Tackling Fraud Tackling Fraud

Tackling Fraud

    • 5,99 €
    • 5,99 €

Beschreibung des Verlags

The threat landscape is developing at such a rate that traditional IT security controls can no longer protect us. Legacy IT security mechanisms deal with rules and signatures for known threats coming from the outside. But today the threats are coming from inside. The risks are from malicious employees, stealthy malware and remote access Trojans. But innocent employees are not safe from this scourge and are being fired and their reputations ruined as they are deemed to be collaborating with the attackers. Of course it is not them, it is the embedded Trojans that take over their accounts and can now mimic their work and execute fraudulent transactions and the losses are staggering. Furthermore payments and fund transfer fraud is escalating as we can never be certain as to who is driving the transaction. We see increasing examples of friendly fraud, CEO fraud and insider fraud even account takeovers that deprive businesses and their customers from their legitimate funds because we cannot be sure who is making the transfer.
But it doesn't have to be that way, behavioural Biometric analysis empowered by machine learning can profile employee and customer activity and can flag anomalies in user behaviour. As a result strange actions that fail to match a profile will almost instantly trigger an alert and prevent fraudulent or malicious activity and more importantly protect the innocent from being blamed for the malicious actions of another fraudulent actor.

GENRE
Business und Finanzen
ERSCHIENEN
2017
6. Dezember
SPRACHE
EN
Englisch
UMFANG
224
Seiten
VERLAG
Alasdair gilchrist
GRÖSSE
306
 kB

Mehr ähnliche Bücher

Transparent User Authentication Transparent User Authentication
2011
An Introduction To Cyber Security: The Complete Guidance For Beginners An Introduction To Cyber Security: The Complete Guidance For Beginners
2021
Security and Control in Information Systems Security and Control in Information Systems
2005
CISO's Guide to Penetration Testing CISO's Guide to Penetration Testing
2016
ISSE/SECURE 2007 Securing Electronic Business Processes ISSE/SECURE 2007 Securing Electronic Business Processes
2007
Enterprise Cybersecurity in Digital Business Enterprise Cybersecurity in Digital Business
2022

Mehr Bücher von Alasdair Gilchrist

An Executive Guide to Identity Access Management - 2nd Edition An Executive Guide to Identity Access Management - 2nd Edition
2018
Google Cloud Platform an Architect's Guide Google Cloud Platform an Architect's Guide
2021
Industry 4.0 Industry 4.0
2016
REST API Design Control and Management REST API Design Control and Management
2015
Concise Guide to DWDM Concise Guide to DWDM
2015
The Concise Guide to SSL/TLS for DevOps The Concise Guide to SSL/TLS for DevOps
2015