EMV COSTS and OPPORTUNITIES
Download
Report
Transcript EMV COSTS and OPPORTUNITIES
Fraud Prevention and
Detection
Early Detection: Point of Purchase/Compromise
Know at what point your customer’s card was compromised
Source as little as two to three cards which have experienced
confirmed fraudulent transactions to find the Point of
Compromise. A common point of purchase across all cards
should emerge
Identify other cardholders who may potentially be at risk
Write rules to monitor compromised cards for unusual
spending activity
Use real time decline or automatic blocking to reduce
monetary fraud loss if fraud attempts are made on
compromised card
Manual Review
Reviewing every transaction manually for signs
of fraudulent activity
Involves a exceedingly high level of human
intervention
Can prove to be very expensive and time
consuming
Unable to detect some of the more prevalent
patterns of fraud (use of a single credit card
multiple times on multiple locations (physical
or web sites) in a short span)
Address Verification System (AVS)
Applicable in card-not-present scenarios.
Matches the first few digits of the street address and the ZIP
code information given for delivering/billing the purchase to
the corresponding information on record with the card
issuers. A code representing the level of match between
these addresses is returned to the merchant.
Not much useful in case of international transactions.
Card Verification Methods (CVM)
A 3- or 4-digit numeric code printed on the card but not
embossed on the card and not available in the magnetic
stripe.
Ensures that the person submitting the transaction is in
possession of the actual card (the code cannot be copied
from receipts or skimmed from magnetic stripe).
Doesn’t protect merchants from transactions placed on
physically stolen cards.
Fraudsters who have temporary possession of a card can, in
principle, read and copy the CVM code.
Lockout Mechanisms
Automatic card number generators represent one of the
new technological tools frequently utilized by fraudsters.
These programs, easily downloadable from the Web, are
able to generate thousands of ‘valid’ credit card numbers.
The traits of frauds initiated by a card number generator
are the following:
Multiple transactions with similar card numbers (e.g. same
Bank Identification Number (BIN))
A large number of declines Acquiring banks/merchant sites
can put in place prevention mechanisms specifically
designed to detect number generator attacks.
Negative and Positive Lists
Negative list : database used to identify high-risk
transactions based on specific data fields.
Example : SAFE file distributed by MasterCard to merchants
and member banks
Positive files are used to recognize trusted customers (by
their card number or email address) and bypass certain
checks
Important tool to prevent unnecessary delays in processing
valid orders.
Negative and Positive Lists
Black Lists
Proxy server lists
Known Fraud IP address lists
Known Fraud E-mail address lists
Zombie/hacked computer lists
Fraudulent Merchant Lists
List of merchants who have been known for being involved in
fraudulent transactions in the past.
Provide useful information to acquirers at the time of
merchant recruitment
MATCH from MasterCard
User Data Validation
The User Data Validation Module gives businesses the ability to
verify a customer's contact information. Additionally, to ensure
financial loss from returned shipping or inaccurate billing, this
module automatically detects and corrects spelling and
typographical errors.
User Data Validation Matters Will:
Identify false names, false addresses, fake phone numbers and
stolen banking information
Deliver detailed information including actual bank name, phone
number, location.
Conduct a detailed GeoIP analysis of order to determine user
location.
Compare all collected data for inconsistent fault points contributing
to an overall dynamic fraud score
True IP Detection
In the cat and mouse game of fraud and detection, a
traditional tactic of fraudsters is to hide their location
through the use of proxy servers. This module then
compares the true data with the data the customer wants
you to see.
True IP Detection Will:
Identify public visible and local LAN IP address
Provide GeoIP lookup information for both visible IP addresses
Identify discrepancies between Used Supplied Data and IP
data
Validate proxy server and net block information
Social Network Validation
Social Network Validation detects user profiles by searching
for them on most common networks. The module compares
information made public by the customer against
information received in the order. Since fraud typically
includes mixed-and-matched contact and billing information
from multiple stolen identities, this module is another key in
determining the legitimacy of a transaction.
Discussion: What Would You Do?
You have been asked by your manager to assess what type of
monitoring product you would need.
Your monitoring system will provide a range of results, you have
been asked to interpret these results
You have been asked by your manager to reduce the false
positives results in your fraud detection system.
You have been asked to change the rules in your neural
network, you are unsure what rules to put in place.
Intelligent Fraud-Detection Systems
Spot Fraud Before it is Reported by the Cardholder
Card companies continue to increase the effectiveness and
sophistication of customer-profiling neural network systems
that can identify unusual spending patterns and potentially
fraudulent transactions.
The card company will then contact the cardholder to check
whether the suspect transaction is genuine. If not, an
immediate block can be put on the card.
Automated Transaction alerting
Method used to improve customer service and detection:
Use automated alerts to decrease fraud staff workload and
enable more efficient work practices
Use auto alerting to allow customers to set their own security
parameters and enable you to deliver a more personalized
banking service
Simple Rule Systems
• Involve the creation of ‘if...then’ criteria to filter
incoming authorisations/transactions.
• Rely on a set of expert rules designed to identify
specific types of high-risk transactions.
• Effectiveness increases over time (more rules are
added to the system)
✘ Disadvantage: can increase the probability of throwing
valid transactions as exceptions
−
This limitation can be overcome to some extent by prioritising
the rules and fixing limits on number of filtered transactions.
Neural Network Technologies
Based on the ‘statistical knowledge’ contained in extensive
databases of historical transactions, and fraudulent ones in
particular.
A neural network is a computerized system that sorts data
logically by performing the following tasks:
Identifies cardholder’s buying and fraudulent activity patterns.
Processes data by trial and elimination (excluding data that is not
relevant to the pattern).
Finds relationships in the patterns and current transaction data
Neural Network Technologies
Advantages:
These models are able to learn from the past and thus, improve
results as time passes.
Can extract rules and predict future activity based on the current
situation.
Disadvantage
Needs feeding with fraud data continually
No data the profile built up will decay
Basien Technology
A more advanced form of Neural Networks
Self learning.
Does not need continual data to preserve profiles
March 17
Caribbean Electronic Payments LLC
20
Fraud analytics
Allows to have a better view/perspective on trends in fraud
occurrences
Enables using trends identified to improve preventive
measures and controls
Added benefit of customer profiling using data mining
Defines false positives and false negatives as what they are
Risk Scoring Technologies
Tools based on statistical models designed to recognize
fraudulent transactions, based on a number of indicators
derived from the transaction characteristics
Provide one of the most effective fraud prevention tools
available.
Comprehensive evaluation of a transaction being captured by a
single number.
Transactions can be prioritized based on the risk score and given
a limited capacity for manual review, only those with the highest
score would be reviewed.
Products
Alaric
AI Corporation
Fraud Labs
Volance
FICO BankCard
Quatrro Analytics
Ethoca
Adeptra
Oscar Kilo
CyberSource
Visa/MasterCard Monitoring Tools
Agenda and Learning
Emerging technology that brings in a new level of security to
Objectives
business-to-consumer. Various solutions can be implemented:
Two-factor Authentication
EMV/Chip
3D-Secure
Discussion
Two-factor Authentication
Two-factor authentication (TFA, T-FA or 2FA) is an approach to
authentication which requires the presentation of "two or more"
of the three authentication "factors:
Something the user knows (e.g., password, PIN);
Something the user has (e.g., ATM card, smart card); and
Something the user is (e.g., biometric characteristic, such as a
fingerprint).
Something you have
Tokens with a display
(disconnected tokens)
Connected tokens
USB tokens
Virtual token MFA
Smartcards
Audio Port tokens
Wireless
Dallas iButton
Casque
Magnetic stripe cards
Soft tokens
One-time pads
– UniOTP
Mobile phones
–
–
–
–
–
–
–
Vulnerability to attacking
Assignment to the bearer
SMS one time password
Smartphone push
Additional phone token
Mobile signature
Mobile applications
Something you are
Biometrics
Biometric authentication also satisfies the regulatory definition of true multifactor authentication. Users may biometrically authenticate via:
• finger print verification
• hand based verification
• retinal and iris scanning
• dynamic signature verification.
Disadvantages:
• vulnerable to a replay attack
• user resistance
• positive and negative outputs
• compromised data cannot be changed.
Hybrid or two-tiered authentication methods (private keys encrypted by
fingerprint inside of a USB device)
EMV/Chip
Global standard for credit and debit payment cards based on chip
card technology.
Payment chip cards contain an embedded microprocessor providing
strong security features
More secure than a traditional magnetic stripe card.
EMV chip card payment provides security benefits in the following
areas:
With online authorization, a dynamic cryptogram protects against
the use of skimmed data and stolen account data
With offline authorization, a PIN capability protects against lost and
stolen card fraud, and data authentication protects against
counterfeit cards
Limits on offline activity protects against credit overruns and fraud
3D Secure
3-D Secure is an XML-based protocol used as an added layer of security for
online credit and debit card transactions.
Developed by Visa (Verified by Visa), MasterCard (SecureCode), and by JCB
International (J/Secure). American Express (SafeKey)
This authentication is based on a three domain model:
Acquirer Domain
Issuer Domain
Interoperability Domain (the infrastructure provided by the credit card
scheme to support the 3-D Secure protocol).
A transaction will initiate a redirect to the website of the card issuing bank
to authorize the transaction.
Each issuer can use chosen authentication method: password
authentication; smart card readers; security tokens
3D Secure
Implementing 3D Secure
Visa/MasterCard member banks must use compliant software
supporting protocol specifications, and perform integration testing
with payment system server
ACS providers: Access Control Server is implemented on issuer side.
MPI providers: merchant plug-in providers are authorised to send
requests to card system servers
Disadvantages of 3D Secure
Cardholder may see their browser connect to unfamiliar domain
names, which may make it easier to perform phishing attacks.
Mobile browsing may throw up compatibility problems (no popups)
Users are generally discouraged if the authentication process is too
complicated or take too long