Cyber Criminals

Good Essays
Over the past twenty years the banking system has changed and become more efficient for bank customers. Twenty years ago bank customers could not login to their bank account on the Internet and transfer money. However, as the Internet has developed so has online banking. As more people use online banking services the amount of cyber criminals that focus on accessing bank accounts has increased. To log into a bank account in the U.S. a password and security question is needed, in other countries such as Sweden electronic-ID is used to login to a bank account. Because of the current security system in the U.S it makes it easier for cyber criminals to access bank accounts through phishing websites. Phishing websites look similar to bank websites …show more content…
It is common that cyber criminals send out emails to people with a link to a phishing website. For example, cyber criminals send out emails about fake bills that bank customers forgot to pay and if a bank customer believes in the email they will enter their online banking information on the phishing website. If a bank customer enters their login information on a phishing website the cyber criminals who created the website will get the login information right away. When cyber criminals have collected login information to bank accounts they are able to login and steal money from bank accounts by transferring money. If e-ID would be use instead this type of loss event would not occur because bank customers would not have a permanent password, instead e-ID would create a temporary …show more content…
If bank customers would use e-ID cyber criminals will not able to gain any login information through phishing websites because e-ID creates a temporary code when the bank customer starts the program. To implement e-ID as a security system for banks would have annual costs and a one-time cost. The one-time cost for the banks all together is estimated to be between $600,000,000 and $774,000,000. The annual costs for e-ID is estimated to be about $694,000,000 (BBC Monitoring European). It is estimated that the amount it costs for Germany to implement e-ID is about the same for the U.S. banks because the German population is about the same as the amount of online bank users in the U.S. Although it does cost a large amount of money to implement e-ID for banks, it will benefit the banks in the long run. The average losses for banks in the U.S. are at $4.7 billion and if banks choose to implement e-ID the banks will save all together about 4 billion USD a year if the losses are at average. If e-ID would be implemented the banks could have their security department focus on other tasks rather phishing websites, which also would save the banks

Related Documents

  • Decent Essays

    It was harder for thieves to steal information about a person before the internet and networks were in place as they are today. To be able to steal a person identity, the thieves would have to go dumpster diving to steal mail with personal information on it. A theft may try to con a person out of information over the phone with social engineering. According to Easttom (2006), social engineering replies on human nature rather than technology to trick a user to offer up information needed to gain access to a system (p. 11). In some cases, the theft could be a friend or family that comes to the house all the time.…

    • 1567 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    This includes identity theft that has been on the rise (Hayashi et al. 2012, 88). Criminals are coming up with ways of obtaining important personal information of debit card owners. With the stolen information, the thieves can attain debit cards using the other persons’ identity without their actions being discovered by the target. To curb this risk, banks have adopted microchips to augment identity theft against cyber criminals.…

    • 1085 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Computer Viruses Research

    • 2066 Words
    • 9 Pages

    This can range from protecting Facebook conversation chats to protecting online bank account information. Even with things that are password protected hackers still seem to gain access to personal information. Hackers use different kinds of malware to cause damage to their victims. There are many kinds of malware in this world. However, there are…

    • 2066 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    Cybercriminal Crimes

    • 779 Words
    • 4 Pages

    They can amass a plethora of social security numbers, bank account numbers, emails, and credit card numbers from unsuspecting individuals. Before anyone even realizes it cybercriminals can use this stolen information to open multiple accounts and ruin the life of their victim. Many times these criminals never get caught. This is becoming a growing threat throughout the internet-connected…

    • 779 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    What Is Cyber Security?

    • 1268 Words
    • 6 Pages

    These are professionally organized groups which maliciously hack into systems for online money grabbing. This is a major security concern as these groups manage to get away with passwords and other credentials which enable them to steal from online money baking systems. Another security issue includes the hacktivists for instance the infamous anonymous group (Singer & Friedman, 2014). The hacking game has been taken to another level as politically motivated information systems hackers are now doing it in the open and is being acknowledged and accepted as a form of political activism. Political hacktivism is therefore posing serious threat to the security in IT industry as victims feel the monetary pain to forceful compelling to certain political affiliations (Shoemaker & Sigler,…

    • 1268 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Social security fraud takes place when a party intentionally gives false information, conceals facts, or uses a Social Security number illegally to receive benefits from the Social Security system (Stroup, 2014). With someone’s information a suspect can purchase anything if they have access to the number. Social security numbers are something that people may only have to identify them. There are many other types of identity theft but these are the main ones that are normally brought to court and people are prosecuted for these…

    • 1648 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    adults” (Vakhitova, Reynald & Townsley, 2016 p. 170 para.2) will experience some type of cyber stalking once in their lives and “more than 70% witnessed someone else being subjected to it” (Vakhitova, Reynald & Townsley, 2016 p. 170 para.2). Cyber stalking can resemble stalking in the real world because it involves the pursuit of the person that is being stalked, the victim is harassed and the stalkers contact the victim in “unsolicited fashion initially via the Internet and e-mail” (NIJ, 2007 para. 3). A lot of the times those that commit cyber stalking crimes against another person are bitter exes, who are trying to get back at the other because of a bad break up or those that feel they need to get revenge on another person, a co- worker who is upset over a work related issue, or even someone who is on a power trip and use stalking to boost their own ego. Online stalking unfortunately is made somewhat easy to get away with due to the “anonymity of the Internet allows the cyber stalker to easily conceal one’s identity” (Pittaro, 2007 p.185) because they can create multiple accounts online to use in order to send emails or create multiple screen names in order to post on social media sites.…

    • 1636 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    It's true that Macs used to be less of a target, simply because criminals used to go after the largest number of users - hat is Windows - but this is changing. Determined attackers are able to find new ways to exploit users on almost any platform. Two-step verification If your email or cloud service offers it - Gmail, Dropbox, Apple and Facebook do - take the trouble to set this up. In addition to entering your password, you are also asked to enter a verification code sent via SMS to your phone. So a hacker might crack your password, but without the unique and temporary verification code should not be able to access your account.…

    • 1448 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Internet Banking Security

    • 1002 Words
    • 5 Pages

    People who use online business can be involved in money laundering organizations without knowing. As a result, when FBI looks for that organization, people get into trouble (Tang, 2015,…

    • 1002 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    The website contained detailed information about government departments, circulars, reports, and similar other important data. The hackers did not manage to destroy all the information on the website, only the home page was damaged, and the website was restored. 9) Skimming Skimming is a cybercrime where scammers steal your credit / debit card details by fitting a skimmer device to an ATM machine. The device reads and records the card details from the magnetic strip on the card, resulting in misuse and frauds. The information from the strip is ‘skimmed’ to create a fake or cloned card with the stolen details.…

    • 1304 Words
    • 6 Pages
    Decent Essays