Technology Why we should be concerned about the $1 theft

Why we should be concerned about the $1 theft


- Advertisment -

View all on-demand sessions from the Intelligent Security Summit here.

User journey analysis: The case of the missing dollar

Imagine that the head of security for one of the largest financial institutions in the country receives a call from their team that $500,000 is missing. After many hours of analyzing transactions, the team traces the missing money to an employee who also stole $1 six months earlier.

The employee in question made several $1 transactions to his own account on the company’s claims handling portal. Once the employee realized that no one was closely monitoring these transactions, they became increasingly brazen and began to embezzle larger sums. Eventually, greed got the better of them as they attempted to send $500,000, after which the security team discovered the incident and sprang into action.

This is a realistic example of an insurance company.


Intelligent Security Summit on demand

Learn the critical role of AI and ML in cybersecurity and industry-specific case studies. Check out on-demand sessions today.

Look here

Insider Threat: What you can’t detect makes you vulnerable

Many of today’s threats to financial institutions around the world come not just from external threats, but from within. Or by external actors using stolen credentials of authenticated users. As a result, financial institutions are tightening their security to be vigilant for potential misuse or abuse by employees and contractors using their SaaS and custom applications.

Cybersecurity technology solutions enable the detection of malicious activity on networks, operating systems and devices. Malicious activity and fraud are mainly detected in two ways:

  • Rule-based and signature-based detection that identifies potentially malicious behavior through rules and known bad indicators.
  • Statistical volumetric frequency methods, also known as User Entity Behavior Analytics (UEBA).

These solutions have been effective at the network, endpoint, and access layers. But when it comes to the application layer, these methods of detection and response fall short. Assessing abnormal user behavior against average daily activities does not yield accurate results, as there is no such thing as “average” behavior.

For example, let’s take a manager at an insurance company: part of her days are spent handling claims and transferring money to customers’ accounts. On other days she prepares reports and towards the end of the quarter she spends a few days preparing a presentation of her department’s activities. Dawn doesn’t have your average day-to-day behavior, she does different things all the time.

So, how can we detect intentional abuse from within? We need to construct user journeys in business applications and learn the typical usage patterns of internal and external users.

User journey analysis for internal threat detection

User journey analysis does not look at a single activity from a single user. Instead, it analyzes sequences of activities of a particular user and forms a series of travel profiles that user undertakes in an application. Since users perform multiple actions in different sequences and time intervals, this method learns what is considered a “typical” user journey for each user. When an employee performs an action that falls outside these normative user journeys, he identifies the changed journey as an ‘outlier’.

Learn user journeys at scale to prevent threats

Let’s go back to the example we started with. By deploying user journey analytics, the insurance company would have seen instances of abnormal behavior for the employee crediting $1 to their account. This anomaly would have alerted potential malicious activity, narrowing the focus on the employee in question and enabling timely intervention.

Doron Hendler is co-founder and CEO of RevealSecurity.

Data decision makers

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people who do data work, can share data-related insights and innovation.

To read about advanced ideas and up-to-date information, best practices and the future of data and data technology, join DataDecisionMakers.

You might even consider contributing an article yourself!

Read more from DataDecisionMakers

Shreya Christina
Shreya has been with for 3 years, writing copy for client websites, blog posts, EDMs and other mediums to engage readers and encourage action. By collaborating with clients, our SEO manager and the wider team, Shreya seeks to understand an audience before creating memorable, persuasive copy.

Latest news

Rumored Buzz on Slot Machine Strategy – Best Methods For Winning At Slots

Rumored Buzz on Slot Machine Strategy - Best Methods For Winning At Slots Table of ContentsFacts About How To Win...

Panduan Utama untuk Undang -Undang Perjudian Online Indonesia – adalah situs kasino online legal?

Panduan Utama untuk Undang -Undang Perjudian Online Indonesia - adalah situs kasino online legal? Daftar isiPerlu upaya bersama untuk menutup...

SQL Server Change Data Capture (CDC): Revolutionizing Data Tracking and Analysis

In today's data-centric world, the ability to efficiently and accurately track changes in databases is crucial for organizations of...

App vasitesile inanılmaz Pin-Up poker oyunu

ContentAzərbaycanda mövcud olan Depozit və Çıxarma MetodlarıPin Up Casino Oyunçuları üçün bonuslarİlk depozit bonusunu necə əldə etmək olarSlot maşınlarının...
- Advertisement -

Pin up indir android ⭐️ Pinup indir mobil cazino uygulamasıdır

ContentPin Up-ı iOS-lara nece yükləyib quraşdırmaq olar?Pin Up Casino Azerbaycan YuklePin Up indir android mobil Apk uygulamasıPınup İlk Üyelik...

Pin-up kazino bonusları ᐉ İlk depozit üçün promo kodu PINUPBEST

ContentRəsmi sayt Pin UpAviator Pin UP oynaya biləcəyiniz yerlər - vebsayt və proqramPin Up kazinosunda oyun kateqoriyalarıDepozit mükafatları yoxdurAndroid...

Must read

- Advertisement -

You might also likeRELATED
Recommended to you