SlideShare a Scribd company logo
 
The data breach at JPMorgan Bank (December, 2014)
	
  
Last October, JP Morgan revealed that names, addresses, phone numbers and email
addresses of about 83 million customers were exposed when the bank’s computer
systems were compromised by hackers, making it one of the biggest data breaches in
history.
How would Transaction Watchdog™ stop this data theft?
Transaction Watchdog™ (TW) monitors each “data copy” event with controlling the
process aware context. For this purpose the TW engine uses data-centric process
model (virtual value chain) built across systems and channels.
Once a “data copy” event is identified, TW exposes process instant for this event and
detects data integrity breaches, like discrepancy, process bypass, missing data and
duplicates. Any of such alerts should stop the data theft.
JPMorgan applies a lot of security tools and spends in this area 250M dollars a year.
But if security guy, for example, didn’t put two-factor authentication for
compromised by hacker server or system, or this function for whatever reason doesn’t
work, no system today can alert about it in real time.
That’s exactly what happened at JPMorgan and this problem TW solves, alerting: 2nd
Factor Authentication Breach.
But it’s not the only alert that could prevent the data theft.
Once hacker accesses the data and starts to copy file, TW will alert: Ghost file export
or Copy Directory discrepancy.
If hacker uses credentials stolen from company’s employee or contractor or partner,
then TW fires alert: User geo-location discrepancy.
So, the TW underlying magic is based on:
• Predefined data-centric process model built for industry, not for specific
customer
• Incorporation of application data, like Termination Note, Attendance Time
and HR Record, with data provided by security systems, like SIEM and Active
directory.
• Data-to-process correlation
• Analyzing just data correlated to the same process-instance which replace any
need in fraud and behavior patterns
Source: http://www.reuters.com/article/2014/12/23/us-jpmorgan-cybersecurity-
idUSKBN0K105R20141223
 
Cybercrime ring steals up to $1 billion from as many
as 100 financial institutions around the world in
about two years (February 2015)
The gang, which Kaspersky dubbed Carbanak, takes the unusual approach of stealing
directly from banks, rather than posing as customers to withdraw money from
companies’ or individuals’ accounts.
Carbanak used carefully crafted emails to trick pre-selected employees into opening
malicious software files, a common technique known as spear phishing…
In this way, Kaspersky said, the criminals learned how the bank clerks worked and
could mimic their activity when transferring the money.
In some cases, Carbanak inflated account balances before pocketing the extra funds
through a fraudulent transaction. Because the legitimate funds were still there, the
account holder would not suspect a problem.
How would Transaction Watchdog™ stop this money theft?
First of all, this cybercrime use case teaches us that financial institutions check theirs
accounts through a total balance. They unable monitor each individual deal,
comprising in account’s total amount, across their systems. For example, if bank pays
to one payee $1,000 more and to other $1,000 less, nothing is warning because the
total amount of account doesn’t change.
The fraud schema doesn’t matter for TW, while TW monitors the long-live
transactions (takes hours or more to be completed). Examples of such transactions are
security trade and wire transfer, which involve the compromised payment system.
The mentioned security trade transaction is started from Sale/Purchase Order, passes
Share delivery Note provided by Stock Exchange and ends with Payment.
TW is continuously looking for multiple data integrity breach in connection to
individual Order or Customer Request.
As many systems are involved in this process and just one of them is compromised,
once the hacker inserts a fraudulent transaction in this system or changes its
application data, his activity causes to somewhat data inconsistency. TW detects it
and fires alert.
From TW perspective, the difference between this use case and previous case of data
theft is in the used process model. The process model applied in TW defines the
models of data (business objects, metadata) that TW collect and analyze in real time
(at once the data is sent to TW by a customer’s application).
If data from one of application is not received by TW or is sent with unacceptable
delay, then TW alerts that something wrong is going in operations.
Source: http://www.reuters.com/article/2015/02/15/us-cybersecurity-banks-
idUSKBN0LJ02E20150215
	
  

More Related Content

What's hot

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Mohit Pandey
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
Ashwini Nerkar
 
Same day ach bec fraud detection prevention webinar 3 1-18
Same day ach bec fraud detection  prevention webinar 3 1-18 Same day ach bec fraud detection  prevention webinar 3 1-18
Same day ach bec fraud detection prevention webinar 3 1-18
Laurent Pacalin
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015Jörn Weber
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection
Suveeksha
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
Sumit Thakur
 
Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)Mumbai Academisc
 
AML Knowledge Graph
AML Knowledge GraphAML Knowledge Graph
AML Knowledge Graph
Vera Ekimenko
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Sankhadip Kundu
 
It for fiu The Internet as a tool for financial intelligence units
It  for fiu The Internet as a tool for financial intelligence units It  for fiu The Internet as a tool for financial intelligence units
It for fiu The Internet as a tool for financial intelligence units Joseph Yosi Margalit
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detection
ijtsrd
 
Data Breach Visualization
Data Breach VisualizationData Breach Visualization
Data Breach Visualization
Pavitraa Parthasarathy
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionAjitkaur saini
 
Ashirth Barthur, Security Scientist, H2O, at MLconf Seattle 2017
Ashirth Barthur, Security Scientist, H2O, at MLconf Seattle 2017Ashirth Barthur, Security Scientist, H2O, at MLconf Seattle 2017
Ashirth Barthur, Security Scientist, H2O, at MLconf Seattle 2017
MLconf
 
IRJET- A Literature Review on Deta Leakage Detection
IRJET-  	  A Literature Review on Deta Leakage DetectionIRJET-  	  A Literature Review on Deta Leakage Detection
IRJET- A Literature Review on Deta Leakage Detection
IRJET Journal
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
Wavecrest Computing
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
IRJET Journal
 

What's hot (20)

Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
 
Same day ach bec fraud detection prevention webinar 3 1-18
Same day ach bec fraud detection  prevention webinar 3 1-18 Same day ach bec fraud detection  prevention webinar 3 1-18
Same day ach bec fraud detection prevention webinar 3 1-18
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Data leakage detection (synopsis)
Data leakage detection (synopsis)Data leakage detection (synopsis)
Data leakage detection (synopsis)
 
AML Knowledge Graph
AML Knowledge GraphAML Knowledge Graph
AML Knowledge Graph
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
It for fiu The Internet as a tool for financial intelligence units
It  for fiu The Internet as a tool for financial intelligence units It  for fiu The Internet as a tool for financial intelligence units
It for fiu The Internet as a tool for financial intelligence units
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detection
 
Data Breach Visualization
Data Breach VisualizationData Breach Visualization
Data Breach Visualization
 
Sub1555
Sub1555Sub1555
Sub1555
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Ashirth Barthur, Security Scientist, H2O, at MLconf Seattle 2017
Ashirth Barthur, Security Scientist, H2O, at MLconf Seattle 2017Ashirth Barthur, Security Scientist, H2O, at MLconf Seattle 2017
Ashirth Barthur, Security Scientist, H2O, at MLconf Seattle 2017
 
IRJET- A Literature Review on Deta Leakage Detection
IRJET-  	  A Literature Review on Deta Leakage DetectionIRJET-  	  A Literature Review on Deta Leakage Detection
IRJET- A Literature Review on Deta Leakage Detection
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
 
IRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud ComputingIRJET- Data Leakage Detection using Cloud Computing
IRJET- Data Leakage Detection using Cloud Computing
 
P2 Project
P2 ProjectP2 Project
P2 Project
 

Viewers also liked

Mucho más que dos ruedas y unos pedales
Mucho más que dos ruedas y unos pedalesMucho más que dos ruedas y unos pedales
Mucho más que dos ruedas y unos pedales
Jose Luis Yustos Gutierrez
 
Soundband
SoundbandSoundband
Mis deberes y derechos como aprendiz sena.pptx
Mis deberes y derechos como aprendiz sena.pptxMis deberes y derechos como aprendiz sena.pptx
Mis deberes y derechos como aprendiz sena.pptx
Erika Muñoz Mosquera
 
The Raan E Aali Shaan
The Raan E Aali ShaanThe Raan E Aali Shaan
The Raan E Aali Shaan
21 Gun Salute Restaurant
 
CM450DX-24S
CM450DX-24SCM450DX-24S
CM450DX-24S
spicepark
 
How does energy works
How does energy worksHow does energy works
How does energy works
Brenda Obando
 
都峰苑 新北市新莊區中央路 中信房屋-蘇主任房訊網
都峰苑 新北市新莊區中央路   中信房屋-蘇主任房訊網都峰苑 新北市新莊區中央路   中信房屋-蘇主任房訊網
都峰苑 新北市新莊區中央路 中信房屋-蘇主任房訊網
中信房屋 蘇主任房訊網
 
Chili Cheese Fries,
Chili Cheese Fries,Chili Cheese Fries,
Chili Cheese Fries,
Humdingers Burgers & Fries
 
Tiaft powerpoint (1)
Tiaft powerpoint (1)Tiaft powerpoint (1)
Tiaft powerpoint (1)
Seth Mills
 
All shook up
All shook upAll shook up
All shook up
Dana Marie
 
Proposed order in Visa Bulletin lawsuit
Proposed order in Visa Bulletin lawsuitProposed order in Visa Bulletin lawsuit
Proposed order in Visa Bulletin lawsuit
Greg Siskind
 
UiTforum 2011 - leesbaarheid - toegankelijk communiceren
UiTforum 2011 - leesbaarheid - toegankelijk communicerenUiTforum 2011 - leesbaarheid - toegankelijk communiceren
UiTforum 2011 - leesbaarheid - toegankelijk communiceren
UiTnetwerk - CultuurNet Vlaanderen
 
Chapter 1
Chapter 1Chapter 1
include7 Presentation Mobile Marketing
include7 Presentation Mobile Marketinginclude7 Presentation Mobile Marketing
include7 Presentation Mobile MarketingAberla
 

Viewers also liked (17)

Mashud q5
Mashud q5Mashud q5
Mashud q5
 
Mucho más que dos ruedas y unos pedales
Mucho más que dos ruedas y unos pedalesMucho más que dos ruedas y unos pedales
Mucho más que dos ruedas y unos pedales
 
Soundband
SoundbandSoundband
Soundband
 
Mis deberes y derechos como aprendiz sena.pptx
Mis deberes y derechos como aprendiz sena.pptxMis deberes y derechos como aprendiz sena.pptx
Mis deberes y derechos como aprendiz sena.pptx
 
The Raan E Aali Shaan
The Raan E Aali ShaanThe Raan E Aali Shaan
The Raan E Aali Shaan
 
CM450DX-24S
CM450DX-24SCM450DX-24S
CM450DX-24S
 
How does energy works
How does energy worksHow does energy works
How does energy works
 
都峰苑 新北市新莊區中央路 中信房屋-蘇主任房訊網
都峰苑 新北市新莊區中央路   中信房屋-蘇主任房訊網都峰苑 新北市新莊區中央路   中信房屋-蘇主任房訊網
都峰苑 新北市新莊區中央路 中信房屋-蘇主任房訊網
 
Chili Cheese Fries,
Chili Cheese Fries,Chili Cheese Fries,
Chili Cheese Fries,
 
Tiaft powerpoint (1)
Tiaft powerpoint (1)Tiaft powerpoint (1)
Tiaft powerpoint (1)
 
All shook up
All shook upAll shook up
All shook up
 
Общественно-политический пульс российской блогосферы 19-25 ноября 2012
Общественно-политический пульс российской блогосферы 19-25 ноября 2012Общественно-политический пульс российской блогосферы 19-25 ноября 2012
Общественно-политический пульс российской блогосферы 19-25 ноября 2012
 
Proposed order in Visa Bulletin lawsuit
Proposed order in Visa Bulletin lawsuitProposed order in Visa Bulletin lawsuit
Proposed order in Visa Bulletin lawsuit
 
La vegetación
La vegetaciónLa vegetación
La vegetación
 
UiTforum 2011 - leesbaarheid - toegankelijk communiceren
UiTforum 2011 - leesbaarheid - toegankelijk communicerenUiTforum 2011 - leesbaarheid - toegankelijk communiceren
UiTforum 2011 - leesbaarheid - toegankelijk communiceren
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
include7 Presentation Mobile Marketing
include7 Presentation Mobile Marketinginclude7 Presentation Mobile Marketing
include7 Presentation Mobile Marketing
 

Similar to Transaction Watchdog by Controls Force Use Study

Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
Anton Chuvakin
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
IRJET Journal
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
Shakas Technologies
 
Retail
Retail Retail
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SecurityGen1
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
Syeful Islam
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
nimbleappgenie
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET Journal
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
BPalmer13
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
sorabhsingh17
 
My blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banksMy blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banks
Kishore Jethanandani, MBA, MA, MPhil,
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
IlonaThornburg83
 
Rake Antifraud Detection
Rake Antifraud DetectionRake Antifraud Detection
Rake Antifraud Detection
Fabrizio Malfanti
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
FitCEO, Inc. (FCI)
 
Intro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docxIntro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docx
normanibarber20063
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
Laura Martin
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiency
JonathanPritchard12
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
SantosConleyha
 

Similar to Transaction Watchdog by Controls Force Use Study (20)

Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
Retail
Retail Retail
Retail
 
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
My blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banksMy blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banks
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
Rake Antifraud Detection
Rake Antifraud DetectionRake Antifraud Detection
Rake Antifraud Detection
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Intro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docxIntro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docx
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiency
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 

More from SGB Media Group

05-10-2023-FEMA-DHS-final-HPCC-regs.pdf
05-10-2023-FEMA-DHS-final-HPCC-regs.pdf05-10-2023-FEMA-DHS-final-HPCC-regs.pdf
05-10-2023-FEMA-DHS-final-HPCC-regs.pdf
SGB Media Group
 
From_Strategy_to_Practice_in_University (1).pdf
From_Strategy_to_Practice_in_University (1).pdfFrom_Strategy_to_Practice_in_University (1).pdf
From_Strategy_to_Practice_in_University (1).pdf
SGB Media Group
 
Individual and social benefits of online discussion forums
Individual and social benefits of online discussion forumsIndividual and social benefits of online discussion forums
Individual and social benefits of online discussion forums
SGB Media Group
 
SHEET 1 OF 7.pdf
SHEET 1 OF 7.pdfSHEET 1 OF 7.pdf
SHEET 1 OF 7.pdf
SGB Media Group
 
El Lodge Taos Survey
El Lodge Taos SurveyEl Lodge Taos Survey
El Lodge Taos Survey
SGB Media Group
 
Taos County Zoning Map (PDF).pdf
Taos County Zoning Map (PDF).pdfTaos County Zoning Map (PDF).pdf
Taos County Zoning Map (PDF).pdf
SGB Media Group
 
Ordinance 2018-2 Taos County Land Use Regulations.pdf
Ordinance 2018-2 Taos County Land Use Regulations.pdfOrdinance 2018-2 Taos County Land Use Regulations.pdf
Ordinance 2018-2 Taos County Land Use Regulations.pdf
SGB Media Group
 
pulmonary-embolism.pdf
pulmonary-embolism.pdfpulmonary-embolism.pdf
pulmonary-embolism.pdf
SGB Media Group
 
