0% found this document useful (0 votes)
201 views10 pages

Eti Final Microproject

Uploaded by

films.doifode
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
201 views10 pages

Eti Final Microproject

Uploaded by

films.doifode
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

A

Micro-Project report on
“STUDY CREDIT CARD FRAUD AS AN IDENTITY THREAT”
Submitted to the

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION,


MUMBAI

In for the award of diploma impartial fulfilment of the requirements

COMPUTER ENGINEERING

(EMERGING TRENDS IN COMPUTER AND INFORMATION


TECHNOLGY)
(22618)

Submitted by
1.Bhavesh Nitin Doifode 2.Swanand Sandeep Deo

3.Vansh Ganesh Rajurkar 4.Nagesh Saroj Vishwakarma

Under The Guidance Of

( MS. Chyrine Nicholas )

Academic Year 2022-2023

DEPARTMENT OF COMPUTER ENGINEERING

G. H. RAISONI POLYTECHNIC
B-37-39/1, Shraddha Park, Hingna Wadi Link Road, Nagpur-
28
G. H. RAISONI POLYTECHNIC
Academic Session 2022-2023
CERTIFICATE

This is to certify that this micro project report on “ STUDY CREDIT

CARD FRAUD AS AN IDENTITY THREAT” is the bonafide work

of Bhavesh Nitin Doifode, Swanand Sandeep Deo, Vansh Ganesh

Rajurkar, Nagesh Saroj Vishwakarma. Who carried out the project

work under my supervision for the partial fulfillment of the requirement

for the award of the degree of the diploma in Computer Engineering

in Sixth semester.

(Mrs. Roshani Dharme) (Ms. Chyrine Nicholas)


Head Of The Department Project Guide

(Dr. G. N. Akhade)
Principal
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION, MUMBAI

SUBMISSION
We are the students of G. H. Raisoni Polytechnic, Nagpur, Third year sixth
semester of course COMPUTER ENGINEERING humbly submit that we
completed time to time as a part of project work as prescribed Maharashtra
State Board of Technical Education, Mumbai for the subject EMERGING
TRENDS IN COMPUTER AND INFORMATION TECHNOLGY (ETI) and
the project is prescribed in the report by our own skill and study for the
academic session 2022-2023, as per the guidance of Ms Chyrine Nicholas ,
Lecturer in EMERGING TRENDS IN COMPUTER AND INFORMATION
TECHNOLGY (ETI).

Name of Students: Signature

1. Bhavesh Nitin Doifode ----------------

2. Swanand Sandeep Deo ----------------

3. Vansh Ganesh Rajurkar ----------------

4. Nagesh Saroj Vishwakarma ----------------


ACKNOWLEDGEMENT

We wish to avail this opportunity to acknowledge Our profound


indebtedness and extend our deep sense of gratitude of our
profound Ms. Chyrine Nicholas For her valuable guidance , advice
and encouragement that has been feel to successful completion
of this micro-project.

We here by express our deep gratitude to our H.O.D. and Hon'ble


Principal for his/her cooperation and help and also the other staff
member of the department.

We also thank to library for making us available necessary books for


reference. I would like to place on record my sincere thanks to all
persons directly or indirectly helped us in completion of this work.

Name of Students:. Sign


1. Bhavesh Nitin Doifode

2. Swanand Sandeep Deo

3. Vansh Ganesh Rajurkar

4. Nagesh Saroj Vishwakarma


PART A
STUDY CREDIT CARD FRAUD AS IDENTITY THREAT
 Brief Introduction
Credit card fraud as an identity threat is a type of fraud where someone
uses another person's personal information, such as their name, address,
and credit card details, without their consent to make unauthorized
purchases or withdrawals. This type of fraud can happen through various
means, including phishing scams, skimming devices, and data breaches.
 Aim Of Microproject
To Study Credit Card Fraud As Identity Threat

Planed Name of
Sr. Planned
Details of activity Finishe Responsible
No. Start
d Date Team
date
Members
1 Project Survey 15/03/23 22/03/23 Bhavesh Doifode

2 Gathering 26/03/23 08/04/23 Nagesh


Information Vishwakarma

3 Setup And 12/04/23 20/04/23 Vansh Rajurkar


Configuration

4 Create Report 22/04/23 26/04/23 Swanand Deo

INDEX
Sr.
Content Page No.
No.

