scholarly journals An Effective Model for Fraud Risk Management in Mitigating Telecommunication Fraud Incidences

2021 ◽  
Vol 8 (2) ◽  
pp. 112-116
Author(s):  
Nazatul Shima Abdul Rani ◽  
K. Sarojani Krishnan ◽  
Khairul Azizan Suda ◽  
Chahhoub Fatimazahra

In the context of Malaysia, the most common types of cyber attacks are denial of service, intrusion attempts, spam, vulnerability report, fraud, malicious code, and content-related attacks as reported by Cyber Security Malaysia. However, since 2011,  cyber attacks such as intrusion attempts, denial of service and spam are decreasing steadily as a result of security measures that have been taken by companies or internet users. Nevertheless,  cyber attacks which are steadily increasing are cyber harassment, intrusion and fraud. Approximately 5,328 fraud incidences were reported in 2011 while in 2020, the number of cases rose to 7,593 cases. Out of these cyber attacks in Malaysia, the most proliferating ones have been identified as fraud incidences. Thus, it is highly needed to come up with and propose the best fraud risk management strategy to handle fraud incidences among internet users and internet providers through the utilization of business intelligence tools, and quality enhancement via quality systems in place, quality information, and quality users. With these tools in hand, it is hoped that the proposed model will serve as a framework to mitigate and/or prevent the occurrence of fraud incidences.

Author(s):  
Varsha P. Desai ◽  
Dr.K.S. Oza ◽  
Dr.P.G. Naik

Use of internet and communication technologies plays significant role in our day to day life. Data mining capability is leveraged by cybercriminals as well as security experts. Data mining applications can be used to detect future cyber-attacks by analysis, program behavior, browsing habits and so on. Number of internet users are gradually increasing so there is huge challenges of security while working in the cyber world. Malware, Denial of Service, Sniffing, Spoofing, cyber stalking these are the major cyber threats. Data mining techniques are provides intelligent approach for threat detections by monitoring abnormal system activities, behavioral and signatures patterns. This paper highlights data mining applications for threat analysis and detection with special approach for malware and denial of service attack detection with high precision and less time.


Author(s):  
Rodger Jamieson ◽  
Stephen Smith ◽  
Greg Stephens ◽  
Donald Winchester

This chapter outlines components of a strategy for government and a conceptual identity fraud enterprise management framework for organizations to manage identity crime occurring via cyberspace. Identity crime, related cybercrimes and information systems security breaches are insidious motivators for governments and organizations to protect and secure their systems, databases and other assets against intrusion and loss. Managing identity crime is a critical step in cyber security and global information assurance. Strategy components and conceptual model elements are constructed through analysis and synthesis of models from academic literature, and reports by industry and government professionals. A comprehensive government strategy with a legislative component reinforces organizational policies to combat identity crimes. Model components used to develop our identity fraud organizational framework were selected from cost of identity fraud, identity risk management, identity fraud profiling, and fraud risk management literature. Our framework is organized into anticipatory, reactionary and remediation phases.


Author(s):  
Irina Tatomur

Introduction. With the rapid adoption of computer and networking technologies, educational institutions pay insufficient attention to the implementation of security measures to ensure the confidentiality, integrity and accessibility of data, and thus fall prey to cyber-attacks. Methods. The following methods were used in the process of writing the article: methods of generalization, analogy and logical analysis to determine and structure the motives for phishing attacks, ways to detect and prevent them; statistical analysis of data – to build a chronological sample of the world's largest cyber incidents and determine the economic losses suffered by educational institutions; graphical method – for visual presentation of results; abstraction and generalization – to make recommendations that would help reduce the number of cyber scams. Results. The article shows what role cyber security plays in counteracting phishing scams in the educational field. The motives for the implementation of phishing attacks, as well as methods for detecting and preventing them, have been identified and regulated. The following notions as "phishing", "submarine" and "whaling" are evaluated as the most dangerous types of fraud, targeting both small and large players in the information chain of any educational institution. An analytical review of the educational services market was conducted and a chronological sampling of the largest cyber incidents that occurred in the period 2010-2019 was made. The economic losses incurred by colleges, research institutions and leading universities in the world were described. It has been proven that the US and UK educational institutions have been the most attacked by attackers, somewhat inferior to Canada and countries in the Asia-Pacific region. It is found that education has become the top industry in terms of the number of Trojans detected on devices belonging to educational institutions and the second most listed among the most affected by the ransomware. A number of measures have been proposed to help reduce the number of cyber incidents. Discussion. The obtained results should be taken into account when formulating a strategy for the development of educational institutions, as well as raising the level of awareness of the representatives of the academic community in cybersecurity. Keywords: phishing, cyber security, cyber stalkers, insider threat, rootkit, backdoor.


2013 ◽  
pp. 1705-1738
Author(s):  
Ashfaq Ahmad Malik ◽  
Athar Mahboob ◽  
Adil Khan ◽  
Junaid Zubairi

C4ISR stands for Command, Control, Communications, Computers, Intelligence, Surveillance & Reconnaissance. C4ISR systems are primarily used by organizations in the defense sector. However, they are also increasingly being used by civil sector organizations such as railways, airports, oil, and gas exploration departments. The C4ISR system is a system of systems and it can also be termed as network of networks and works on similar principles as the Internet. Hence it is vulnerable to similar attacks called cyber attacks and warrants appropriate security measures to save it from these attacks or to recover if the attack succeeds. All of the measures put in place to achieve this are called cyber security of C4ISR systems. This chapter gives an overview of C4ISR systems focusing on the perspective of cyber security warranting information assurance.


2016 ◽  
Vol 59 (1) ◽  
pp. 13-18 ◽  
Author(s):  
Megan F. Hess ◽  
James H. Cottrell

Sign in / Sign up

Export Citation Format

Share Document