48,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
payback
24 °P sammeln
  • Broschiertes Buch

Information and Communications Technologies (ICT) have undeniably changed the way society interacts during everyday activity, where the Internet now plays an essential role in any nation s critical infrastructure, financial payments systems. Coupled with the rampant invasion of insidious techniques employed by cyber-criminals to perpetrate fraud, and the simplicity of electronic transactions, the foundations of society s networked economy are being threatened with far-reaching consequences. Hence, as an emerging threat to the prosperity of any nation s economy, Internet banking financial fraud…mehr

Produktbeschreibung
Information and Communications Technologies (ICT) have undeniably changed the way society interacts during everyday activity, where the Internet now plays an essential role in any nation s critical infrastructure, financial payments systems. Coupled with the rampant invasion of insidious techniques employed by cyber-criminals to perpetrate fraud, and the simplicity of electronic transactions, the foundations of society s networked economy are being threatened with far-reaching consequences. Hence, as an emerging threat to the prosperity of any nation s economy, Internet banking financial fraud demands immediate attention. This book identifies the vulnerabilities in Internet banking security architecture which are fuelling the proliferation of financial fraud. Analysing the various attack vectors employed by cyber-criminals, provides the foundations for the formulation of a fraud mitigation strategy, proposed as an industry- wide security platform, to most appropriately secure thefinancial infrastructure.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Kane holds a Master of Information Technology degree along with a First-Class Honours degree in multimedia research, awarded by Monash University. His field of research interest is in artificial intelligence (computer science) and the application of neural networks in data mining and computational access control systems.