尊敬的 微信汇率:1円 ≈ 0.046078 元 支付宝汇率:1円 ≈ 0.046168元 [退出登录]
SlideShare a Scribd company logo
Utilizing Internet for
Fraud Examination
and Investigation
Within Banking E-Channels
and Cyber Crime
Image: UltraHighDefinitionWallpepers
1ST SESSION:
REDEFINING FRAUD, EXAMINATION,
INVESTIGATION AND CYBER CRIME
April 2016 3
Let’s Start First with Fraud
DEFINITION
Oxford Dictionary
• Wrongful or criminal deception intended to result in financial or personal gain.
or
• A person or thing intended to deceive others, typically by unjustifiably
claiming or being credited with accomplishments or qualities.
Association of Certified Fraud Examiner (ACFE)
• Any crime for gain that uses deception as its principal modus operandi.
Black’s Law Dictionary
• A knowing misrepresentation of the truth or concealment of a material fact to
induce another to act to his or her detriment.
or
• Any intentional or deliberate act to deprive another of property or money by
guile, deception, or other unfair means.
April 2016 4
Fraud vs Lying
• Fraud usually involves lying for a specific gain that causes
someone loss while lying does not always include hurt.
• Example, if we take our car to an unscrupulous mechanic,
he may tell us he makes $1,000 a year. If this is a lie, it
does not hurt us.
• However, if our car does not need repairs but the
mechanic says our car needs $500 in body work, he/she
has committed fraud because truth is twisted and causes
financial loss for us.
April 2016 5
Types of Fraud
• Internal Fraud
When employee,
manager, or executive
commits fraud against his
or her employer.
• External Fraud
Vendors, customers,
suppliers, integrators,
consultants, and other
third parties (known or
unknown).
April 2016 6
Image courtesy of: City Caucus
April 2016 7
Courtesy of ACFE
Fraud’s Motives
• Donald Cressey’s hypothesis
April 2016 8
Courtesy of ACFE
Fraud Examination and Investigation
April 2016 9
Courtesy of ACFE
Fraud Examination and Investigation (cont’d)
April 2016 10
Courtesy of ACFE
Examination versus Audit
April 2016 11
Courtesy of ACFE
Examination versus Audit (cont’d)
April 2016 12
Courtesy of ACFE
Fraud Examination vs Forensic Accounting
• Different but related.
• FA is done by accountants using Accounting Skills in
anticipation of potential or actual civil or criminal litigation
and can include fraud, valuation, bankruptcy, and others.
• FE conducted by either accountants or non-accountants
and refer only to anti-fraud matters.
• Most FE involve forensic accounting but not all forensic
accounting is fraud examination.
• Simply because majority of examinations, investigations,
and reports regarding fraud are done with “an eye toward
litigation.”
• FE conduct their examination with assumption the case
may end in litigation.
April 2016 13
Redefining Cyber Crime
What Crime is?
“An event, which subjects the
doer to legal punishment or any
offence against morality, social
order or any unjust or shameful
act” ~ Oxford Dictionary
April 2016 14
What Crime is All About?
Doing Crime is Illegal?
Being a criminal = a bad person?
Crime = Illegal against Law + Bad Motive(s) + On
Purpose
Crime != Illegal against Law + Unintentional + Good
Motive (s)
Crime != Illegal against Law + Unintentional + Bad
Motive (s)
Crime != Illegal against Law + On Purpose + Good
Motive (s)
April 2016 15
What Crime is All About? (cont’d)
Therefore CRIMES are NOT to be
MEASURED by the ISSUE of
EVENTS, but by BAD INTENSION
of a PERSON or ENTITY.
April 2016 16
Then Cyber Crime is…
• An unlawful act wherein computer/machine is
either a tool or a target or both.
• Punishable by (Information Technology) Act.
• Happened in and or through cyber space.
• Former descriptions were "computer crime",
"computer-related crime" or "crime by computer“.
• Other forms include "digital", "electronic", "virtual"
, "IT", "high-tech" and technology-enabled" crime.
April 2016 17
Laws and Regulation on Indonesia
• Telecommunication Act No. 36/1999 focused
on Telecommunications Infrastructure briefly; Not
internet in particular.
• Information and Transaction Electronic Act
No. 11/2008 for legal enforcements against cyber
crime.
• Copyright Act No. 19/2002.
• Pornography Act No. 44/2008.
• Electronic System Provider and Electronic
Transaction Regulation No. 82/2012.
April 2016 18
Cyber Crime Categories
• Computing Devices as a Target
Using those devices to
attacks other devices
e.g. Hacking, virus/worms
attacks, DoS attack, etc.
• Computing Devices as a Weapon
Using those devices to
commit real-world crimes
e.g. cyber terrorism, credit
card fraud, etc.
April 2016
Image courtesy of chakreview.com
19
Cyber Crime Categories (cont’d)
From victim point of views:
1. Cyber crime on Persons
e.g. Harassment occurred in cyberspace,
or through the use of cyberspace (sexual,
racial, religious, or other) and cyber bullying.
2. Cyber crime on Groups/Organizations
Targeting particular or certain organizations
or groups whether profit or non-profit. Often
time those who reside as financial industry
players.
