Vous êtes sur la page 1sur 7

BANKING INDUSTRY: SECURITY AND PRIVACY

Gino Bautista, Natasha Monica Conde, Treisha Marie Tan, Melchor Tatlonghari,
and Philip John Torres
EM-TECH S16
natahaconde@yahoo.com

De La Salle University - Manila

ABSTRACT person/s involved. Loop holes on systems whether


manual or not encourages people to do certain
This research paper will provide audience idea of courses of malicious actions. Good for the
what issues encountered by banking industry and banking industry there are now exhaustive efforts
its consumers today. It will first give overview on to create systems custom-made for them but are
the background of banking when it terms to very pricey which is just for a secured system.
security and privacy and why it is very vital today. Needs necessitates solutions.
This paper aims to provide proposition on the
issues security and privacy and discuss the The trend in the banking industry to is to
concerns behind the two main issues. The study incorporate services to daily activities as much as
will also briefly discuss fraud, identity theft, credit possible. Take advantage of the Internet as an
card theft and phishing in terms of banking. Data avenue to conduct banking activities. Later on the
and statistics taken from studies did by issue will arise from the threats of the security in
professionals will also be presented within the the internet. The more the customers enact
research to prove the dilemma happening. This activities directly to the bank online – anytime,
paper aims to enrich people’s knowledge when it anywhere – the more responsibility is demanded
terms to security and guide them in curing threats from the banks. With every price matches the
they encounter. development of solution. There is a vast
technology the banks may choose from. What is
1. INTRODUCTION important is to match the solution with the real
business problem faced by the companies.
A very relative issue to the banking industry that
is highly scrutinized today is how to keep the 2. SECURITY AND PRIVACY
information “secured”. A simple transaction
performed by the customer is in by that very raw Security by definition is the freedom of danger
nature already crucial information about that and/or risk, freedom from anxiety and/or fear. It is
person. People “trust” the banks to uphold the confidence on something that assures you safety.
strictest sense of information privacy possible. While in the computer industry, security maybe
The people disclose a considerable amount of regarded as a different term. Security in computer
confidential information about themselves to the systems means ensuring data storage in a
bank take for example the tedious prerequisite just computer that it will not be accessed by people
to open an account. If the information is not that are not authorized to access them. It may be
properly handled and managed this could leak to through putting passwords on files and/or
other people and will post a serious threat to the
encrypting the data, so that it is undecipherable by your tax accounts, and even go to jail with your
those without the encryption key. name.

Encryption is converting data into another Here is the a graph of identity theft
form of data that is unreadable to the naked eye, complaints according to Federal Trade
and in order to recover the original state of the Commission (FTC)
data an encryption key is required. Passwords are
secret set of characters that may is composed of
alphanumeric digits that gives access to user to
particular data.

Security in computer systems not only


refers to protection of data, but also refers to
protection of hardware itself. The data is
inaccessible if the hardware necessary to access
data is compromised.
Figure 1. Identity Theft Complaints

