SlideShare a Scribd company logo
Computer-Related Risks Lion International Bank S.C. (LIB) is a privately owned Share Company, established on October 2, 2006 in accordance with Proclamation 84/94 and the commercial code of Ethiopia and officially inaugurated for public services on January 6, 2007.
External Risks That Apply Trojan viruses hiding in websites, emails, or downloads. Organized counterfeit check ring activity. Debit card fraud through use of skimming devices. Wire fraud, external loan fraud, identity theft, fraudulent accounts, online customer credential theft and hijacked accounts.
Internal Threats The “trusted insider” threat: false applications, manipulation of data, theft of money and data from customer accounts. Lax IT department security procedures. Failure of management to implement best practices security measures, i.e. Clean Desk Policy.
Potential Outcomes of Inaction Externally most pressing risks are viruses. Internally most pressing risks are employee/trusted insider theft. Slowdown or shutdown of bank website and ability to serve customers. Security of accounts and data compromised. Loss of potentially millions of dollars and loss of consumer confidence and trust.
Security/Software Recommendations Utilize encryption system based on SSL certificates with a RSA encryption algorithm. Use key exchange via 1024 bits RSA key, with all traffic secured with 128 bits encryption. Implement use of Gladiator Technology's Raw Traffic Analyzer © Begin a bank-wide Clean Desk Policy.

More Related Content

PDF
Cyber Insurance Types of Attacks
Statewide Insurance Brokers
 
PPTX
Mis security system threads
Leena Reddy
 
PPTX
PPT on Phishing
Pankaj Yadav
 
PPT
Pp8
BAILEYP
 
PPT
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
 
PPTX
Data security
Hitesh Kumar
 
PPT
Phishing & Pharming
Devendra Yadav
 
PPTX
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
 
Cyber Insurance Types of Attacks
Statewide Insurance Brokers
 
Mis security system threads
Leena Reddy
 
PPT on Phishing
Pankaj Yadav
 
Pp8
BAILEYP
 
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
 
Data security
Hitesh Kumar
 
Phishing & Pharming
Devendra Yadav
 
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
 

What's hot (20)

PPTX
Phishing Attacks - Are You Ready to Respond?
Splunk
 
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
PPTX
Lock It Down, Keep It Safe
aaberra
 
PPTX
Phishing Technology
AvishekMondal15
 
PPT
Phishing
anjalika sinha
 
PPTX
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
M Nadeem Qazi
 
PPTX
Different Types of Phishing Attacks
SysCloud
 
PPTX
Phishing
guicelacatalina
 
PPT
Viruses, Biometrics, & Encryption
parkera
 
PPT
Computer 4 ict
guest1daf5af
 
PPTX
Phishing
SaurabhKantSahu1
 
PPTX
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
rausdeen anfas
 
PPTX
Security Threats to Electronic Commerce
Darlene Enderez
 
PPTX
Internet Phishing
master slave
 
PPT
Threats of E-Commerce in Database
Mentalist Akram
 
PPTX
Phishing
Ajit Yadav
 
PPTX
Security issues in e business
Rahul Kumar
 
PPT
Eamonn O Raghallaigh The Major Security Issues In E Commerce
EamonnORagh
 
DOC
E-commerce Security and Threats
BPalmer13
 
Phishing Attacks - Are You Ready to Respond?
Splunk
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
Lock It Down, Keep It Safe
aaberra
 
Phishing Technology
AvishekMondal15
 
Phishing
anjalika sinha
 
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
M Nadeem Qazi
 
Different Types of Phishing Attacks
SysCloud
 
Phishing
guicelacatalina
 
Viruses, Biometrics, & Encryption
parkera
 
Computer 4 ict
guest1daf5af
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
rausdeen anfas
 
Security Threats to Electronic Commerce
Darlene Enderez
 
Internet Phishing
master slave
 
Threats of E-Commerce in Database
Mentalist Akram
 
Phishing
Ajit Yadav
 
Security issues in e business
Rahul Kumar
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
EamonnORagh
 
E-commerce Security and Threats
BPalmer13
 
Ad

Similar to Computer related risks presentation (20)

PPTX
For CyberSecurity.pptx which helps students whose are want to learn
Gigabyte30
 
PPTX
Lesson 3 - Cybersecurity and its impact to e-commerce (32).pptx
Omar Fernandez
 
PDF
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
TheEntrepreneurRevie
 
PPTX
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
AwodiranOlumide
 
PDF
Understanding Digital Wallet Fraud & FAQ
Nikunj Gundaniya
 
PPTX
What Makes Web Applications Desirable For Hackers
Jaime Manteiga
 
PPTX
CyberSecurityPPT_V3_1.pptx training module
surnil7785
 
PDF
deep learning with database security .pdf
sivasankar130552
 
PDF
Top Cybersecurity Threats Impacting Your Business in 2023
basilmph
 
PPTX
Cyber crime ppt
Bushra22
 
PPTX
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
PPTX
HQ Cyber Security PPT Cybersecurity awareness
KirtikaTomar1
 
