Académique Documents
Professionnel Documents
Culture Documents
of Bangladesh: An Overview
Abstra
ct
Cyber and technology related crime is gradually increasing in
Bangladesh. The advancement of e-banking technology has
made banking transactions very convenient. But the misuse
of information technology has brought undesirable
consequences in the form of diverse cybercrimes. This
paper focuses on developing a conceptual framework
regarding the problem of cyber-crime in the banking sector of
Bangladesh by assessing the cyber-crime scenario. One of the
most important aspect in the Bangladesh banking sector is to
make banking transactions free from cyber-crime. The
purpose of this study is to represents the concept of the basic
crimes occurred in banks and financial sector- namely
Automated Teller Machine (ATM) frauds, E-Money Laundering
etc. The study found that by applying the updated technology
and appointing skilled manpower and devices cyber-crime
can be reduced from the banking transactions.
2. Problem
Statement:
The dependency of individual as well
as institutions on internet is raising the
cyber-crime as a growing concern. The
increased use of ICT is boosting the
hazard of cyber-attacks across the
globe. Since the incidents of cyber-
crimes are on the rise, it is essential to
explore the cyber crime scenario.
Although, with the initiation of
technologies, the banking sector has
been able to reach more customers
however, it has also increased the
risk for customers who often feel
hesitant and insecure in opting for such
services. The objective of the study is
to provide a conceptual overview about
the cyber-crimes in the field of finance
and banking sector of Bangladesh.
This paper is an attempt in this
direction to better understand the
electronic crimes in the banking sector
of Bangladesh and to take some
precautionary measures.
3.
Methodology
:
The study is descriptive in nature. This
study is conducted on the basis of
secondary data. The secondary data
are collected from the journals and
research papers. Newspaper articles
and the internet sources are also used.
But the data has been interpreted in
In the banking sector, Illegal money
The defense system of banking sector
transfer and removal from one to
contains a lot of exposures, so there is
another account are identified as
always a need for investigation for
banking fraud according to Wall
increasing awareness about the
(2001). He has also classified cyber-
procedures that can be undertaken to
crimes into four broad categories i.e.
contest cyber related crimes in the
cyber-deceptions, cyber-violence,
banking sector. (McCullagh,
cyber-trespass,& cyber-pornography.
2005 & Florêncio,
The banking frauds are classified
2011).
under cyber-deception which is termed
as an immoral activities including credit Moore.et al (2009) focused on the subject
card fraud stealing, and intellectual of online crime which generally occur from
property violations (Anderson & Barton, the annoyance came from sloppy
2012). hackers.They found that substantial
developments are possible in the way
ATM frauds, E-money Laundering and
dealing with online fraud and to study the
Credit Card Frauds are the most
online crime it is suggested that to
witnessed cybercrimes in the banking
understand its economic perspective. It
sector. In general, all the frauds are
also revealed the problems that banks and
executed with the goal of accessing
police forces face in governing the
user's bank account, stealing funds and
traditional law enforcement.
transferring it to some other bank
account. In some cases the cyber Nsouli. M and Schaechter. A(2002), states
criminals uses the banking that online banking crime which is
identifications i.e. passwords, e-PIN, committed with the use of online
certificates, etc. to access client's technology to steal money illicitlyfrom a
accounts; whereas in other cases they bank account or means of shifting money.
may want to steal and transfer money Cyber- banking crime can be considered as
the funds into another accounts another method of identity theft which is
illegally. The intention of cybercriminals regularly made imaginable via methods
sometimes is just to harm the image of such as Phishing.
the banking firm and therefore, they
block the bank servers blocking the Liao.Z and Cheung.H,(2008) revealed in
access of clients' accounts (Claessens their study that customer interaction with
et al., 2002; & Hutchinson et al, the internet assisted online banking are
2 the ease of use, security convenience,
0 and also responsiveness to services
0 requirements. They also suggested, for
3) preventing cyber-banking crime: protecting
. antivirus & firewall,
1 THE COST AND MANAGEMENT
ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-APRIL 2016
restricting the amount of personal unsolicited mails or mass e-
information one permit to be in public mails such as chain letters.
domain, making use of low limit distinct ● Cyber Defamation: This occurs
credit card for online buying to minimize when defamation takes place
the possible loss of things go wrong. with the help of computers and or
the internet. e.g. if someone
publishes defamatory matter
5. Cyber-crime - An about someone on a website or
Overview sends e-mails containing
Computers, Internet and other electronic
medium are the tools that make possible
the instant exchange and distribution of
data, images, and materials. The
fraudulent activities of IT are termed as
cyber-crime, e-crime, hi-tech crime, or
electronic crime. These practices involve
the use of computer or internet as a
medium, source, instrument, target, or
place of a crime.
Computer and Internet plays a key role in
various activities, such as, recording
financial transactions, routing telephone
calls, measuring power usage,
monitoring medical treatments, etc.