The banking industry is mostly operated


23% of which are allotted to credit card
through computer systems today and banking
fraud, 13% to bank fraud, and 5% to loan frauds.
industry is a very critical part of it. There are
That is almost half of all the fraud crimes in the
different kinds of issues plaguing the banking
area of banking industry. Sad part is that the
industry that hinders users from having confidence
victim may not be aware that he/she is already a
in their banks; this is an issue because it will
victim of fraud, because thieves today have very
prevent people from actually doing transactions
sophisticated and advanced ways of committing
with the bank which is the lifeblood of the
identity theft, one of which is phishing.
industry.
Phishing is creating a bogus site that will
Fraud is one of the many prevalent issues
ask for personal information. It may be your social
at hand in the banking industry. Fraud is deception
security number or credit card number or anything
done for personal benefits, usually monetary gain.
that they could use on you. These bogus site will
Fraud is usually done through identity theft. There
appear official as the regular sites, they could be a
are many different kinds of frauds; the one most
page from the website of your bank stating that
rampant in the banking industry is the credit card
you need to update your personal information on
theft. Identity thieves just needs a copy of your
their database and once you give them your
credit card and some of personal numbers like
information, that’s when they take money from
your social security numbers and/or password and
you without you knowing it.
they can go on a shopping spree without having to
pay any cash ever. According to California State
There are many ways to commit identity
Senator Debra Bowen; "Identity theft is one of the
theft not just phishing. They can even go to as low
easiest, most risk-free crimes thieves can commit.
as even cloning your credit card itself. With
They don't need a gun, a knife, or a getaway car.
almost 50% of fraud incidents in the banking
All they need is someone's Social Security number
industry, security indeed plays a very critical role
and a pen." Thieves are able to do many different
in the industry, and should be taken more
things when you are compromised; they make
seriously.
loans, buy things, they can even get refunds of
3. THREATS IN SECURITY of the stolen card and the victim’s card is still out
in the public then this can be a serious threat to the
Today, consumers use technology to make card holder. Victims of this form of identity theft
banking transactions. These innovative have had either their credit card or their credit
technologies are online banking, mobile banking, card number misused by a thief. In 2005, figure
credit card, and ATM. shows that 3.2 million Americans fell victim to
this form of identity theft that’s why this event
Advancement of technologies creates should be taken seriously.
positive impact to society and industries.
However, there are still negative effects of this, In the Philippines, Metrobank have a way of
especially to the most important factor in banking, detecting this kind of event where the system have
security. analytics and intelligence in which they were able
to detect if the card is purchasing a lot and
One of these problems is fraud. Bank Metrobank will try to warn or notify the card
fraud is the process of obtaining money, assets, or holder if those purchases that s/he made are
other property owned or held by a financial legitimate. This is a very good system because it
institution in a fraudulent means. Banking fraud in will prtect their customers from credit card theft
law applies to actions that employ a scheme or or illegal use of their credit cards. The system has
artifice, as opposed to bank robbery or theft. This the ability to detect suspicious use of credit card
is the reason why bank fraud are considered a and this is a very good tool in catching those
white-collar crime [1]. The mechanics of banking thefts.
fraud includes Rogue traders, Fraudulent loans,
Wire fraud, Forged or fraudulent documents, The last issue in security is phishing or
Uninsured deposits, Demand draft fraud, Forgery internet fraud. This is when people send forged e-
and altered cheques, Cheque kiting, and Money mail, impersonates an online bank and then,
laundering. There is also what you call Payment directs this email to the user to a forged web site
card fraud which very common nowadays. It is which is designed to look like the login to the
crime where criminals stole credit cards and legitimate site but which claims that the user must
ATMs or duplicate or skim credit card and ATM update personal info. This information is stolen
information [1]. and then used in other frauds such as theft of
identity or online auction fraud [1].
There is also identity theft. It sometimes
called impersonation. This is a very common There are still other problems encountered
problem and is spread both locally and internally. in banking industry when it terms to security;
It operates by obtaining information about an however, the ones stated above are the very
individual, and then uses this information to apply common. Other problems will be internal fraud
for credit cards with the person’s name in it. which is focused on the employees, accounting
Information can be taken from birth certificate, fraud, falsification of loan application, etc.
social security number, and old credit cards [1].
4. PROBLEMS IN PRIVACY
Third is the Credit Card Theft. Credit card
theft is a very serious problem in banking because Today in the age where information is power and
once the card has been stolen, the thief can do tons many threats arise with the advancement of
of purchase while crediting the amount to your technology, privacy has been a very important
account. If the victim failed to report the incident issue especially when it comes to banking privacy.
Banking, as we all know, is a very important country, but on the whole world. After the 9/11
sector of our country’s economy. Banks lend terrorist attack of the World Trade Center, United
money to entrepreneurs and inventors so that jobs States government used the SWIFT (Society for
can also be created for the people. Of course, bank Worldwide Interbank Financial
customers are people who are financially capable Telecommunications) database, which is used by
and in the middle and high class of society. 2,200 organizations and 7,800 financial
institutions, to track terrorist-related financial
According to WebCPA, a website transactions and most of these transactions
dedicated to finance industry and banking, the top occurred not in the United States but in the foreign
3 problems and issues in the field of information countries. All of the clients’ information is on the
and technology today are: Information Security SWIFT database examples are: addresses, phone
Management, Privacy Management, and Secure numbers, real names, and account numbers.
data file storage, transmission, and exchange [2]. Having this kind of information United States can
As we can see, these 3 issues revolve around the do almost anything in the world and critics called
security and privacy of data. this as “Abuse of power by Bush Administration”
[3].
In banking, a person can be a bank’s client
if he/she creates an account and deposit money. 5. STATISTICS
Do clients deposit only their money to safety? No.
If a person decided to become a bank’s client,
he/she also supplies the bank with his/her personal
information. This information is used to market
the client’s needs to other companies. According
to FDIC (Federal Deposit Insurance Corporation)
banks, as of July 2001, are required to give their
customers a copy of their privacy policy. Banks
should also have a copy of their privacy policy on
their websites (FDIC, 2007).

