ELECTIONIC MONEY INFORMATION SECUITY RISKS AND

advertisement
ELECTIONIC MONEY; INFORMATION
SECUITY, RISKS AND IMPLICATIONS
Presented By:
Francis Karuhanga, FCCA
Head of Internal Audit
Stanbic Bank Uganda
Disclaimer
This presentation was made at the annual ISACA Kampala Chapter
Information Security Workshop on 23rd October 2012 at Protea Hotel,
Kampala. The presentation was designed to create dialogue and elicit
comments amongst the workshop participants and should be viewed
within the context of these objectives.
The presentation contains information in summary and therefore is
intended for general guidance only. If is not intended to be a substitute
of a detailed research of the exercise of professional judgement.
Stanbic Uganda and Standard Bank Group cannot accept any
responsibility for loss occasioned to any person acting or refraining
from action as a result of any material in this presentation.
Content
•
•
•
•
•
•
•
Evolution of Money
Definition of Electronic Money
Electronic Money - Payment Systems
Electronic Money and Information Security
Key Information/E-money Security Risks
Implications
Conclusion
Evolution of Money
First was:
• Barter Trade
In the past, scarce precious metals
such as gold and silver were used
because they y had intrinsic value in
the form of money, that is;
 a medium of exchange,
unit of account, and
store of value
Evolution of Money
Then
• Paper and Coins
The intrinsic value attributed to
precious metals was embedded in
paper; hence the advent of paper
money.
Paper
ideally
carries
information to which intrinsic value is
attached – as long as its issued by a
trusted authority
Evolution of Money
• The inconvenience of carrying large quantities of paper currency was
mitigated by the introduction of Cheques that contained information
identifying the owner’s account.
Evolution of Money
And Now:
• Electronic Money – From paper money to binary codes of ones (1)
and zeros (0) .
Electronic money - refers to "stored value" or
“intrinsic value” or prepaid payment mechanisms
for executing payments via point of sale
terminals, direct transfers between two devices,
or over open computer networks such as the
Internet.
Electronic money is also known as e-currency, emoney, electronic cash, electronic currency,
digital money, digital cash, digital currency, cyber
currency
E-money mainly refers to Electronic Payment
Systems/channels
Examples of E-Money (Electronic
Payment Systems
• Electronic Clearing System (ECS) - Banks use Society for Worldwide
Interbank Financial Telecommunication (SWIFT, a secure messaging
system) to electronically deliver data accompanying instruments to the
ECS.
• Electronic Funds Transfer (EFT)
• Real Time Gross Settlement (RTGS) - an online banking system for
settling transactions
• Card payment systems including ATMs, Credit cards, VISA cards etc
• Mobile Money – payment system that uses telecommunication
infrastructure
• Internet banking
• Mobile banking
• Payway , Paypal etc
Electronic Money and Information
Money has become electronic information: no gold or paper is
required. Money is just a coded series of binary digits: 1 and 0.
=
Information
Think of a mobile money user who loses his/her phone, what is the
is normally their worry, (phone, SIM card, or the PIN)?
Implying, securing information translates into security of money!
Information security and Electronic
Money
» In the past, security focused on physical security by
protecting money just as if it were gold. It was kept behind
stone walls and locked vaults; often guarded by men with
weapons.
• As money has transformed from gold and silver to paper currency, to
Cheques, and today to electronic information, the walls of the bank
have also transformed from stone and steel to electronic walls.
• Transformation of money to electronic information has resulted new
security controls including:
– Firewalls,
– intrusion detection systems,
– intrusion preventions systems, and
– access control lists are all designed to protect money as
information
Information security and Electronic
Money
• Even for paper money and Cheques; all measures were put in place to
protect the information content of money. These include:
– Use of watermarks,
– special paper,
– complex colors and graphics,
– security threads, and
– other anti-counterfeiting technologies - to ensure trust
Key Information/E-money
Security Risks
• The three major information security risks related to e-money are:
– hacking into bank computer systems through exploitation of
technical vulnerabilities,
– intentional or accidental data loss (laptop, tape or other data
breeches), and
– identity theft or unauthorized account access by gaining access
keys through theft, phishing, social engineering, or other means.
• The mode of exploitation of these risks varies from one payment
system to another (i.e. card, internet, mobile banking etc)
Key Information/E-money Security Risks
Common risks
• Duplication of devices – common in card-based systems, the
method of attack could be the creation of a new device that is
accepted by other devices as genuine. Some of the ways this is
accomplished is through:
– Reproduction, re-embossing or altering of a real card
– a criminal who secretly copies the data from the magnetic stripe of
a valid card and transfers it onto the magnetic stripe of a new
(counterfeit) card
– the genuine cardholder still has possession of his card and does
not know anything is wrong the criminal is making transactions
using the counterfeit card
Key Information/E-money Security Risks
Common risks
Duplication of devices
– Various methods:
 Fixing skimming device over ATM card slot
 Distracting cardholder and skimming data using handheld
skimming device
 Attaching skimming device to ATM lobby entrance card
swipe
 Genuine card capture
 Micro-camera
 Fake PIN pad fixed over genuine PIN pad
 ‘Shoulder surfing’
 Attaching fake PIN pad to ATM lobby entrance card
swipe
Key Information/E-money Security Risks
Common risks
• Alteration or duplication of data or software - modifying data stored
on a genuine electronic money device in an unauthorised manner..
• For example account takeover (existing accounts) - Fraudster obtains
minimal valid information required from discarded documents, mail
theft, insider collusion, theft of personal belongings and online
data/theft of public records
– Perpetrator:
• Uses some true cardholder information
• Changes cardholder’s mailing address
• Requests replacement or additional card/PIN
to be mailed to new address
– Perpetrators log on to bank web sites, enroll as legitimate
cardholder, and change the account address
Key Information/E-money Security Risks
Common risks
• Alteration of messages –
– Attackers could attempt to change the data or processes of a
device by deleting messages, replaying messages, substituting an
altered message for a valid one or observing messages with an ill
intention
– Communications between devices could be intercepted by outside
attackers when sent across telecommunications lines, through
computer networks or through direct contact between devices.
Key Information/E-money Security Risks
Common risks
• Theft - Data stored on devices could also be stolen via unauthorised
copying.
• For example, an attacker could intercept messages between a
genuine user and an issuer, or insert an unauthorized software
program into a user's personal computer that enabled the attacker to
copy electronic notes stored or in transmission.
Phishing

