3,125
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Electronic Financial Fraud: Abstract, Definitions, Vulnerabilities, Issues and Causes

      Published
      proceedings-article
      , ,
      Politics of the Machine Beirut 2019 (POM2019)
      Politics of the Machine
      11-14 June 2019
      Electronic Finance, Fraud, Internet of Things IoT, Intrusion Detection/Prevention Systems IDS & IPS, Machine Learning, Deep Learning, Artificial Intelligence, Digital Signature, Digital Profile
      Bookmark

            Abstract

            In financial systems, data under goes many phases of processing such as retrieving phase, data analysis and management phase, decision making and reporting phase making the data flow very comprehensive and complicated. Financial decisions are directly affected by offer and demand information which is relayed through gateways from numerous intangible sources or sensors distributed all over the financial universe. The communication of this information is generally defined as follows: unicast (one to one), multicast (many to many) and broadcast (one to many) generating massive amounts of heterogeneous data dumped in huge databases, the security of which is defined by 3 basic categories: data itself, storage of data and the access of data. Nowadays intangible sources of data, distributed sensors and gateways are titled as IoT which is defined as the interconnection of any device that communicate any type of digital data. IoT is facing an obvious and critical challenge in the area of security and privacy. The explosion of IoT devices needs security to respond to this huge phenomenon growth. Financial world has to take in consideration the evolution of the dark malicious side claiming AI and machine learning. The main goal of organizations is to increase production and maximize profit which can be achieved with IoT, but IoT provides EASEABILITY (ease of use) but not FEASABILITY (authenticity and security in other words) in other words more speed loss security. The enormous amount of raw unprocessed heterogeneous data retrieved from IoT sensor can have a vast impact on many domains in firms especially on the world of finance. By the year 2020, the number of IoT devices is expected to be 25 billion a lot of which will be processing very sensitive data including financial. Along with the rapid growth of IoT application and devices, cyber-attacks will also be improved and pose a more serious threat to security and privacy than ever before. The major attacks in IoT for the year 2020 are expected to be as follows: IoT authentication IoT encryption IoT PKI IoT security analytics IoT API security In future research papers we will conduct more detailed in depth study of the anatomy of each of these attack profiles to determine a possible algorithm of these attacks evolution. Our goal is to establish some type of a smart system to guess and predict future attack profiles… Behavior based analogy. Since malicious code is implementing AI and machine learning, it is too hard to establish an ever-mutating signature of attack.

            Content

            Author and article information

            Contributors
            Conference
            June 2019
            June 2019
            : 9-14
            Affiliations
            [0001]American University of Technology

            AUT, Borj Chmali
            [0002]Lebanese International University

            Beirut, Lebanon
            Article
            10.14236/ewic/POM19.2
            794e80e6-f998-476d-95cd-8acb59903e5c
            © Hoballah et al. Published by BCS Learning and Development Ltd. Proceedings of POM Beirut 2019

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Politics of the Machine Beirut 2019
            POM2019
            2
            Beirut, Lebanon
            11-14 June 2019
            Electronic Workshops in Computing (eWiC)
            Politics of the Machine
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/POM19.2
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Fraud,Digital Profile,Intrusion Detection/Prevention Systems IDS & IPS,Digital Signature,Machine Learning,Electronic Finance,Deep Learning,Artificial Intelligence,Internet of Things IoT

            REFERENCES

            1. The “Internet of Things“ and the Financial Services industry Banking&Securities research leader, Deloitte Services January 22 2014

            2. ACFE (Association of Certified fraud examiners)

            3. Financial firms tackle fraud with AI and biometrics Anna Federova Wednesday October 17 2018

            4. https ://www.ukfinance.org.uk/press/press-releases/banking-industry-prevented-%C2%A3166-billion-fraud-2018 published on 21 03 2019

            5. https://www.scmagazineuk.com/online-fraud-going-does-faster-payments-mean-faster-fraud/article/1492247 published on october 5 2018

            6. The Technical Writer’s Handbook Mill Valley, CA University Science 1989

            Comments

            Comment on this article