It might look like a good thing since banks


want to market its clients’ needs but if we look at
it in a different angle, it is a violation of our right,
Figure 2. Misused Information
our right for privacy. Companies make use of the
client’s personal information to advertise their
products that are in line with the client’s needs The graph presents different crimes under identity
and interest. This might also cause theft and privacy issues. Many crimes can happen
information/identity theft. Banks’ data privacy and once an identity thief got his/her hands on
security might be good but who knows if the personal information. The data used in this graph
affiliated companies, whom the banks share their was from Ohio in 2004. Phone or Utilities fraud is
clients’ information, are also good. If there are rampant on Ohio while Credit Card Fraud is
some security glitches, information could be easily rampant in other locations. Nevertheless, the
obtained by hackers. graph tells us that since 2004 identity theft have
been a major problem not just in Ohio, but also in
Terrorism might also be used as an excuse other location. The following tables are some
to violate privacy policies of banks not just in our breakdowns of identity theft in Ohio.
Types of Bank Ohio Other newly acquired technology of financial
Fraud Location institutions.
Existing Accounts 6.8% 8.5%
Electronic Fund 8.1% 6.6% Nothing is perfect. We can never be too
Transfer safe on a certain technology. One way or another,
New Accounts 2.7% 3.6% people will try to destroy what other people
created. And for information security to be
Unspecified 0.1% 0.1%
efficient in financial institutions, as well as in
TOTAL: 17% 18%
other industries, we must practice continuous
Figure 3. Types of Bank Fraud
improvement for our security. If there are new
Not all bank employees are honest. Some technologies available in the market, we should
employees get a hold of their clients’ information first analyze their strengths and weaknesses
and use it to gain financially for themselves. carefully and make decisions based on whether we
can improve the technology or not.
Types of Credit Ohio Other
It would be hard to cure the threats in
Card Fraud Location
banking industry but we could prevent. There are
New Accounts 14.3% 16.5% two threats in security and privacy, external and
Old Accounts 12.7% 11.9% internal environment. What people should do is
Unspecified 0.1% 0.1% to control both environments and see defensive
TOTAL: 26% 28% measures that could help prevent incidents.
Figure 4. Types of Credit Card Fraud
Banks must keep in mind to consider
internal environment as a threat. These can be the
6. RECOMMENDATIONS / CONCLUSIONS insiders who are the employees, and the partners.
The company should enforce policies and controls
Information Technology represents an important that would discipline their employees. Discipline
role in banking industry especially today where is not only needed for the employees but also
banks deal with issues such as fraud, identity theft, awareness. The company must institute periodic
phishing, phishing, and a slew of other malicious security awareness training for all employees. In
internal and external criminal activity. Banks have this way, a culture of security awareness will be
to act faster and effective when it comes to developed. According to CERT, employees need
protecting data, especially information and assets “to be aware that individuals, either inside or
of their clients. Banks also have to provide risk outside may try to co-opt them into activities
management and control as they fight for security counter to the organization's mission."[8]
and privacy. However, high officials should not only rely on
the rules and training they give their employees.
Since the past centuries, there have been They should always remember that its money of
many ways for an identity theft to get a hold of the people they are gambling. They must give it
your personal information, what more today? As more security. So in order to be more secured,
technology advances, financial institutions gain they must monitor and respond to suspicious or
not just new advantages but also new disturbing behavior, starting when you hire an
disadvantages. A new technology might provide employee. Banks should also track and secure
new services for financial institutions but there the physical environment. They should log,
might also be new ways, techniques, and
technologies that can penetrate the security of a
monitor and audit the employee online action and
implement system change controls. Overall, these kinds of technology are very
convenient and it really made our life very easy.
The second environment is the external. Here is the list of ideas that might be implemented
Almost all industries in the world have been in the future. These ideas maybe very fictional but
revolutionized by internet. Internet made all it might happen in the near future.
transactions easier and in the field of banking, the
revolving money that we use is in a form of bits Bills and coins will be replaced with cards.
and bytes. This is a much better way because it This idea might happen because what’s happening
eliminates the problem of bringing cash and the right now is that all big transactions are happening
scare of crime that might take place during the in a form of cheque and with the use of credit
process. From the traditional way of transacting cards. Buying of products will be done by just
our money in the bank where the customer will go swiping the card without the hassle of paying the
to the bank and deposit or withdraw money, we cash and receiving the change. All products can be
were introduced with the concept called self- bought through the card and the user must better
service. protect this card because it is a form of money.

People can easily withdraw money from Sending Money is just as easy as sending a
ATM which is located almost every corner in the text message. If your parents forgot to gave you
Philippines. Cash is now in the form of E-Cash the allowance for this week and you already went
and an example of this is the service of Globe to school or you work in abroad and you need to
called G-Cash where you can purchase any send money to your family back in the
product you want to buy with the use of the Philippines, worry no more because we can send
cellphone. We have credit cards and by using your allowance easily or your money padala by
these credit cards it also gives the customer to just loading the amount to your card and you can
gain mile points and other benefits from the now purchase anything you want until your budget
providers. It also made our budget better because runs out.
through this credit card, we were allowed to pay a
very expensive product through an installment You can still buy anything you want even
process. There is also a service called online you don’t have enough money. In this generation,
banking where you can transact even at the it is impossible to buy things especially if you
comfort of your home. With the use of these don’t have enough money. But with this idea, you
technology also, we were now able to purchase can now purchase it and what will happen is that it
products from the internet and delivering the will be just credited to your account or card. The
product in your home. This eliminates the hassle idea is similar to a credit card that’s why there’s
of going to the store and purchase the product the nothing new with this innovation.
customer wishes to buy.
Cards are all password-protected. Before
There are also machines that accept the
money and this cash can be deposited to your the user can purchase the item he/she wished to
account and the account of that user updated real- buy, he/she has to enter the password to ensure
that the card is really yours. So don’t give
time and this eliminates the scare of losing the
passwords to anyone.
money while having the transaction because in the
old-way of depositing money, the depositor can
only see the updated account after a 24-hour MyBank Account. This system is similar
to MyLasalle but what it is found in this system is
interval.
all information regarding purchases and other
financial stuffs. It is a very big system that [4] Lents, Danny. What Is Identity Theft?
manages your financial accounts and this can help Retrieved March 9, 2009, from
the user for making important reports such as http://www.idtheftawareness.com/docs/WhatIsIdT
budget plan, purchases for this month and the like. heft.php, 2007

Google Bank. By this time, google is now [5] N.A. Safe Internet Banking. March 11, 2009 at
the most influential company and they are the one http://www.fdic.gov/bank/individual/online/protec
who is maintaining the Mybank system. All banks t.html, 2007
are registered in Google and this is a very big
information system. [6] Simon, Jeremy. Credit card fraud: examining
debit and credit card payment fraud. Retrieved
Online SM. This is a mall and in this web March 9, 2009, from
site you can find almost all products in the world http://www.creditcards.com/credit-card-
where you can purchase with the help of your news/credit-card-fraud-and-safety-of-your-cards-
account card. The product will be delivered to you 1276.php?a_aid=1017&a_cid=1204, 2007
and this eliminates the hassle of going to a real
mall.
[7] Webopedia. What is security? - A Word
These are some of our recommendations Definition from the Webopedia Computer
or prediction for the banking industry. This is a Dictionary. Retrieved March 9, 2009, from
field where innovations are fast happening and http://www.webopedia.com/TERM/S/security.htm
this can be a good example of an emerging l, May 17, 2004
technology because there’s a bright future ahead
with this industry. This can make our life faster [8] McGlasson, Linda. The Insider Threat: 16
and easier and once this industry reached its Tips to Protect Critical Data. March 11, 2009 at
highest level. http://www.bankinfosecurity.com/articles.php?art
_id=1257&opg=1, 2009
8. REFERENCES

[1] Crimes-of-persuasion. Bank Fraud? Retrieved


March 9, 2009, from http://www.crimes-of-
persuasion.com/Crimes/Business/bank_fraud.htm,
2000

[2] Gold, L. Security, privacy issues claim top


spots on AICPA’s Top Tech Poll. March 11,
2009 at
http://www.webcpa.com/article.cfm?articleid=306
50, 2009

[3] Khor, M. Uproar over privacy of bank data.


March 11, 2009 at
http://www.twnside.org.sg/title2/gtrends109.htm,
2007

Vous aimerez peut-être aussi