April 2016 20
Cyber Crime Categories (cont’d)
3. Cyber crime on Property
e.g. Computer vandalism (destruction of others'
property), transmission of harmful programs,
unauthorized intrusion through cyber
space, unauthorized possession of computer
information.
4. Cyber crime on Government
e.g. Cyber terrorism is one distinct kind of crime in
this category.
April 2016 21
In 2014 according to Federal Bureau
Investigation (FBI):
• Viruses
• Employee abuse of privileges
• Unauthorized access by
insiders
• Denial of Service (DoS, DDoS)
• System penetration from the
outside
• Theft of proprietary information
(User ID and password) and
devices
• Sabotage of data/networks
• Proving/scanning systems
• Financial fraud
Notable Cyber Crimes
April 2016
Image courtesy of indiatimes.com
22
 Manipulate data
integrity
 Sniffing
 Keylogger
 IP spoofing
Notable Cyber Crimes (cont’d)
April 2016
Image courtesy of @TrojanLax
23
April 2016
Source: IBM [1] UNODC Comprehensive Study on Cybercrime, 2013
24
April 2016
Source: IBM
[2] FBI: Crime in the United States 2013
[3] United California Bank Robbery
[4] Center for Strategic and International Studies
25
April 2016
Source: IBM [6] ESG: http://bit.ly/1xzTmUW
26
Cyber Crime-as-a-Service Marketplace
• Continues to mature over the past two years.
• Enables more fraudsters to cash in without needing
to understand the chain of fraud, how to phish or
spam, or IT infrastructure requirements.
• Becomes fiercely competitive.
• Cybercrime 'service providers' must work harder than
ever before to win and keep 'customers.’
• Generalized increase in quality of malware produced.
• Enables much larger pool of bad actors with no
technical knowledge to profit from.
April 2016 27
Cyber Crime-as-a-Service Marketplace
(cont’d)
• Many types of attack are simple and low
cost.
• Phishing attacks: 500,000 email addresses
cost $30.
• Hosting a phishing site can be more or less
free.
• Thousands of credit cards can be stolen in
return for around $100.
April 2016 28
Cyber Crime-as-a-Service Marketplace
(cont’d)
April 2016 29
Image courtesy of EMC
Mobile Encounters Larger Attack Surface
• In 2015 1.5 billion units are shipped.[1]
• Vast majority of mobile malware is still focused on Android
platform due to open platform and popularity with 79%, iOS of
15% and 5% the rests [2]
• Banking Trojans, used with SMS sniffers, are increasing
A user is persuaded through social engineering to
download mobile malware from their PC.
Scenario
During online banking session, a screen pop up
inviting user to download a mobile app (masquerading as
a security feature), which is actually SMS sniffer.
When the user's bank detects unusual activity, such
as high-value wire transfer, and sends an out-of-band
one-time password to user's mobile that must be
entered to authorize the transaction, the criminal can
intercept it and complete the transfer to their own account.
April 2016 30
[1] IDC Worldwide Smart Phone 2015-2019 Forecast and Analysis
[2] IDC Worldwide Quarterly Mobile Phone Tracker
Mobile-Only Attack Vectors
• Premium rate scams
Scenario
Scammers persuade user to send SMSs or make
calls to premium-rate numbers from their mobile,
with the scammers collecting the cash that results.
• Data stealers and spying apps
Scenario
These apps switch on a phone's camera or audio, so that a
criminal can watch the user's face to see whether he or she is
being convinced by a social engineering attempt; or record
what the user says during calls to their bank. They can also
steal address book data, lift photos from the phone and get the
device’s geo location.
April 2016 31
Mobile-Only Attack Vectors (cont’d)
• Initiated by rogue mobile apps rather than malware.
• Misuse trust to steal information and money by
persuading users to give them permissions during the
installation process.
• Many users simply click 'Next' without reading each
screen, and fail to notice.
• App has gained super-user privileges which provide full
access to the phone's features.
• May even make the app impossible to uninstall.
April 2016 32
Mobile-Only Attack Vectors (cont’d)
April 2016 33
Image courtesy of EMC
Ransomware Continues
• In mobile devices, such as Police Locker
capitalizing typical user behavior during
installation.
• Gain privileges needed to lock the device.
• Give instruction to pay a ransom to unlock their
files (or to 'pay a fine' because the phone
supposedly contains 'illegal content').
• Ransoms generally have to be paid via an online
payment system, such as Bitcoin, or prepaid cash
cards (untraceable and non-reversible).
April 2016 34
April 2016 35
Image courtesy of EMC
Cyber Criminals: Who They Are?
• Kids (age group below
17)
• Disgruntled employees
• Organized hacktivists
• Professional hackers
(corporate espionage)
either white or black hats
• Cyber Terrorist (political
motive)
April 2016
Image courtesy of Travaux
36
April 2016
Thank You!
Image: UltraHighDefinitionWallpepers
37
Thank You!
Image courtesy of waystobuildabusinessonline.com