However, they also contribute to
electronic crime, such as:
● Cyber Stalking: Cyber Stalking means
following every moves of an
individual over internet. It can be
done with the help of many protocols
available such as e- mail, chat
rooms, user net groups etc.
● Phishing: It is a technique of pulling
out confidential information from the
bank/financial institutional account
holders by deceptive means.
● Hacking: Hacking is a simple term
which means illegal intrusion into a
computer system without the
permission of owner/user
● Denial of Services: This is an act by
the criminal, who floods the
bandwidth of the victim's network or
fill his e-mail box with spam mail
depriving him of the services he is
entitled to access or provide, or when
internet server is flooded with
continuous bogus requests so as to
denying legitimate users to use the
server or to crash the server.
● E-mail Spoofing: A spoofed email is
one in which e-mail header is forged
so that mail appears to originate from
one source but actually has been sent
from another source.
● Spamming: Spamming means
sending multiple copies of
defamatory information and by subverting the servers and
Although, Internet and web technologies programs to aid their phishing
are growing at a fast pace and are activities; a method known as
providing new opportunities, they are also infrastructure hijacking.
consisting of certain threats like, email
As indicated by the FBI, the most
espionage, credit card fraud, spams,
recent pattern by cybercriminals is to
software piracy, etc.
pick up employee username/password
by utilizing spam and phishing
6. Cyber-crime messages, key loggers, remotely
accessible trojans. Such attacks were
scenario throughout found in September 2012, when the
the world Bank of America and Wells Fargo were
The Global Economic Crime Survey 2016, among those struck.
indicates that cybercrime is the one of the In the course of the most recent
economic crimes that has increased, couple of years, cyber economic crime
jumping from 4th place to 2nd place has developed to a point where it can
globally, which is a sharp rise. Among the be classified into the following two
survey participants worldwide, categories:
reputational harm was viewed as the most
damaging effect of a cyber breach - 1.Cyber fraud. Money related
followed closely by legal, investment, or cyber-crime, like, identity and
enforcement costs. A popular and credit card theft causing huge
effective strategy for targeting banks is to losses. In spite of their
direct email phishing to clients. Mobile prominence, they hardly cause
and online banking has opened new any danger to organizations.
doors for cybercriminals. To counter
2. Transfer-of-wealth/IP attacks.
these attacks, banks have established
The more serious economic
procedures to rapidly respond to any
crime confronting businesses is
attacks and have also started the process
that of internal cyber risk: the
of educating customers on security.
stealing of Intellectual Property -
Consequently, criminals have reacted by
trade secrets, R & D
creating more sophisticated programs
information, company strategies,
intended to breach online bank accounts,
etc.The damage
1 THE COST AND MANAGEMENT
ISSN 1817-5090,VOLUME-44, NUMBER-2, MARCH-APRIL 2016
could lead to loss of billions of dollars control over the record, skimming, or if
and destroy a company or the card is stolen. The expression
even a large economic system. "Internet fraud" usually refers to any
These attacks are usually not being type of fraud scheme consisting of
anticipated by a company and are various components of the Internet,
difficult to detect. like chat rooms, email, forums, or
websites - to execute fraudulent
7. Cyber-crime in Banking transactions or distribute to other
associated with the plan. Banking
Sector- Concepts criminals are utilizing different
According to Jaleshgari (1999), electronic medium, for example, web,
Banking sector throughout the world was email, and encoded messages for their
simple and reliable till mid-1990s,; fraudulent activities.
however since the initiation of
technology, the banking sector 8. Cyber-crimes in Banking
experienced a paradigm shift in the
phenomenon. In order to enhance their Sector: Across the globe
customer base banks introduced many However, in the last few years, banks all
platforms through which transactions acros the globe have perceived cyber-
could be done effortlessly (Vrancianu crime as among their top five risks
and Popa, 2010). These technologies (Stafford, 2013). Some of the major
enabled the customer to access their incidents of cyber-crime in past few years
bank finances 24/ 7 and year around are as follows:
through, ATMs and Online banking
procedures.Information Technology (IT) ❑ Stealing of personal information
has become a vital part of the banking of almost
system. Just like banking is the backbone 2.9 million credit card
of the economy, IT has become the customers of
backbone of the banking system. It is Barclays and Santander Banks UK
nearly impossible for banks to provide in 2013
new financial products without relying ❑ Missing $ 450,000 from bank
heavily on IT. The banking sector is account of a
coming up with various progressive Pennsylvania school district
changes to transform the "brick-and- in 2008
mortar" bank branches to an advanced ❑ Transfer of approximate $3
framework of "core banking solutions". million from bank account of a
New York school district in
The present contemporary age has
2009.Some transfers were
replaced conventional financial
recovered but $500,000 was
instruments from a paper based currency
withdrawn from the account
to "plastic money" in the form of credit
before the transaction could be
cards, debit cards, etc.This has brought
reversed.
about the vast use of ATM everywhere
❑ Over 400 corporate account
throughout the world. The use of ATM
takeovers in
is convenient but has a negative side,
2011, which cyber criminals
which is manifested in the form of "ATM
initiated through unauthorized
frauds". Credit card fraud has gotten to
ACH and wire transfers from the
be conventional on the internet which
bank accounts of U.S. businesses.
affects card holders as well as online
These cases involve the
sellers.
attempted theft of over $255
Frauds million and have resulted in the
actual loss of approximately $85
million.