1 INTRODUCTION 07

2 CASE STUDY 08-09

3 REFERENCE 10
INTRODUCTION
Credit card fraud is a type of identity theft that occurs when someone uses
your credit card information to make unauthorized purchases or withdrawals.
This can happen in several ways, including:
Skimming: A criminal uses a small device to read and store the information on
your credit card's magnetic strip when you use it at a store or an ATM.
Phishing: A criminal sends you an email or text message that appears to be
from a legitimate company or financial institution, asking you to provide your
credit card information.
Hacking: A criminal gains access to a company's database that contains your
credit card information.
Lost or stolen cards: A criminal finds or steals your credit card and uses it to
make purchases.
The consequences of credit card fraud can be severe. Not only can it damage
your credit score, but it can also cause financial losses and inconvenience. In
addition, it can be difficult and time-consuming to resolve the issue and
restore your identity.
To protect yourself from credit card fraud and identity theft, there are several
steps you can take:
Monitor your credit card statements regularly to detect any unauthorized
charges.
Report any suspicious activity to your credit card issuer immediately.
Use strong and unique passwords for your online accounts, and do not share
them with anyone.
Be cautious of unsolicited emails or phone calls that ask for your credit card
information or personal details.
Use credit monitoring services to alert you to any changes in your credit
report.
Consider using virtual credit cards or payment services that do not store your
credit card information.
In summary, credit card fraud is a serious identity threat that can cause
financial and personal losses. By taking proactive measures to protect your
credit card information and monitor your accounts, you can reduce your risk
of falling victim to this type of fraud.
 CASE STUDY

CASE-01: CREDIT CARD FRAUD:-

1 State : Tamil Nadu


2 City : Chennai
3 Sections of law : Section of Law: 66 of Information Technology
Act 2000 & 120(B), 420.467,468,471 IPC.

Background:
The assistant manager (the complainant) with the fraud control
unit of a large business process outsourcing (BPO) organization
filed a complaint alleging that two of its employees had conspired
with a credit card holder to manipulate the credit limit and as a
result cheated the company of INR 0.72 million. The BPO facility
had about 350 employees. Their primary function was to issue the
bank's credit cards as well as attend to customer and merchant
queries. Each employee was assigned to a specific task and was
only allowed to access the computer system for that specific task.
The employees were not allowed to make any changes in the
credit-card holder's account unless they received specific
approvals. Each of the employees was given a unique individual
password. In case they entered an incorrect password three
consecutive times then their password would get blocked and they
would be issued a temporary password. The company suspected
that its employees conspired with the son (holding an add-on card)
of one of the credit card holders. The modus operandi suspected
by the client is as follows. The BPO employee deliberately keyed
in the wrong password three consecutive times (so that his
password would get blocked) and obtained a temporary password
to access the computer system. He manually reversed the
transactions of the card so that it appeared that payment for the
transaction has taken place. The suspect also changed the credit
card holder's address so that the statement of account would
never be delivered to the primary card holder.
Investigation: A procedure to find the Digital Evidence_

The investigating team visited the premises of the BPO and


conducted detailed examination of various persons to understand
the computer system used. They learnt that in certain situations
the system allowed the user to increase the financial limits placed
on a credit card. The system also allowed the user to change the
customer's address, blocking and unblocking of the address,
authorizations for cash transactions etc. The team analysed the
attendance register which showed that the accused was present at
all the times when the fraudulent entries had been entered in the
system. They also analysed the system logs that showed that the
accuser's ID had been used to make the changes in the system.
The team also visited the merchant establishments from where
some of the transactions had taken place. The owners of these
establishments identified the holder of the add-on card.

Current Status:

The BPO was informed of the security lapse in the software


utilised. Armed with this evidence the investigating team arrested
all the accused and recovered, on their confession, six mobile
phones, costly imported wrist watches, jewels, electronic items,
leather accessories, credit cards, all worth INR 0. 3 million and
cash INR 25000. The investigating team informed the company of
the security lapses in their software so that instances like this
could be avoided in the future. This case won the second runner-
up position for the India Cyber Cop Award, for its investigating
officer Mr. S. Balu, Assistant Commissioner of Police, Crime,
Chennai Police. The case was remarkable for the excellent
understanding displayed by the investigating team, of the business
processes and its use in collecting digital evidence
REFERENCE
1. Learning Manual for ETI 22618
(From MSBTE).

2. https://www.britannica.com/topic/credit-card-fraud

You might also like