More Related Content

What's hot

Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar1431
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
S.M.Mustofa Kauser
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
Kudakwashe Shamu
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
Faridah Husin
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
Mary Rayme
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Computer crime
Computer crimeComputer crime
Computer crime
Uc Man
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
Online
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cyber Crime
Cyber CrimeCyber Crime
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
Harsh Kumar
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
German Teran
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
ambadesuhas
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Knowledge Group
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 

What's hot (20)

Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 

Viewers also liked

Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
Venktesh Venke
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
Dominic Sroda Korkoryi
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
ITpreneurs
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
Prof. (Dr.) Tabrez Ahmad
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
Veriti Consulting LLC
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
Harshita Ved
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Adv Prashant Mali
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
Sagar Rahurkar
 
Criminal Psychology & Fraud Investigation
Criminal Psychology & Fraud InvestigationCriminal Psychology & Fraud Investigation
Criminal Psychology & Fraud Investigation
Tommy Seah
 
CONDUCTING A WORKPLACE INVESTIGATION
CONDUCTING A WORKPLACE INVESTIGATIONCONDUCTING A WORKPLACE INVESTIGATION
CONDUCTING A WORKPLACE INVESTIGATION
Enercare Inc.
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
Fuh George Cheo
 
A STUDY On Forensic Accounting
A STUDY On Forensic AccountingA STUDY On Forensic Accounting
A STUDY On Forensic Accounting
CA Abhishek Gandhi
 
Class 1: Investigation Interview Preparation Recording
Class 1: Investigation Interview Preparation RecordingClass 1: Investigation Interview Preparation Recording
Class 1: Investigation Interview Preparation Recording
Case IQ
 

Viewers also liked (15)

Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Criminal Psychology & Fraud Investigation
Criminal Psychology & Fraud InvestigationCriminal Psychology & Fraud Investigation
Criminal Psychology & Fraud Investigation
 
CONDUCTING A WORKPLACE INVESTIGATION
CONDUCTING A WORKPLACE INVESTIGATIONCONDUCTING A WORKPLACE INVESTIGATION
CONDUCTING A WORKPLACE INVESTIGATION
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
A STUDY On Forensic Accounting
A STUDY On Forensic AccountingA STUDY On Forensic Accounting
A STUDY On Forensic Accounting
 
Class 1: Investigation Interview Preparation Recording
Class 1: Investigation Interview Preparation RecordingClass 1: Investigation Interview Preparation Recording
Class 1: Investigation Interview Preparation Recording
 

Similar to Utilizing Internet for Fraud Examination and Investigation

CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
amani kadope
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
ICT ICA3
ICT ICA3ICT ICA3
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
Devanshi Solanki
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Arindam Sarkar
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
Goutama Bachtiar
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Rohit Revo
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
marukanda
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Final ppt
Final pptFinal ppt
Final ppt
HEMAL SHAH
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
MrunalBakshi
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 

Similar to Utilizing Internet for Fraud Examination and Investigation (20)

CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
ICT ICA3
ICT ICA3ICT ICA3
ICT ICA3
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

More from Goutama Bachtiar

Crypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and BlockchainCrypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and Blockchain
Goutama Bachtiar
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018
Goutama Bachtiar
 
Blockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryBlockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking Industry
Goutama Bachtiar
 
Delving into Fintech
Delving into FintechDelving into Fintech
Delving into Fintech
Goutama Bachtiar
 
Leveraging Agile Project Management with Scrum
Leveraging Agile Project Management with ScrumLeveraging Agile Project Management with Scrum
Leveraging Agile Project Management with Scrum
Goutama Bachtiar
 
Library of Information Technology Icons
Library of Information Technology IconsLibrary of Information Technology Icons
Library of Information Technology Icons
Goutama Bachtiar
 
PMBOK 6th vs 5th Edition
PMBOK 6th vs 5th EditionPMBOK 6th vs 5th Edition
PMBOK 6th vs 5th Edition
Goutama Bachtiar
 
IS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyIS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New Economy
Goutama Bachtiar
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet Banking
Goutama Bachtiar
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Goutama Bachtiar
 
The State of ERP in Indonesia: Trends, Opportunities and Challenges
The State of ERP in Indonesia: Trends, Opportunities and ChallengesThe State of ERP in Indonesia: Trends, Opportunities and Challenges
The State of ERP in Indonesia: Trends, Opportunities and Challenges
Goutama Bachtiar
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
Goutama Bachtiar
 
Implementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft VisioImplementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft Visio
Goutama Bachtiar
 
Understanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsUnderstanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor Relationships
Goutama Bachtiar
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT Architecture
Goutama Bachtiar
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information Technology
Goutama Bachtiar
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the Opportunities
Goutama Bachtiar
 
Crafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to InvestorsCrafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to Investors
Goutama Bachtiar
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
Goutama Bachtiar
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment Form
Goutama Bachtiar
 

More from Goutama Bachtiar (20)

Crypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and BlockchainCrypto Currency, Bitcoin and Blockchain
Crypto Currency, Bitcoin and Blockchain
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018
 
Blockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryBlockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking Industry
 
Delving into Fintech
Delving into FintechDelving into Fintech
Delving into Fintech
 
Leveraging Agile Project Management with Scrum
Leveraging Agile Project Management with ScrumLeveraging Agile Project Management with Scrum
Leveraging Agile Project Management with Scrum
 
Library of Information Technology Icons
Library of Information Technology IconsLibrary of Information Technology Icons
Library of Information Technology Icons
 
PMBOK 6th vs 5th Edition
PMBOK 6th vs 5th EditionPMBOK 6th vs 5th Edition
PMBOK 6th vs 5th Edition
 
IS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyIS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New Economy
 
Managing IT Risks in Internet Banking
Managing IT Risks in Internet BankingManaging IT Risks in Internet Banking
Managing IT Risks in Internet Banking
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
The State of ERP in Indonesia: Trends, Opportunities and Challenges
The State of ERP in Indonesia: Trends, Opportunities and ChallengesThe State of ERP in Indonesia: Trends, Opportunities and Challenges
The State of ERP in Indonesia: Trends, Opportunities and Challenges
 
Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)Developing and Managing Business Continuity Plan (BCP)
Developing and Managing Business Continuity Plan (BCP)
 
Implementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft VisioImplementing BPMN 2.0 with Microsoft Visio
Implementing BPMN 2.0 with Microsoft Visio
 
Understanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsUnderstanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor Relationships
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT Architecture
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information Technology
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the Opportunities
 
Crafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to InvestorsCrafting and Delivering Effective Business Pitch to Investors
Crafting and Delivering Effective Business Pitch to Investors
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
 
Enterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment FormEnterprise Information Technology Risk Assessment Form
Enterprise Information Technology Risk Assessment Form
 

Recently uploaded

India Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with yearIndia Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with year
AkashKumar1733
 
Top 10 Digital Marketing Trends in 2024 You Should Know
Top 10 Digital Marketing Trends in 2024 You Should KnowTop 10 Digital Marketing Trends in 2024 You Should Know
Top 10 Digital Marketing Trends in 2024 You Should Know
Markonik
 