PPTX
Cybersecurity note for students reference
sitihajar250855
 
PPTX
Cyberattacks.pptx
SonakshiMundra
 
PPTX
Cyber Crime
Mohan Robert
 
DOCX
Chapter 8 securing information systems MIS
Amirul Shafiq Ahmad Zuperi
 
PPTX
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
prtabal_25
 
PPTX
Cybersecurity about Phishing and Secutity awareness
Imran Khan
 
PPTX
CyberSecurityPPT_V3_1 awareness session.pptx
mandeepkaur045
 
PDF
Top Cyber Security institute in India - Gicseh.pdf
GICSEH
 
For CyberSecurity.pptx which helps students whose are want to learn
Gigabyte30
 
Lesson 3 - Cybersecurity and its impact to e-commerce (32).pptx
Omar Fernandez
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
TheEntrepreneurRevie
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
AwodiranOlumide
 
Understanding Digital Wallet Fraud & FAQ
Nikunj Gundaniya
 
What Makes Web Applications Desirable For Hackers
Jaime Manteiga
 
CyberSecurityPPT_V3_1.pptx training module
surnil7785
 
deep learning with database security .pdf
sivasankar130552
 
Top Cybersecurity Threats Impacting Your Business in 2023
basilmph
 
Cyber crime ppt
Bushra22
 
Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
HQ Cyber Security PPT Cybersecurity awareness
KirtikaTomar1
 
Cybersecurity note for students reference
sitihajar250855
 
Cyberattacks.pptx
SonakshiMundra
 
Cyber Crime
Mohan Robert
 
Chapter 8 securing information systems MIS
Amirul Shafiq Ahmad Zuperi
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
prtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Imran Khan
 
CyberSecurityPPT_V3_1 awareness session.pptx
mandeepkaur045
 
Top Cyber Security institute in India - Gicseh.pdf
GICSEH
 
Ad

Recently uploaded (20)

PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PPTX
Coupa-Overview _Assumptions presentation
annapureddyn
 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Architecture of the Future (09152021)
EdwardMeyman
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Coupa-Overview _Assumptions presentation
annapureddyn
 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Architecture of the Future (09152021)
EdwardMeyman
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 

Computer related risks presentation

  • 1. Computer-Related Risks Lion International Bank S.C. (LIB) is a privately owned Share Company, established on October 2, 2006 in accordance with Proclamation 84/94 and the commercial code of Ethiopia and officially inaugurated for public services on January 6, 2007.
  • 2. External Risks That Apply Trojan viruses hiding in websites, emails, or downloads. Organized counterfeit check ring activity. Debit card fraud through use of skimming devices. Wire fraud, external loan fraud, identity theft, fraudulent accounts, online customer credential theft and hijacked accounts.
  • 3. Internal Threats The “trusted insider” threat: false applications, manipulation of data, theft of money and data from customer accounts. Lax IT department security procedures. Failure of management to implement best practices security measures, i.e. Clean Desk Policy.
  • 4. Potential Outcomes of Inaction Externally most pressing risks are viruses. Internally most pressing risks are employee/trusted insider theft. Slowdown or shutdown of bank website and ability to serve customers. Security of accounts and data compromised. Loss of potentially millions of dollars and loss of consumer confidence and trust.
  • 5. Security/Software Recommendations Utilize encryption system based on SSL certificates with a RSA encryption algorithm. Use key exchange via 1024 bits RSA key, with all traffic secured with 128 bits encryption. Implement use of Gladiator Technology's Raw Traffic Analyzer © Begin a bank-wide Clean Desk Policy.

Editor's Notes

  • #2: http://www.anbesabank.com/index.php?option=com_frontpage&Itemid=28
  • #3: http://www.investmentinternational.com/news/banking/uk-bank-account-customers-hit-by-most-dangerous-computer-virus-ever-3778.html http://www.techworld.com.au/article/344123/how_investigators_work_combat_data_theft/ http://www.bankinfosecurity.com/articles.php?art_id=2019&
  • #4: http://www.bankinfosecurity.com/articles.php?art_id=2019& http://www.lloydstsb-ipb.com/w3/en/Online-Banking/E-banking-Security.html
  • #5: Virus attacks were cited as the most common form of security incident, affecting 78 per cent of respondents. Virus attacks are contributing the most in terms of financial loss stemming from security incidents owing to the emerging threat of virus attacks being combined with denial of service attacks - costing companies more than double in monetary terms than any other type of security breach reported. After virus attacks, insider abuse of networks was cited as the second most common form of security incident, reported by 59 per cent of organisations, followed by laptop or mobile phone theft, which affected 49 per cent of the survey sample. http://www.theregister.co.uk/2004/08/05/fbi_security_stats/
  • #6: Thirteen of the banks surveyed used some type of back office or teller modules that included kiting detection software. Eight used positive pay systems that can catch fraud before it occurs by matching checks written with those being cashed to catch items such as voided checks, stolen checks, altered amounts, or duplicate serial numbers. Banks not currently using such systems said they planned to in the future. http://www.bankersonline.com/articles/bhv12n09/bhv12n09a4.html http://www.gladiatortechnology.com/press/BFITSRDec09.pdf www.sans.edu/resources/student_projects/200808_01.doc