Some of repute will not ask you to
update or change sensitive information
online.

E-mails that bear dire warnings and
request sensitive information are
probably a scam.
Key Information/E-money Security Risks
Common risks
• Repudiation of transactions - Customer completes a transaction,
but denies transaction took place, and demands reimbursement of
funds.
• Malfunctions –
– Electronic money products could suffer from instances of
accidental corruption or loss of data stored on a device, the
malfunction of an application, such as accounting or security
functions, or failures in the transmission of messages. If exploited
by unscrupulous holders before being detected, certain types of
malfunction could cause losses to the issuer
– Service provider risk - Service provider may not deliver services
expected by the bank; deficiencies in system or data integrity or
reliability may result.
Implications
• Financial loss: - access to just a PIN can cost a customer or a bank
in billions of money. These include costs associated with reimbursing
customer losses and with reconstructing accurate data on customers.
Possible losses from redeeming electronic money for which no
corresponding prepaid funds were received. Customers may perceive
the bank as being unreliable. A bank may face legal or regulatory
sanctions, and negative publicity.
• Reputation: - Customers may perceive the bank as being unreliable
hence affecting the “brand integrity”
• Litigations - as a result os failure to protect customer privacy. A bank
releases information profiling the pattern of customer financial
transactions without customer authorization.
Implications
• High cost capital and operational expense for banks –
– Most information security measures like encryption imposes an
additional processing burden on computers that may significantly
slow the performance of banking systems; hence financial
institutions have incur costs of enhancing/upgrading their systems
– The use of tamper-resistant devices incorporated into stored-value
cards and merchant hardware is another capital expenditure to the
banks
• Crime with no crime scene–
– The evolution of e-money and other technology has left access to
information open to anyone any where at anytime. Most e-money
systems are borderless. Therefore, a criminal does not have to be
on site to commit a crime.
Conclusion
• In today’s world money has been reduced to binary data hence access
to information/data is as good as access to cash. The advent of emoney is touted for having provided convenience being able access
money anywhere at any time. It has also opened to so many access
points compared to the gold and silver that would only require physical
security.
• Unauthorised access to e-money can be by anyone and anywhere at
anytime. Therefore, information security is everyone’s responsibility
and
it begins with you!
Download