427 Botnet fm qxd



Download 6,98 Mb.
Pdf ko'rish
bet378/387
Sana03.12.2022
Hajmi6,98 Mb.
#878307
1   ...   374   375   376   377   378   379   380   381   ...   387
Bog'liq
Botnets - The killer web applications

www.syngress.com
FSTC Phishing Solutions Categories • Appendix A
455
427_Botnet_APPA.qxd 1/9/07 3:28 PM Page 455


B.1.5.9 Strong Authorization for Financial Transactions
Measures that can be employed to bind
strong authorizations with financial transactions (e.g., digital signatures) in ways that make it difficult for impostors to initiate
fraudulent financial transactions.
B.1.5.10 Secure eMail Services
Any techniques that can be used to increase confidence in email correspon-
dence, such as source authentication, authorizations, or confidentiality.
B.1.5.11 eMail Proof-of-Delivery/Receipt Services
Additional services that can be used to inde-
pendently assure email correspondents that a specific message was delivered by the indicated sender or was received by the
designated recipient. Included are services that depend on neutral third parties that can witness the delivery and receipt of
email correspondence (e.g., postmarks, registered email services) 
B.1.5.12 Authenticating FIs to End Users
Any facilities that can be used by end users to authenticate
that they are truly communicating with their financial institution (and not an impostor), especially authentication schemes
that are easily understood and recognizable by average consumers.
B.2 Financial Industry Technical Counter-Phishing Measures
These categories of solutions are
either specific to Financial Institutions, or are available as options that can be employed by an individual organization. In this
regard, most of these solution options tend to be tactical in nature.
B.2.1 Category VI: Counter Measures Associated with Financial Services 
Some counter
measures may be unique to the financial industry, or at least leverage the role of financial institutions in conducting financial
transactions. After all, fraud and abuse are familiar problems to the financial industry, and have been addressed using an array
of industry measures.The financial industry also has its own infrastructure and data resources that can be leveraged to create
new opportunities for combating phishing on several fronts.
B.2.1.1 Improved Ability to Share Relevant Data within Financial Industry
New facil-
ities or services that would allow the financial industry to better share information that can be used to counter phishing
threats. Included might be facilities for broadcasting information about new phishing attacks, or ways for the industry to
leverage existing credit or fraud databases to reduce losses and impact on customers.
B.2.1.2 Improved Ability to Share Relevant Data across Industry Boundaries
New
facilities or services that can leverage information accumulated by other industries, such as the communications or retail
industries, or that may allow information from financial institutions to be made available outside of the financial industry for
purposes of combating phishing. Regulatory compliance will be an important feature of any solution that shares information
across industry boundaries.
B.2.1.3 Improved Ability to Share Relevant Data with Law Enforcement
New facilities
or services that allow law enforcement agencies to work more effectively with financial institutions through improved sharing
of information, including forensics, fraud data, and complaints filed by citizens/customers.
B.2.1.4 Data Mining for Phishing-Related Information/Evidence
Tools or techniques that
can pull useful evidence of, and information about, phishing activities from the mountain of data available from a broad array
of sources.
B.2.1.5 Shutdown/Disabling of Phishing-Related Sites
Services that can effectively shutdown or
disable any site found to be involved in phishing activities. Such services may be defensive or preventative depending on
which stage of the phishing life cycle they address.
B.2.1.6 Hardening of Credit-Reporting Infrastructure
Measures that reduce exposures through
the credit-reporting infrastructure, including abuses that allow unauthorized access to credit data or that facilitate misrepresen-
tations of “identity” in applications for credit.
B.2.1.7 Hardening of Payments Infrastructure & Transactions
New measures that can be used
to harden the payments infrastructure against fraud based on use of account credentials stolen through phishing attacks.
Examples include multifactor authentication, stronger authorization, one-time credit/debit card numbers, and blinding of
account numbers in transactions.
B.2.1.8 Refinements to Risk Management Approaches
Enhancements to risk analysis and man-
agement approaches that allow financial institutions to more rapidly and effectively recognize new sources of risk from
phishing attacks, and take steps to mitigate increases in risk.
B.2.2 Category Vii: Monitoring and Surveillance Measures
It is important to note that
phishing is, by its very nature, an observable act, even if the victims are not themselves aware that they are being phished. It
also leaves a lot of tracks and generates its own trail of events that can be traced. Consequently, improved techniques for mon-
itoring the sorts of activities that indicate potential phishing coupled with effective surveillance and collection of evidentiary
information can represent useful measures for addressing the phishing threat.

Download 6,98 Mb.

Do'stlaringiz bilan baham:
1   ...   374   375   376   377   378   379   380   381   ...   387




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish