecutive transaction initiated from different locations. • Fraudster creating or created the impact, Geotag information required for further investigation. Pro Hawk • Dual Confirmation required • Validating other Risk opportunity • Arriving Risk Scores F&R Risk Score • Approve Transaction – Low Risk • Dual Confirmation – Medium Risk • Reject – High Risk & raise the fraud protocol
  • 18. Amount deposit • High Value Amount deposit • Amount Transferred from some other accounts. Transaction Initiation • Failure attempts of ATM PIN / Net Banking PIN / OTP / GRID • Transaction Initiated within short time. • Transaction initiated from different location • Change in Customer profile and communication. PRO HAWK • Validate the transaction with other channel reports. • Validating the risk opportunity • Arriving the F&R Score F&R Score • Approve Transaction – Low Risk • Dual Confirmation – Medium Risk • Reject – High Risk & raise the fraud protocol. • After cash deposit or amount transfer most of the fraud attempts are happening to transfer the amount to other accounts. • Fraudster will wait for the right moment with available resource & information. • Fraudster purposely do some changes in customer communication information. Amount Deposit Data
  • 19. Unused Account & Unclaimed Amount Data • Unused Account: If any active account not used for long time for any transaction purpose, with or without balance of amount. • Unclaimed Amount: If amount not claimed or not utilized for any transaction for a longtime from a customer or Bank / Institute suspense account. • Mostly these type of fraud abuse done by Internal employees or vendors who have access to customer account information. • Internal employees and Vendors know the process and loophole to claim the amount or use the account. • Unused customer active account or old account may be used for fraud abuse, illegal money deposit / transfer without customer knowledge. Transaction Initiation Transaction initiated after long time Any customer service request raised Changes in profile and communication info Repeated interaction Failure attempts Pro Hawk Dual Confirmation required Validating other Risk opportunity Arriving Risk Scores F&R Score Approve Transaction – Low Risk Dual Confirmation – Medium Risk Reject – High Risk & raise the fraud protocol.
  • 20. Unauthorized Status Change Data Unauthorized Status Change: Bank or Institute maintain “N” number of processes status to categorize the customer and account . If there is any status changes happened unauthorized manner its called Unauthorized status change.  Mostly these type of fraud abuse & non compliance done by Internal employees or vendors who have access to customer account information.  Otherwise fraudster may hack the Bank or institute system from outside and do the unauthorized access.  For example due to risk prospective or proactive manner the customer account status tagged under Block, Closed, Inactive or Freeze.  If any one change the status to active in unauthorized way and initiated any transaction it will be capture in PRO HAWK. Transaction Initiation • If there is any transaction initiated status changed account PRO HAWK • Validate the transaction with other channel reports. • Validating the risk opportunity • Arriving the F&R Score F&R Score • Approve Transaction – Low Risk • Dual Confirmation – Medium Risk • Reject – High Risk & raise the fraud protocol.
  • 21. Unauthorized Access Data Unauthorized Access: To create the fraud impact, if there is any repeated interaction on any customer account by single user id or multiple user id in same or different location.  Mostly these type of fraud abuse & non compliance done by Internal employees or vendors who have access to customer account information.  Otherwise fraudster may hack the Bank or institute system from outside and do the unauthorized access. • If there is any of the transaction initiated from those accounts it will be captured in PRO HAWK. F&RScore PROHAWK TransactionInitiationMultiple interaction in single account by single ID and transaction initiated on the account Multiple interaction in single account by multiple ID and transaction initiated on the account Validate the transaction with other channel reports. Validating the risk opportunity Arriving the F&R Score Approve Transaction – Low Risk Dual Confirmation – Medium Risk Reject – High Risk & raise the fraud protocol.
  • 22. Customer Information access Data Transaction Initiation • Transaction initiated fraud enquiry account. PRO HAWK • Validate the transaction with other channel reports. • Validating the risk opportunity • Arriving the F&R Score F&R Score • Approve Transaction – Low Risk • Dual Confirmation – Medium Risk • Reject – High Risk & raise the fraud protocol. Customer Information Access Data: Fraudster call customer care or visit the Bank / Institute directly with limited or without information about customer and to get more information about customer or customer account. • Employee or customer care unit tagged information about the enquiry on respective account. • Transaction initiated from these accounts it will be capture in PRO HAWK
  • 23. Dispute / Refund Data If any fraudster or customer aware about the benefit of chargeback dispute or other dispute or refund, and initiated the any transaction to get one more benefit from the institute. it will be triggered and alerted in PRO HAWK. • Duplicate Dispute / Refund Request • Same Merchant • Less value transaction • From same failure network & device Transaction Initiation • Validate the transaction information • Validating other Risk opportunity • Arriving Risk Scores PRO HAWK • Approve Transaction – Low Risk • Dual Confirmation – Medium Risk • Reject – High Risk & raise the fraud protocol. F&R Score
  • 24. Failure attempt Data • Every failure alerts are warning sign to the institute. • Failure attempts are leads to the Fraud and Risk Management team. • User ID failed to login and there is changes happened in customer account / profile or raising the service request. • All failure attempts to be rigorously monitored. Failure Attempts • ATM / IPIN attempt • Net banking password • Grid / OTP attempt • Failure to confirm identity – Bank • Failure to confirm identity – customer care Transaction Initiation • Transaction initiated after failure attempt • Transaction Initiated within short time. • Transaction initiated from different location • Changes in Customer profile and communication PRO HAWK • Validate the transaction with other channel reports. • Validating the risk opportunity • Arriving the F&R Score F&R Score • Approve Transaction – Low Risk • Dual Confirmation – Medium Risk • Reject – High Risk & raise the fraud protocol.
  • 26. Fraud & Risk Process Reengineering • Fraud & Risk control mechanism is not a standard one, it’s a dynamic and it can change over the period. • Fraud & Risk take different dimension based on process effectiveness & control of the system, New Technology and Knowledge of the fraudster. • The process reengineering is most important for Fraud & Risk Management team and process. • Process Reengineering involves the radical redesign of the processes to achieve dramatic improvements in control the fraud attack and reducing the fraud impact with in short time. Control the Fraud & Take Action Collect – Fraud Impact Info Root Cause AnalysisIdentify the Fraud Derive – Modus Operandi Process Reengineering Risk Assessment Validating Existing Controls
  • 27. Thank You Project Proposed & Developed By: Jerome Salecious J Fraud & Risk Management Professional ,Expert & Domain Architect