• No results found

WHITEPAPER. Combating Cybercrime A Collective Global Response

N/A
N/A
Protected

Academic year: 2021

Share "WHITEPAPER. Combating Cybercrime A Collective Global Response"

Copied!
17
0
0

Loading.... (view fulltext now)

Full text

(1)

W H I T E P A P E R

Combating Cybercrime –

(2)

Executive Summary 3 Cybercrime Onslaught – Enemy at the Gates 4 Evil Nexus of Data Breaches and Fraud 4 Web Fraud – Attack Channels and Vectors 5 Tools and Technologies used by Cybercriminals 7 Business Realities – Avoiding Collateral Damage 8

Bad Things Happen to Good People 8 Global Trust Intelligence Network – Collective Response to Cybercrime 9 Delivering Global Trust Intelligence 10

Examine Identity and Activity 12 Global Trust Intelligence – Network of Personas, Devices and Threat Information 14

Validate Business Rules 15 Detailed Analysis 17

(3)

W H I T E P A P E R

Executive Summary

ThreatMetrix detects web fraud by analyzing online identities and their associations with devices using anomaly and velocity rules to make real-time decisions. ThreatMetrix builds a comprehensive Online Persona of the user performing the online transaction by combining online identities and device

(4)

Cybercrime Onslaught – Enemy at the Gates

(5)

W H I T E P A P E R

Web Fraud – Attack Channels and Vectors

(6)

channels. End users can transact with these businesses using browsers through any endpoint device – PCs, Macs, tablets and smartphones. Today, 20%-30% of all transactions originate from mobile devices including purpose-built mobile apps. Cybercriminals indiscriminately use all of these transaction chan-nels to perpetuate online fraud.

We have seen that based on the nexus of data breaches and fraud, cybercriminals have stolen credit cards and online identities when they access online businesses.

(7)

W H I T E P A P E R

(8)

Business Realities – Avoiding Collateral Damage

Although the focus is always on cybercriminals in fraud discussions, we cannot lose sight of the fact that trusted customers account for 95% of all business transactions. And in almost all types of businesses,

customers should be an important capability for any fraud or access management system.

-revenue, identifying trusted customers reduces fraud by establishing a baseline set of trusted customers and detecting anomalies from this baseline typically exhibited by cybercriminals

Bad Things Happen to Good People

Having their real world identity stolen can wreak havoc on any person for no fault of their own.

(9)

W H I T E P A P E R

nightmare scenarios in the online world. Most consumers use the same login-password combination for a number of online accounts including banks, ecommerce sites and social media. When data breaches lead to a user’s account getting compromised with one business, cybercriminals use the stolen identities on various other ecommerce and banking sites.

device blacklist that only further victimizes a genuine trusted customer, recognizing the behavior and historical context of the persona and devices alerts the business of the nefarious situation.

Global Trust Intelligence Network –

Collective Response to Cybercrime

ThreatMetrix provides a comprehensive fraud detection platform with trust as the cornerstone of the transactions with digital identities and trust that these identities are genuine, safe, secure, and mean no harm to the business. Trust is a simple and fundamental concept, yet is very powerful. The ThreatMetrix mission is to deliver trust for all online transactions.

ThreatMetrix authenticates transactions based on the context of the business and the type of

(10)
(11)

W H I T E P A P E R

(12)
(13)

W H I T E P A P E R

Examine Identity and Activity

Identity Attributes

(14)
(15)

W H I T E P A P E R

(16)
(17)

W H I T E P A P E R

V.11.06.2013

For more information, please visit us at:

www.threatmetrix.com

Detailed Analysis

ThreatMetrix offers analytical reports with visualizations to enable security and fraud analysts to make better-informed business and policy decisions. These reports deliver summarization and trends that tuning policies

References

Related documents

This chapter contributes to a broad range of literatures on lifestyle and retirement migration (Benson and O’Reilly, 2009; King et al., 2000; Oliver, 2007) and the

avalanche charge and therefore lower afterpulsing. At the same time the efficiency decreases which has to be compensated with higher excess voltage values, however,

o Limits can be temporarily or permanently increased, contact Travel Accounting Authorized and approved transportation related travel purchases should be for Eastern employees

This program introduces high school students to complex corporate transactions, takes them on enrichment trips to visit corporations, and hosts monthly meetings to revisit curriculum

Year 5 Figure 2.1 Construction project lifecycle 12 Figure 2.2 Risk Management Planning Process 14 Figure 2.3 Probability-impact grid 18 Figure 2.4 Probability and Impacts of Risk

Although the temperature used in the reactive deposition experiments of the bimetallic materials (200ºC) was generally lower than the temperatures employed in the

When asked about the question of Iran’s participation in regional infrastructure projects, Blake replied: “Let me just say that consist- ent with America’s sanctions on Iran, the

Parents and students will obtain the student’s individual class schedule at orientation and via FOCUS approximately one week prior to the start of school.. During orientation,