Saturday, June 15, 2019

Technology-Based Bank Frauds Assignment Example | Topics and Well Written Essays - 750 words

Technology-Based Bank Frauds - Assignment ExampleWhen a user enters their details on the website, the hackers are able to retrieve sensitive culture such as passwords, usernames and security codes that enable them to broadcast various crimes.Over time, there has been an increase in reported cases of fiscal theft. This can be attributed to the publicity in the level of computer software where individuals are able to create software that enables them to conduct various forms of cyber-crimes such as bank fraud Radha (2004). Phishing is in the first place targeted at financial institutions, and there has been the increase in the number of reported theft cases. The keylogger software in the attempted bank theft in the London-based Japanese bank Sumitomo Mitsui is a type of spyware that has the ability to record the details used for logging in to a log file. The information is then sent to a specific third-party. Although initially designed for legitimate use such as enabling employer s to monitor the employees use of the work computers, the software has been largely used to commit financial fraud. Once the hackers gain access to passwords and other bank account details, they are able to transfer money from different bank accounts to other accounts, every locally or foreign Radha (2004). The keylogger used in the London case enabled the cybercriminals to keep track of the keystrokes used when the unsuspecting victims used the banks client interface to access their bank accounts.There is a need to adopt strategies that protect ones personal information so as to prevent the occurrence of cyber-crimes financial fraud and bank thefts Senator (1995). There exist various technologies that can be used to prevent both phishing and keyloggers. Keyloggers present a major challenge since their aspire is to get access to confidential information. However, one can employ several techniques so as to avoid the threat of keyloggers.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.