Cybersecurity Unit III
Cybersecurity Unit III
Basic Flow:
• Merchant send
transaction to Bank
• Bank transmits the
request to the
authorized cardholder
• Cardholder approves or
rejects (Pwd protected)
• Bank/ Merchant is
notified
• Credit card transaction is
completed
Types and Techniques for Credit card Frauds
Traditional Techniques
• Paper based Fraud-application fraud
– Opening account on someone else’s name by stealing the required
documents (PII is built-Personally Identifiable Information)
Types:
– ID Theft
– Financial fraud
Modern Techniques
• Criminals produce Fake or doctored cards (or)
• Skimming is used to commit Fraud (or)
• Site cloning or False merchant sites (Phishing)
Types:
– Triangulation
– Credit card Generators
Security Challenges Posed by Mobile Devices
Mobility brings two main challenges to cyber security:
i. first, on the hand-held devices, information is being taken outside the
physically controlled environment and
ii.second remote access back to the protected environment is being granted.
Bluetooth Hacking
Threats of Bluetooth Hacking
Common Bluetooth Attacks
Common Bluetooth Attacks
Common Bluetooth Attacks
Common Bluetooth Attacks
Assignment Questions