[go: up one dir, main page]

Castell, 2013 - Google Patents

Mitigating online account takeovers: The case for education

Castell, 2013

View PDF
Document ID
4776161826842799923
Author
Castell M
Publication year

External Links

Snippet

Online account takeovers are one form of identity theft. They occur when an unauthorized party gains online access to an existing bank account by stealing the access credentials to the account and then conducts illegal transactions. These incidents are increasing in both …
Continue reading at fraser.stlouisfed.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • G06Q40/025Credit processing or loan processing, e.g. risk analysis for mortgages

Similar Documents

Publication Publication Date Title
Al-Musib et al. Business email compromise (BEC) attacks
Vishnuvardhan et al. A study of digital banking: Security issues and challenges
Ali et al. A comprehensive review on cybersecurity issues and their mitigation measures in FinTech
Stanciu et al. Exploring cybercrime–realities and challenges
Hutchings et al. Cloud computing for small business: Criminal and security threats and prevention measures
Glaessner et al. Electronic Security: Risk Mitigation in Financial Transactions: Public Policy Issues
Lee et al. A study of the security of Internet banking and financial private information in South Korea
Waliullah et al. Assessing the influence of cybersecurity threats and risks on the adoption and growth of digital banking: a systematic literature review
Castell Mitigating online account takeovers: The case for education
Scharfman Crypto phishing and spoofing scams
Greer The growth of cybercrime in the United States
SERVIDIO et al. Safe and Sound: Cybersecurity for Community Banks.
Jang et al. An Analysis of Phishing Cases Using Text Mining
Brockett et al. Managing risk in mobile commerce
San Martino et al. A model for securing e-banking authentication process: antiphishing approach
Permana et al. Personal Data Vulnerability in the Digital Era: Study of Modus Operandi and Mechanisms to Prevent Phishing Crimes
Calderon et al. Toward a Protocol for Tax Data Security
Barrigar Examining the current threat of cybercrime in mobile banking and what can be done to combat it
Carmi et al. Mobile security: A review of new advanced technologies to detect and prevent e-payment mobile frauds
Michalow Analysis of the impact of technological advances on financial institutions
Dalpini Cybercrime Protection in E-Commerce During the COVID-19 Pandemic
Ghosh Mobile ID fraud: the downside of mobile growth
Korchenko et al. Analysis of Modern Solutions for the Identification of Anonymous Users
Bott Preventing fraud in the mobile payment. Review of methods and solutions
Oreku A Rule-based Approach for Resolving Cybercrime in Financial Institutions: The Tanzania case