Friday, May 3, 2019

Technology-Based Bank Frauds Assignment Example | Topics and Well Written Essays - 750 words

Technology-Based Bank Frauds - identification ExampleWhen a officer enters their details on the website, the hackers ar able to access sensitive nurture such as passwords, usernames and security codes that enable them to commit various crimes.Over time, there has been an increase in reported cases of pecuniary theft. This whoremonger be attributed to the advancement in the level of computer software where individuals are able to create software that enables them to conduct various forms of cyber-crimes such as bank fraud Radha (2004). Phishing is in the first place targeted at financial institutions, and there has been the increase in the number of reported theft cases. The keylogger software in the attempted bank theft in the London-based Japanese bank Sumitomo Mitsui is a type of spyware that has the ability to demonstrate the details employ for logging in to a log file. The information is then sent to a specific third-party. Although initially designed for legitimate use such as enabling employers to monitor the employees use of the work computers, the software has been largely used to commit financial fraud. Once the hackers gain access to passwords and new(prenominal) bank account details, they are able to transfer money from different bank accounts to other accounts, any locally or foreign Radha (2004). The keylogger used in the London case enabled the cybercriminals to keep track of the keystrokes used when the unsuspecting victims used the banks client interface to access their bank accounts.There is a need to require strategies that protect ones personal information so as to prevent the occurrence of cyber-crimes financial fraud and bank thefts Senator (1995). There exist various technologies that can be used to prevent both(prenominal) phishing and keyloggers. Keyloggers present a major challenge since their purpose is to get access to confidential information. However, one can employ several techniques so as to avoid the threat of keylog gers.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.