Tackling Fraud Tackling Fraud

Tackling Fraud

    • $5.99
    • $5.99

Publisher Description

The threat landscape is developing at such a rate that traditional IT security controls can no longer protect us. Legacy IT security mechanisms deal with rules and signatures for known threats coming from the outside. But today the threats are coming from inside. The risks are from malicious employees, stealthy malware and remote access Trojans. But innocent employees are not safe from this scourge and are being fired and their reputations ruined as they are deemed to be collaborating with the attackers. Of course it is not them, it is the embedded Trojans that take over their accounts and can now mimic their work and execute fraudulent transactions and the losses are staggering. Furthermore payments and fund transfer fraud is escalating as we can never be certain as to who is driving the transaction. We see increasing examples of friendly fraud, CEO fraud and insider fraud even account takeovers that deprive businesses and their customers from their legitimate funds because we cannot be sure who is making the transfer.
But it doesn't have to be that way, behavioural Biometric analysis empowered by machine learning can profile employee and customer activity and can flag anomalies in user behaviour. As a result strange actions that fail to match a profile will almost instantly trigger an alert and prevent fraudulent or malicious activity and more importantly protect the innocent from being blamed for the malicious actions of another fraudulent actor.

GENRE
Business & Personal Finance
RELEASED
2017
December 6
LANGUAGE
EN
English
LENGTH
224
Pages
PUBLISHER
Alasdair gilchrist
SELLER
Draft2Digital, LLC
SIZE
306
KB

More Books Like This

Transparent User Authentication Transparent User Authentication
2011
An Introduction To Cyber Security: The Complete Guidance For Beginners An Introduction To Cyber Security: The Complete Guidance For Beginners
2021
Security and Control in Information Systems Security and Control in Information Systems
2005
Identity Theft and Fraud Identity Theft and Fraud
2012
CISO's Guide to Penetration Testing CISO's Guide to Penetration Testing
2016
ISSE/SECURE 2007 Securing Electronic Business Processes ISSE/SECURE 2007 Securing Electronic Business Processes
2007

More Books by Alasdair Gilchrist

Concise Guide to CompTIA Security + Concise Guide to CompTIA Security +
2015
An Executive Guide to Identity Access Management - 2nd Edition An Executive Guide to Identity Access Management - 2nd Edition
2018
The Concise Guide to SSL/TLS for DevOps The Concise Guide to SSL/TLS for DevOps
2015
A Practical Guide Wireshark Forensics A Practical Guide Wireshark Forensics
2015
Industry 4.0 Industry 4.0
2016
The Certified Ethical Hacker Exam - version 8 (The concise study guide) The Certified Ethical Hacker Exam - version 8 (The concise study guide)
2015