❑ Creation of fake debit cards
and
withdrawal of more than $9 million
from automated teller
machines (ATMs)
involvin E-
g money worldwide by breaching the U.S.
electronic Launderi
fund transfer ng payment processor's computer
(EFT)
Credit Telecommunica systems and stealing personal
card
fraud
tion fraud
data in November 2009.
Phon
e (Source: FBI
Bankin
g
Data)
ATM facility
Fraudulent
use of
Credit, Debit
and Smart Frauds related 9. Cyber-crime scenario in
to E-
banking sector of
(ATM) cards Internet
banking Mobile commerce
cards and
Banking SWIFT and EDI
accounts
Network
INFINET
Network
Bangladesh:
In the last few years, the baking sector
Figure:Technology & related was the victim of several security
crimes breaches:
SWIFT
Federal Reserve
Bank Intermediary
Bank Destination
issues
● Testing hazard incident
● Mandatory adoption of IT
• Conduct up-front
• Ensure quality due diligence to
information is eliminate 3rd party
received and risk
assimilated
• Addressing
• Implement user risks associated
security awareness with operational
programs systems
• Address basic IT
• Support strategy- audit issues
12.
Conclusion
The present conceptual framework
has provided a brief overview of
ongoing efforts to prevent and
control technology and computer
related crime, highlighting general
trends and development within
and outside the banking sector of
Bangladesh.The banking industry
is constantly experiencing cyber-
crimes like ATM fraud, E-money
laundering, Credit card fraud,
Phishing etc. Since there was no
noteworthy incidents of cyber-
crime took place in the banking
sector of Bangladesh before 2016,
Lega IT
there was no l
• Be aware of the
changing threat
landscape and
• Track the evolving attack vectors
cyber- regulatory
environment • Test incident
response plans
• cyber-attack
simulations,
gamification of
security
• Monitor decisions
made by regulators • Training and
in response to cyber awareness
incidents sessions and
security data
analytics
three banks" a v a i l a b l e
urge for such protective measures
at
against those crimes. But now it is :
high time for the banks to http://bdnews24.com/business/201
concentrate on cyber risk 6/02/14/card- skimming-at-six-atm-
management and mitigation. So, booths-from-three-banks
new technologies and services "Cyber-Crime in Bangladesh :A
growing threat in d i g i t a l
must be adopted to cope with the
m a r ke t " av a i l a b l e
situation as well as competition at
and security governance must be :
complied with. Technological and http://www.risingbd.com/english/cy
legal advancement in the area of ber-crime-in- b a n g l a d e s h - a -
growing-threat-in-digi
banking sector is necessary to t a l - marketplace/28940
overcome the cyber-threats in
Douglas, T., & Loader, B. D. (2000).
banking industry. Bangladesh Bank Cybercrime: Security and
should take necessary steps surveillance in the information age:
discussed above to create Routledge
awareness among the banks and
their clients as well as
making the application of the laws
more rigorous to check crime. As
the regulatory authority of the
banking sector, Bangladesh Bank
should also ensure mandatory
compliance of cyber risk
management and cyber security
governance for the operating
banks. There is also a need to bring
changes in the Information
Technology (ICT) Act to make it
more effective to combat cyber-
crime.
Referenc
es:
Anderson, R., Barton, C., Böhme,
R.,Clayton, R., van Eeten, M. J. G., Levi,
M., Moore, T., & Savage, S. (2012).
Measuring the cost of cybercrime.
Alam, S (2015),Cybercrime and legal
fabric of Bangladesh,Bangladesh Law
Digest-available at-
http://www.bdlawdigest.org
Claessens, J., Dem, V., De Cock, D.,
Preneel, B.,
&Vandewalle, J. (2002). On the security
of today s online electronic banking
systems. Computers & Security, 213:
253-265
"Card skimming at six ATM booths from
Florêncio, D., &Herley, C. (2010). Phishing Wall, D. 2001. 1 Cybercrimes and the
and money mules. In Information Internet. Crime and the Internet: 1
Forensics and Security WIFS, IEEE Z. Liao and M. T. Cheung (2008),
International Workshop on pp. 1-5. IEEE "Measuring customer satisfaction in
Federal Bureau of Investigation, Statement internet banking; A core framework,"
before the House Financial Services Communications of the ACM, vol. 51,
Committee, Subcommittee on Financial no. 4, pp. 47-51.
Institutions and Consumer Credit
Washington, D.C. September
14, 2011
Global economic crime survey,2016,
"How cyber-criminals targeted almost $1 bn
in Bangladesh Bank Heist",available at
https://next.ft.com/content/39ec1e84-
ec45-
11e5-bb79-
2303682345c8#axzz46NHKzCwH