Castell, 2013 - Google Patents
Mitigating online account takeovers: The case for educationCastell, 2013
View PDF- Document ID
- 4776161826842799923
- Author
- Castell M
- Publication year
External Links
Snippet
Online account takeovers are one form of identity theft. They occur when an unauthorized party gains online access to an existing bank account by stealing the access credentials to the account and then conducts illegal transactions. These incidents are increasing in both …
- 230000000116 mitigating 0 title abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Al-Musib et al. | Business email compromise (BEC) attacks | |
Vishnuvardhan et al. | A study of digital banking: Security issues and challenges | |
Ali et al. | A comprehensive review on cybersecurity issues and their mitigation measures in FinTech | |
Stanciu et al. | Exploring cybercrime–realities and challenges | |
Hutchings et al. | Cloud computing for small business: Criminal and security threats and prevention measures | |
Glaessner et al. | Electronic Security: Risk Mitigation in Financial Transactions: Public Policy Issues | |
Lee et al. | A study of the security of Internet banking and financial private information in South Korea | |
Waliullah et al. | Assessing the influence of cybersecurity threats and risks on the adoption and growth of digital banking: a systematic literature review | |
Castell | Mitigating online account takeovers: The case for education | |
Scharfman | Crypto phishing and spoofing scams | |
Greer | The growth of cybercrime in the United States | |
SERVIDIO et al. | Safe and Sound: Cybersecurity for Community Banks. | |
Jang et al. | An Analysis of Phishing Cases Using Text Mining | |
Brockett et al. | Managing risk in mobile commerce | |
San Martino et al. | A model for securing e-banking authentication process: antiphishing approach | |
Permana et al. | Personal Data Vulnerability in the Digital Era: Study of Modus Operandi and Mechanisms to Prevent Phishing Crimes | |
Calderon et al. | Toward a Protocol for Tax Data Security | |
Barrigar | Examining the current threat of cybercrime in mobile banking and what can be done to combat it | |
Carmi et al. | Mobile security: A review of new advanced technologies to detect and prevent e-payment mobile frauds | |
Michalow | Analysis of the impact of technological advances on financial institutions | |
Dalpini | Cybercrime Protection in E-Commerce During the COVID-19 Pandemic | |
Ghosh | Mobile ID fraud: the downside of mobile growth | |
Korchenko et al. | Analysis of Modern Solutions for the Identification of Anonymous Users | |
Bott | Preventing fraud in the mobile payment. Review of methods and solutions | |
Oreku | A Rule-based Approach for Resolving Cybercrime in Financial Institutions: The Tanzania case |