Premium Essay

Phising and Online Bank Fraud

In:

Submitted By adityasda
Words 3597
Pages 15
PHISHING & ONLINE BANKING FRAUD

By,
Aditya Ravishankar
5-BBA-LLB ‘B’
1216452
School Of Law, Christ University
TABLE OF CONTENT

1. Abstract ...2 2. Introduction ...3 3. Statement of Problem ...3 4. Scope and Objective ...3 5. Fraud …4 6. Online Banking …5 7. Banking Fraud using Technology …6 8. Cyber Crime & Online Banking Fraud …6 9. Phishing …7 10. Classification of Phishing ...8 11. Indian Scenario …11 12. conclusion …12 Abstract
Nowadays, almost every bank provides its clients with access to their accounts over the Internet Banks provide a different range of financial services through their Internet banking channels. Different financial Internet banking applications mostly contain money transferring services, investment services (stock, bond, and mutual funds) and currency exchange services. However, as new technologies upset traditional power balances and so does the Internet. The Internet empowers everyone including cybercriminals. Advancement of technology and rapid progression of the hackers’ ability to access various users’ systems maliciously altered their motivations from curiosity to financial motives. Thus Financial Fraud is on rampant increase. This paper focuses on Online Banking Fraud in a general perspective and also looks into Phishing as one of the methods of online bank fraud. The paper follows non doctrinal method of research and concludes with the aspect that there are staunch laws yet without proper enforcement mechanisms and awareness, it will result positively, hence it is of paramount importance to spread awareness and to enforce the strong laws.

Introduction
Frauds occur in almost all facets of human

Similar Documents

Premium Essay

Fraud in Finance

...Tim Trujillo Week 6 Case Study April 14, 2013 Professor Daniel Logan 1. Do you think that this is a legitimate email? Why or why not? This actually happened to me a few months ago with my Online Bank account with Wells Fargo. I was signing into Wells Fargo’s site, and was redirected to another page. On this page I was asked for my social security number, and my driver’s license number. The page itself looked legitimate, but since I had worked in Banking for a number of years, I knew it wasn’t. A Bank will not ask you for personal information such as your social security number once your account has been established. This is also true if Bank personnel contact you by phone. They would never ask your social security number as a means to identify you. This type of fraud that was attempted on my account is called Phising. Here is Wells Fargo’s policy on Phising and email fraud: “Report Phish and Email Scams If you encounter a suspicious email or website that says it's from Wells Fargo, do not respond to it or click any links. What to do Never open attachments, click on links, or respond to emails from suspicious or unknown senders. If you receive a suspicious email that appears to be from Wells Fargo, forward the email to reportphish@wellsfargo.com What is a phish? Phish or fraudulent emails may contain links to phony websites or request you to share personal or financial information by using clever and compelling language, such as an urgent need...

Words: 834 - Pages: 4

Free Essay

Jp Morgan Chase

...trillion in assets and $108 million in revenue; JPMorgan Chase is the largest bank in the United States and has been in business for more than 200 years. Services provided by JPMorgan Chase are asset management, investment banking, private banking, treasury and security, and commercial banking. During the summer of 2012, the Security Exchange Commission (SEC) decided to investigate JPMorgan Chase after reports came out that a London-Based trader had been taking sizeable bets that distorted the market possibly causing the firm a $2 billion or more. JPMorgan Chase provided false reports about the trading loss stating that there were trading losses from investment decisions made by its Chief Investment Office (CIO) in the amount of $5.8 billion. On September 19, 2013, the Securities and Exchange Commission today charged JPMorgan Chase & Co. with misstating financial results and lacking effective internal controls to detect and prevent its traders from fraudulently overvaluing investments to conceal hundreds of millions of dollars in trading losses (U.S. Securities and Exchange Commission, 2013). JPMorgan Chase agreed to pay $200 million and admitted to the wrongdoings to settle charges with the SEC. Security Exchange Commission (SEC). The SEC is defined as a U.S. government agency that oversees securities transactions, activities of financial professionals and mutual fund trading to prevent fraud and intentional deception (Rouse M. , 2008). The Security Exchange Commission...

Words: 1516 - Pages: 7

Premium Essay

Mis 535

...governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks. In a typical phishing attack, the attacker puts up a Web site that looks nearly identical to the victim's Web site. Technology changes fast, our genetic code and learned behaviors not so. As security professionals, we must concentrate not on technical measures, but on education, education, education. Phishers often set up the fake sites several days before sending out phishing e-mails. One way to stop them from swindling customers is to find and shut down these phishing sites before phishers launch their e-mail campaigns. Companies can outsource the search to a fraud alert service. These services use technologies that scour the Web looking for unauthorized uses of your logo or newly registered domains that contain your company's name, either of which might be an indication of an impending phishing attack. This will give your company time to counteract the strike Phishing attacks bring with them other risks and costs as well; including the direct IT costs to locate the source of data loss. Organizations should establish a cross-functional anti-phishing team and develop a response plan so that they're ready to deal with any attack. Ideally, the team should include representatives from IT, internal audit, communications, PR, marketing, the Web group, customer service and legal services.Baker, Emiley; Wade...

Words: 2248 - Pages: 9

Free Essay

Paul

...COMPUTER CRIMES A Case Study submitted in partial fulfilment of the requirements for the completion of the course in CIS401M: IT ETHICS AND LEADERSHIP Term 3, Academic Year 2014-2015 by LORETO V. SIBAYAN PAUL MATTHEW G. AVILA Master of Science in Information Technology College of Computer Studies April 2014 TABLE OF CONTENTS ABSTRACT 5 CHAPTER 1 1.0 INTRODUCTION 6 CHAPTER 2 2.0 OVERVIEW OF LITERATURE 8 2.1 CYBERCRIME 9 2.2 THEORIES OF CRIME 2.2.1 CRIMINOLOGICAL THEORIES 10 2.2.2 PSYCHOLOGICAL THEORIES 12 2.3 TYPES OF CRIME 14 2.3 CAUSES CYBERCRIME 19 2.4 CYBERCRIME PREVENTION 22 CHAPTER 3 3.0 ANALYSIS CYBERCRIME CASES 26 SUMMARY OF CYBERCRIME CASES 38 CONCLUSION AND RECOMMENDATION 43 REFERENCES 44 ABSTRACT The 21st century has brought about certain influences in the lives of everyone including the way we do business transactions, the way we gain education and the way we communicate; these influences are mostly revolutionized through the use of modern day technology and though these technologies have been proven to be beneficial to the entire society, it also carries with it aspects that can be worrying for everyone. Certain professionals in the said field use their expertise to illegally develop ways on how to take advantage of others with of course the use of technology hence cybercrime...

Words: 7997 - Pages: 32

Premium Essay

Real-Time Fraud Detection

...inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classification, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis ...

Words: 56858 - Pages: 228

Premium Essay

Real-Time Fraud Detection: How Stream Computing Can Help the Retail Banking Industry

...inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classification, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis ...

Words: 56858 - Pages: 228

Premium Essay

Ebusiness Model of Amazon.Com

...pioneer in the online auction industry whereby people are brought together on a local, national and international basis to serve the purpose of creating a person-to-person community where ever individual could have an equal access through the same medium which is the Internet. eBay offers wide varieties of products and services for bargain hunters, hobbyists and collectors and sellers, changing the way people engage in trading hence eBay had changed the face of e-commerce from its inception. Today, eBay is continuously the brand preference with over 39 market presence and with $60 billion of the total value of sold items on the site’s trading platform. eBay’s Business Model eBay’s business model was based on creating and maintaining a person-to-person trading community.  After implementing their model, eBay has been able to build strategic partnerships, continue to make innovative changes and improvements, and monitor its internal and external environments for possible future opportunities.  This has given them the prestige of being the world’s largest online auction company. eBay’s business model was based on creating and maintaining a person-to-person trading community.  This allows buyers to easily search for what they want to purchase.  It also allows sellers to post their items minutes after they have registered.  There are a few specific elements of eBay’s business model that they recognized as key to its success they are: * Being the largest online trading forum...

Words: 8129 - Pages: 33