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl DelhiCall Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
alisha panday
 
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
manalishivani8
 
Ethically Aligned Design (Overview - Version 2)
Ethically Aligned Design (Overview - Version 2)Ethically Aligned Design (Overview - Version 2)
Ethically Aligned Design (Overview - Version 2)
prb404
 
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book NowPowai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
reddyaditi530
 
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKIMeasuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
APNIC
 
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
vrvipin164
 
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
adocd
 
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
aneeta$L14
 
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
monuc3758 $S2
 
Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device SecurityTrends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
Lumiverse Solutions Pvt Ltd
 
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
payalgupta2u
 
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies''Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
APNIC
 
”NewLo":the New Loyalty Program for the Web3 Era
”NewLo":the New Loyalty Program for the Web3 Era”NewLo":the New Loyalty Program for the Web3 Era
”NewLo":the New Loyalty Program for the Web3 Era
pjnewlo
 
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
manalishivani8
 
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
tiktokhotymodel
 
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
SANIYA KHATUN$S2
 
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
SANIYA KHATUN$S2
 
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts ServiceCall Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
DipikaKaurr
 

Recently uploaded (20)

India Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with yearIndia Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with year
 
Top 10 Digital Marketing Trends in 2024 You Should Know
Top 10 Digital Marketing Trends in 2024 You Should KnowTop 10 Digital Marketing Trends in 2024 You Should Know
Top 10 Digital Marketing Trends in 2024 You Should Know
 
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl DelhiCall Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
Call Girls In Delhi 🔥 +91-9873940964🔥High Profile Call Girl Delhi
 
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
 
Ethically Aligned Design (Overview - Version 2)
Ethically Aligned Design (Overview - Version 2)Ethically Aligned Design (Overview - Version 2)
Ethically Aligned Design (Overview - Version 2)
 
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book NowPowai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
 
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKIMeasuring and Understanding the Route Origin Validation (ROV) in RPKI
Measuring and Understanding the Route Origin Validation (ROV) in RPKI
 
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
 
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
一比一原版(uofr学位证书)罗切斯特大学毕业证如何办理
 
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
🔥Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl Service Avail...
 
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
 
Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device SecurityTrends In Cybersecurity | Rise Of Iot Security Solutions |  IoT Device Security
Trends In Cybersecurity | Rise Of Iot Security Solutions | IoT Device Security
 
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
Call Girls In Chennai 💯Call Us 🔝 8824825030 🔝Independent Chennai Escorts Serv...
 
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies''Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
 
”NewLo":the New Loyalty Program for the Web3 Era
”NewLo":the New Loyalty Program for the Web3 Era”NewLo":the New Loyalty Program for the Web3 Era
”NewLo":the New Loyalty Program for the Web3 Era
 
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
Call Girls Dehradun 8824825030 Escort In Dehradun service 24X7
 
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
❣Ramp Model Call Girls Chennai 💯Call Us 🔝 7737669865 🔝💃Independent Chennai Es...
 
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
 
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
Call Girls Service Ahmedabad 🔥 7737669865 🔥 Available Nearby Escort Is Live R...
 
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts ServiceCall Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
 

