Cyber Criminals

Improved Essays
Over the past twenty years the banking system has changed and become more efficient for bank customers. Twenty years ago bank customers could not login to their bank account on the Internet and transfer money. However, as the Internet has developed so has online banking. As more people use online banking services the amount of cyber criminals that focus on accessing bank accounts has increased. To log into a bank account in the U.S. a password and security question is needed, in other countries such as Sweden electronic-ID is used to login to a bank account. Because of the current security system in the U.S it makes it easier for cyber criminals to access bank accounts through phishing websites. Phishing websites look similar to bank websites …show more content…
It is common that cyber criminals send out emails to people with a link to a phishing website. For example, cyber criminals send out emails about fake bills that bank customers forgot to pay and if a bank customer believes in the email they will enter their online banking information on the phishing website. If a bank customer enters their login information on a phishing website the cyber criminals who created the website will get the login information right away. When cyber criminals have collected login information to bank accounts they are able to login and steal money from bank accounts by transferring money. If e-ID would be use instead this type of loss event would not occur because bank customers would not have a permanent password, instead e-ID would create a temporary …show more content…
If bank customers would use e-ID cyber criminals will not able to gain any login information through phishing websites because e-ID creates a temporary code when the bank customer starts the program. To implement e-ID as a security system for banks would have annual costs and a one-time cost. The one-time cost for the banks all together is estimated to be between $600,000,000 and $774,000,000. The annual costs for e-ID is estimated to be about $694,000,000 (BBC Monitoring European). It is estimated that the amount it costs for Germany to implement e-ID is about the same for the U.S. banks because the German population is about the same as the amount of online bank users in the U.S. Although it does cost a large amount of money to implement e-ID for banks, it will benefit the banks in the long run. The average losses for banks in the U.S. are at $4.7 billion and if banks choose to implement e-ID the banks will save all together about 4 billion USD a year if the losses are at average. If e-ID would be implemented the banks could have their security department focus on other tasks rather phishing websites, which also would save the banks

Related Documents

  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Commonwealth Bank of Australia(CBA) used a new technology called two-factor authentication program for the online banking service. "Customers tell us that stronger Internet security is important and so we have decided to make NetCode security available to all NetBank customers. All customers can now register for NetCode SMS within NetBank," Cameron(2007)said. Cameron is the executive member of CBA’s group. Commonwealth Bank of Australia provided the free NetCode SMS which will freely send the customers telephone so the customers can get the one-time password to authorize transaction.…

    • 1001 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    After reviewing the case study as well as outside research I think that Target epically the Chief Executive Officer Gregg Steinhafel for the most part acted responsibility in the wake of their December 18, 2013 data breach that effected over 40 million customers financial information, as well as, the dissemination of personally identifiable information of upwards of 70 million customers. The first thing that I want to discuss is simply a data breach. When this article was written in 2006 they stated that in the next three years that they expected that the income generate by fees charged by a bank for customers would increase by 14%(Valentine, 2006). That showed that debit cards were becoming far more popular, and that was good news for…

    • 933 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Prosecution of Cyberbullies Twenty percent of children ages 11-18 have been cyberbullied, and 10% of those have also been the offender of cyberbullying. Cyberbullying is a growing problem among the teens of this new, technology-driven generation. Many people have the opinion that cyberbullies should be prosecuted. Offenders of cyberbullying cause harm to the victim and are becoming more common in society.…

    • 448 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    To respond to a large number of clients requires some sort of filtering; the bank can’t have an assigned employee for each client, which would be impossible. In recent years, the technology has become inseparable (Young). Banking uses functions of technology to support its services. Bank of America has service system makes almost customers feel comfortable.…

    • 1082 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Pros And Cons Of Venmo

    • 1039 Words
    • 5 Pages

    Summary: Due to recent technological advancements, anyone can easily do their banking without having to go to their local bank branch. Now, people use Venmo, a free digital wallet that lets a person deposit checks and/or money and to send money to friends and family. This convenience for the user puts unfortunately puts the jobs of the people who work at bank branches at risk. According to a new Citigroup study, thirty percent of bank jobs may be lost between 2015 to 2025 die to retail banking automation. In addition to Venmo, there are also many other payment businesses such as Square, Apple Pay, and Paypal.…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Phishing is a way to try and get private information from unsuspected individuals. Frauds try to get passwords of email accounts and bank information. With the use of fake websites or other smart tricks. With the information obtained the frauds can steal your money or identity (phishing, 2016)…

    • 370 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Authentication With the rapid growth of Web-based applications, the Internet is a perfect target for hackers. Attacking an individual person or a multi-billionaire company is achievable in a click of a button. Today, almost everything is done by means of using the Internet, from simple email access to paying bills online, managing online banking, filling out taxes, shopping, and so on. As a result, the Internet has become a feeding ground for hackers. These presents a great deal of concerns and challenges for the organization’s security.…

    • 820 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Some Internet users recklessly reply to unsolicited email that promises money or prizes, but requires the individual to provide identifying data, such as name and address and checking account or credit card numbers with the expiration date and security code, which can allow full-blown identity theft. Identity theft, on a much larger scale, is committed through the use of high technology. This identity theft depends on legal and economic identity in contemporary society that is largely “virtual.” This theft depends on access to consumer data through the Internet, such as files that are the property of a credit card payment processing company.…

    • 467 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    As technology grows it makes it easier for people to steal banking information and spend your money. Hackers can see credit card numbers when not using a secure website when buying things online and use that to buy things on their own. Personally, I have had this experience and find out about it from checking my bank account and saw I had no money in my account and had to file a police report because it happened so close to home because the bank did not believe I did not spend that money myself. Speaking from my own experience, it is important to keep up with how much you are spending and see if it goes with your banking information. Install Firewalls…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Identity theft is when a criminal obtains the personal information that belongs to someone else in order for personal of financial gain. The criminal can steal a Social Security number or a driver’s license number to pose as the person that the information was stolen from. For example, the information can be used to help the criminal get credit cards, material things, and sometimes false credentials for immigrants. In order to obtain personal information, identity thieves can hack into computer systems. They can obtain what they need from trash cans.…

    • 783 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Detecting Identity Theft

    • 542 Words
    • 3 Pages

    Also with technology there are now devices that can read a person’s credit card information which can be transmitted electronically. By using a device like this if you are very careful planting it and making sure you don’t leave physical evidence could go unnoticed for a long period of time. Plus it provides the thief with multiple identities of which they can assume without having to revisit where the device is…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Banking data must be separated into levels of security. At the highest level of security would be customer information (this includes: customer name, date of birth, social security number, balance, etc.). Another high level of security must be banking employees’ information (this includes: customer name, date of birth, social security number, etc.). In order to keep the data secure, we must secure the database. To properly secure that database, there are key areas that should be considered: Users and roles, Default account, Patching, Password Management, Parameter settings, Privileges and permissions, Profiles and…

    • 967 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Tittle The use of SWOT analysis in the department of Home Affairs to identify a worthwhile project Contents Introduction 3 About the Department of Home Affairs 4 The Department of Home Affairs Vision 4 The Department of Home Affairs Mission 4 Strategic management 4 Weaknesses in the department of Home Affairs 4 eChannel Live Capture System Project 5 Benefit Realization 5 Improved Customer Service 6 Other Potential Savings 6 Electronic Banking 6 Security 6 Conclusion 6 Reference 7 Introduction The Department of Home Affairs (DHA) has introduced a new Smart Identity card (Smart ID) to replace the green bar-coded identity book.…

    • 1779 Words
    • 8 Pages
    Great Essays