UNWTO_Barom23_01_January_EXCERPT.pdf
UNWTO_Barom23_01_January_EXCERPT.pdfUNWTO_Barom23_01_January_EXCERPT.pdf
UNWTO_Barom23_01_January_EXCERPT.pdf
SGB Media Group
 
Embodied-Carbon-in-Trade_Findings_v5.pdf
Embodied-Carbon-in-Trade_Findings_v5.pdfEmbodied-Carbon-in-Trade_Findings_v5.pdf
Embodied-Carbon-in-Trade_Findings_v5.pdf
SGB Media Group
 
MNT-Regional-Summary.pdf
MNT-Regional-Summary.pdfMNT-Regional-Summary.pdf
MNT-Regional-Summary.pdf
SGB Media Group
 
From_Strategy_to_Practice_in_University.pdf
From_Strategy_to_Practice_in_University.pdfFrom_Strategy_to_Practice_in_University.pdf
From_Strategy_to_Practice_in_University.pdf
SGB Media Group
 
Finalversion_Vacationrentalmarketregulationandaccommodationsupplygrowth.pdf
Finalversion_Vacationrentalmarketregulationandaccommodationsupplygrowth.pdfFinalversion_Vacationrentalmarketregulationandaccommodationsupplygrowth.pdf
Finalversion_Vacationrentalmarketregulationandaccommodationsupplygrowth.pdf
SGB Media Group
 
From Reparticiòn to Partition_ A History of the Mora Land Grant.pdf
From Reparticiòn to Partition_ A History of the Mora Land Grant.pdfFrom Reparticiòn to Partition_ A History of the Mora Land Grant.pdf
From Reparticiòn to Partition_ A History of the Mora Land Grant.pdf
SGB Media Group
 
Certification_One_Pager.pdf
Certification_One_Pager.pdfCertification_One_Pager.pdf
Certification_One_Pager.pdf
SGB Media Group
 
PNW-SE.pdf
PNW-SE.pdfPNW-SE.pdf
PNW-SE.pdf
SGB Media Group
 
Establishing_a_Humanitarian_Entrepreneur (2).pdf
Establishing_a_Humanitarian_Entrepreneur (2).pdfEstablishing_a_Humanitarian_Entrepreneur (2).pdf
Establishing_a_Humanitarian_Entrepreneur (2).pdf
SGB Media Group
 
VIR 23A_Program_Overview_012623.pdf
VIR 23A_Program_Overview_012623.pdfVIR 23A_Program_Overview_012623.pdf
VIR 23A_Program_Overview_012623.pdf
SGB Media Group
 
IVMF-Monthly-Employment-Report-December-2022.pdf
IVMF-Monthly-Employment-Report-December-2022.pdfIVMF-Monthly-Employment-Report-December-2022.pdf
IVMF-Monthly-Employment-Report-December-2022.pdf
SGB Media Group
 
2023-SBA-GrowthAcceleratorFundCompetition-1-pager.pdf
2023-SBA-GrowthAcceleratorFundCompetition-1-pager.pdf2023-SBA-GrowthAcceleratorFundCompetition-1-pager.pdf
2023-SBA-GrowthAcceleratorFundCompetition-1-pager.pdf
SGB Media Group
 

More from SGB Media Group (20)

05-10-2023-FEMA-DHS-final-HPCC-regs.pdf
05-10-2023-FEMA-DHS-final-HPCC-regs.pdf05-10-2023-FEMA-DHS-final-HPCC-regs.pdf
05-10-2023-FEMA-DHS-final-HPCC-regs.pdf
 
From_Strategy_to_Practice_in_University (1).pdf
From_Strategy_to_Practice_in_University (1).pdfFrom_Strategy_to_Practice_in_University (1).pdf
From_Strategy_to_Practice_in_University (1).pdf
 
Individual and social benefits of online discussion forums
Individual and social benefits of online discussion forumsIndividual and social benefits of online discussion forums
Individual and social benefits of online discussion forums
 
SHEET 1 OF 7.pdf
SHEET 1 OF 7.pdfSHEET 1 OF 7.pdf
SHEET 1 OF 7.pdf
 
El Lodge Taos Survey
El Lodge Taos SurveyEl Lodge Taos Survey
El Lodge Taos Survey
 
Taos County Zoning Map (PDF).pdf
Taos County Zoning Map (PDF).pdfTaos County Zoning Map (PDF).pdf
Taos County Zoning Map (PDF).pdf
 
Ordinance 2018-2 Taos County Land Use Regulations.pdf
Ordinance 2018-2 Taos County Land Use Regulations.pdfOrdinance 2018-2 Taos County Land Use Regulations.pdf
Ordinance 2018-2 Taos County Land Use Regulations.pdf
 
pulmonary-embolism.pdf
pulmonary-embolism.pdfpulmonary-embolism.pdf
pulmonary-embolism.pdf
 
UNWTO_Barom23_01_January_EXCERPT.pdf
UNWTO_Barom23_01_January_EXCERPT.pdfUNWTO_Barom23_01_January_EXCERPT.pdf
UNWTO_Barom23_01_January_EXCERPT.pdf
 
Embodied-Carbon-in-Trade_Findings_v5.pdf
Embodied-Carbon-in-Trade_Findings_v5.pdfEmbodied-Carbon-in-Trade_Findings_v5.pdf
Embodied-Carbon-in-Trade_Findings_v5.pdf
 
MNT-Regional-Summary.pdf
MNT-Regional-Summary.pdfMNT-Regional-Summary.pdf
MNT-Regional-Summary.pdf
 
From_Strategy_to_Practice_in_University.pdf
From_Strategy_to_Practice_in_University.pdfFrom_Strategy_to_Practice_in_University.pdf
From_Strategy_to_Practice_in_University.pdf
 
Finalversion_Vacationrentalmarketregulationandaccommodationsupplygrowth.pdf
Finalversion_Vacationrentalmarketregulationandaccommodationsupplygrowth.pdfFinalversion_Vacationrentalmarketregulationandaccommodationsupplygrowth.pdf
Finalversion_Vacationrentalmarketregulationandaccommodationsupplygrowth.pdf
 
From Reparticiòn to Partition_ A History of the Mora Land Grant.pdf
From Reparticiòn to Partition_ A History of the Mora Land Grant.pdfFrom Reparticiòn to Partition_ A History of the Mora Land Grant.pdf
From Reparticiòn to Partition_ A History of the Mora Land Grant.pdf
 
Certification_One_Pager.pdf
Certification_One_Pager.pdfCertification_One_Pager.pdf
Certification_One_Pager.pdf
 
PNW-SE.pdf
PNW-SE.pdfPNW-SE.pdf
PNW-SE.pdf
 
Establishing_a_Humanitarian_Entrepreneur (2).pdf
Establishing_a_Humanitarian_Entrepreneur (2).pdfEstablishing_a_Humanitarian_Entrepreneur (2).pdf
Establishing_a_Humanitarian_Entrepreneur (2).pdf
 
VIR 23A_Program_Overview_012623.pdf
VIR 23A_Program_Overview_012623.pdfVIR 23A_Program_Overview_012623.pdf
VIR 23A_Program_Overview_012623.pdf
 
IVMF-Monthly-Employment-Report-December-2022.pdf
IVMF-Monthly-Employment-Report-December-2022.pdfIVMF-Monthly-Employment-Report-December-2022.pdf
IVMF-Monthly-Employment-Report-December-2022.pdf
 
2023-SBA-GrowthAcceleratorFundCompetition-1-pager.pdf
2023-SBA-GrowthAcceleratorFundCompetition-1-pager.pdf2023-SBA-GrowthAcceleratorFundCompetition-1-pager.pdf
2023-SBA-GrowthAcceleratorFundCompetition-1-pager.pdf
 

Recently uploaded

一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
2023240532
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 

Recently uploaded (20)

一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 

Transaction Watchdog by Controls Force Use Study

  • 1.   The data breach at JPMorgan Bank (December, 2014)   Last October, JP Morgan revealed that names, addresses, phone numbers and email addresses of about 83 million customers were exposed when the bank’s computer systems were compromised by hackers, making it one of the biggest data breaches in history. How would Transaction Watchdog™ stop this data theft? Transaction Watchdog™ (TW) monitors each “data copy” event with controlling the process aware context. For this purpose the TW engine uses data-centric process model (virtual value chain) built across systems and channels. Once a “data copy” event is identified, TW exposes process instant for this event and detects data integrity breaches, like discrepancy, process bypass, missing data and duplicates. Any of such alerts should stop the data theft. JPMorgan applies a lot of security tools and spends in this area 250M dollars a year. But if security guy, for example, didn’t put two-factor authentication for compromised by hacker server or system, or this function for whatever reason doesn’t work, no system today can alert about it in real time. That’s exactly what happened at JPMorgan and this problem TW solves, alerting: 2nd Factor Authentication Breach. But it’s not the only alert that could prevent the data theft. Once hacker accesses the data and starts to copy file, TW will alert: Ghost file export or Copy Directory discrepancy. If hacker uses credentials stolen from company’s employee or contractor or partner, then TW fires alert: User geo-location discrepancy. So, the TW underlying magic is based on: • Predefined data-centric process model built for industry, not for specific customer • Incorporation of application data, like Termination Note, Attendance Time and HR Record, with data provided by security systems, like SIEM and Active directory. • Data-to-process correlation • Analyzing just data correlated to the same process-instance which replace any need in fraud and behavior patterns Source: http://www.reuters.com/article/2014/12/23/us-jpmorgan-cybersecurity- idUSKBN0K105R20141223
  • 2.   Cybercrime ring steals up to $1 billion from as many as 100 financial institutions around the world in about two years (February 2015) The gang, which Kaspersky dubbed Carbanak, takes the unusual approach of stealing directly from banks, rather than posing as customers to withdraw money from companies’ or individuals’ accounts. Carbanak used carefully crafted emails to trick pre-selected employees into opening malicious software files, a common technique known as spear phishing… In this way, Kaspersky said, the criminals learned how the bank clerks worked and could mimic their activity when transferring the money. In some cases, Carbanak inflated account balances before pocketing the extra funds through a fraudulent transaction. Because the legitimate funds were still there, the account holder would not suspect a problem. How would Transaction Watchdog™ stop this money theft? First of all, this cybercrime use case teaches us that financial institutions check theirs accounts through a total balance. They unable monitor each individual deal, comprising in account’s total amount, across their systems. For example, if bank pays to one payee $1,000 more and to other $1,000 less, nothing is warning because the total amount of account doesn’t change. The fraud schema doesn’t matter for TW, while TW monitors the long-live transactions (takes hours or more to be completed). Examples of such transactions are security trade and wire transfer, which involve the compromised payment system. The mentioned security trade transaction is started from Sale/Purchase Order, passes Share delivery Note provided by Stock Exchange and ends with Payment. TW is continuously looking for multiple data integrity breach in connection to individual Order or Customer Request. As many systems are involved in this process and just one of them is compromised, once the hacker inserts a fraudulent transaction in this system or changes its application data, his activity causes to somewhat data inconsistency. TW detects it and fires alert. From TW perspective, the difference between this use case and previous case of data theft is in the used process model. The process model applied in TW defines the models of data (business objects, metadata) that TW collect and analyze in real time (at once the data is sent to TW by a customer’s application). If data from one of application is not received by TW or is sent with unacceptable delay, then TW alerts that something wrong is going in operations. Source: http://www.reuters.com/article/2015/02/15/us-cybersecurity-banks- idUSKBN0LJ02E20150215