Utilizing Internet for Fraud Examination and Investigation

  • 1. Utilizing Internet for Fraud Examination and Investigation Within Banking E-Channels and Cyber Crime
  • 3. 1ST SESSION: REDEFINING FRAUD, EXAMINATION, INVESTIGATION AND CYBER CRIME April 2016 3
  • 4. Let’s Start First with Fraud DEFINITION Oxford Dictionary • Wrongful or criminal deception intended to result in financial or personal gain. or • A person or thing intended to deceive others, typically by unjustifiably claiming or being credited with accomplishments or qualities. Association of Certified Fraud Examiner (ACFE) • Any crime for gain that uses deception as its principal modus operandi. Black’s Law Dictionary • A knowing misrepresentation of the truth or concealment of a material fact to induce another to act to his or her detriment. or • Any intentional or deliberate act to deprive another of property or money by guile, deception, or other unfair means. April 2016 4
  • 5. Fraud vs Lying • Fraud usually involves lying for a specific gain that causes someone loss while lying does not always include hurt. • Example, if we take our car to an unscrupulous mechanic, he may tell us he makes $1,000 a year. If this is a lie, it does not hurt us. • However, if our car does not need repairs but the mechanic says our car needs $500 in body work, he/she has committed fraud because truth is twisted and causes financial loss for us. April 2016 5
  • 6. Types of Fraud • Internal Fraud When employee, manager, or executive commits fraud against his or her employer. • External Fraud Vendors, customers, suppliers, integrators, consultants, and other third parties (known or unknown). April 2016 6 Image courtesy of: City Caucus
  • 8. Fraud’s Motives • Donald Cressey’s hypothesis April 2016 8 Courtesy of ACFE
  • 9. Fraud Examination and Investigation April 2016 9 Courtesy of ACFE
  • 10. Fraud Examination and Investigation (cont’d) April 2016 10 Courtesy of ACFE
  • 11. Examination versus Audit April 2016 11 Courtesy of ACFE
  • 12. Examination versus Audit (cont’d) April 2016 12 Courtesy of ACFE
  • 13. Fraud Examination vs Forensic Accounting • Different but related. • FA is done by accountants using Accounting Skills in anticipation of potential or actual civil or criminal litigation and can include fraud, valuation, bankruptcy, and others. • FE conducted by either accountants or non-accountants and refer only to anti-fraud matters. • Most FE involve forensic accounting but not all forensic accounting is fraud examination. • Simply because majority of examinations, investigations, and reports regarding fraud are done with “an eye toward litigation.” • FE conduct their examination with assumption the case may end in litigation. April 2016 13
  • 14. Redefining Cyber Crime What Crime is? “An event, which subjects the doer to legal punishment or any offence against morality, social order or any unjust or shameful act” ~ Oxford Dictionary April 2016 14
  • 15. What Crime is All About? Doing Crime is Illegal? Being a criminal = a bad person? Crime = Illegal against Law + Bad Motive(s) + On Purpose Crime != Illegal against Law + Unintentional + Good Motive (s) Crime != Illegal against Law + Unintentional + Bad Motive (s) Crime != Illegal against Law + On Purpose + Good Motive (s) April 2016 15
  • 16. What Crime is All About? (cont’d) Therefore CRIMES are NOT to be MEASURED by the ISSUE of EVENTS, but by BAD INTENSION of a PERSON or ENTITY. April 2016 16
  • 17. Then Cyber Crime is… • An unlawful act wherein computer/machine is either a tool or a target or both. • Punishable by (Information Technology) Act. • Happened in and or through cyber space. • Former descriptions were "computer crime", "computer-related crime" or "crime by computer“. • Other forms include "digital", "electronic", "virtual" , "IT", "high-tech" and technology-enabled" crime. April 2016 17
  • 18. Laws and Regulation on Indonesia • Telecommunication Act No. 36/1999 focused on Telecommunications Infrastructure briefly; Not internet in particular. • Information and Transaction Electronic Act No. 11/2008 for legal enforcements against cyber crime. • Copyright Act No. 19/2002. • Pornography Act No. 44/2008. • Electronic System Provider and Electronic Transaction Regulation No. 82/2012. April 2016 18
  • 19. Cyber Crime Categories • Computing Devices as a Target Using those devices to attacks other devices e.g. Hacking, virus/worms attacks, DoS attack, etc. • Computing Devices as a Weapon Using those devices to commit real-world crimes e.g. cyber terrorism, credit card fraud, etc. April 2016 Image courtesy of chakreview.com 19
  • 20. Cyber Crime Categories (cont’d) From victim point of views: 1. Cyber crime on Persons e.g. Harassment occurred in cyberspace, or through the use of cyberspace (sexual, racial, religious, or other) and cyber bullying. 2. Cyber crime on Groups/Organizations Targeting particular or certain organizations or groups whether profit or non-profit. Often time those who reside as financial industry players. April 2016 20
  • 21. Cyber Crime Categories (cont’d) 3. Cyber crime on Property e.g. Computer vandalism (destruction of others' property), transmission of harmful programs, unauthorized intrusion through cyber space, unauthorized possession of computer information. 4. Cyber crime on Government e.g. Cyber terrorism is one distinct kind of crime in this category. April 2016 21
  • 22. In 2014 according to Federal Bureau Investigation (FBI): • Viruses • Employee abuse of privileges • Unauthorized access by insiders • Denial of Service (DoS, DDoS) • System penetration from the outside • Theft of proprietary information (User ID and password) and devices • Sabotage of data/networks • Proving/scanning systems • Financial fraud Notable Cyber Crimes April 2016 Image courtesy of indiatimes.com 22
  • 23.  Manipulate data integrity  Sniffing  Keylogger  IP spoofing Notable Cyber Crimes (cont’d) April 2016 Image courtesy of @TrojanLax 23
  • 24. April 2016 Source: IBM [1] UNODC Comprehensive Study on Cybercrime, 2013 24
  • 25. April 2016 Source: IBM [2] FBI: Crime in the United States 2013 [3] United California Bank Robbery [4] Center for Strategic and International Studies 25
  • 26. April 2016 Source: IBM [6] ESG: http://bit.ly/1xzTmUW 26
  • 27. Cyber Crime-as-a-Service Marketplace • Continues to mature over the past two years. • Enables more fraudsters to cash in without needing to understand the chain of fraud, how to phish or spam, or IT infrastructure requirements. • Becomes fiercely competitive. • Cybercrime 'service providers' must work harder than ever before to win and keep 'customers.’ • Generalized increase in quality of malware produced. • Enables much larger pool of bad actors with no technical knowledge to profit from. April 2016 27
  • 28. Cyber Crime-as-a-Service Marketplace (cont’d) • Many types of attack are simple and low cost. • Phishing attacks: 500,000 email addresses cost $30. • Hosting a phishing site can be more or less free. • Thousands of credit cards can be stolen in return for around $100. April 2016 28
  • 30. Mobile Encounters Larger Attack Surface • In 2015 1.5 billion units are shipped.[1] • Vast majority of mobile malware is still focused on Android platform due to open platform and popularity with 79%, iOS of 15% and 5% the rests [2] • Banking Trojans, used with SMS sniffers, are increasing A user is persuaded through social engineering to download mobile malware from their PC. Scenario During online banking session, a screen pop up inviting user to download a mobile app (masquerading as a security feature), which is actually SMS sniffer. When the user's bank detects unusual activity, such as high-value wire transfer, and sends an out-of-band one-time password to user's mobile that must be entered to authorize the transaction, the criminal can intercept it and complete the transfer to their own account. April 2016 30 [1] IDC Worldwide Smart Phone 2015-2019 Forecast and Analysis [2] IDC Worldwide Quarterly Mobile Phone Tracker
  • 31. Mobile-Only Attack Vectors • Premium rate scams Scenario Scammers persuade user to send SMSs or make calls to premium-rate numbers from their mobile, with the scammers collecting the cash that results. • Data stealers and spying apps Scenario These apps switch on a phone's camera or audio, so that a criminal can watch the user's face to see whether he or she is being convinced by a social engineering attempt; or record what the user says during calls to their bank. They can also steal address book data, lift photos from the phone and get the device’s geo location. April 2016 31
  • 32. Mobile-Only Attack Vectors (cont’d) • Initiated by rogue mobile apps rather than malware. • Misuse trust to steal information and money by persuading users to give them permissions during the installation process. • Many users simply click 'Next' without reading each screen, and fail to notice. • App has gained super-user privileges which provide full access to the phone's features. • May even make the app impossible to uninstall. April 2016 32
  • 33. Mobile-Only Attack Vectors (cont’d) April 2016 33 Image courtesy of EMC
  • 34. Ransomware Continues • In mobile devices, such as Police Locker capitalizing typical user behavior during installation. • Gain privileges needed to lock the device. • Give instruction to pay a ransom to unlock their files (or to 'pay a fine' because the phone supposedly contains 'illegal content'). • Ransoms generally have to be paid via an online payment system, such as Bitcoin, or prepaid cash cards (untraceable and non-reversible). April 2016 34
  • 35. April 2016 35 Image courtesy of EMC
  • 36. Cyber Criminals: Who They Are? • Kids (age group below 17) • Disgruntled employees • Organized hacktivists • Professional hackers (corporate espionage) either white or black hats • Cyber Terrorist (political motive) April 2016 Image courtesy of Travaux 36
  • 37. April 2016 Thank You! Image: UltraHighDefinitionWallpepers 37 Thank You! Image courtesy of waystobuildabusinessonline.com
  翻译: