Technology Why we should be concerned about the $1 theft

Why we should be concerned about the $1 theft

-

View all on-demand sessions from the Intelligent Security Summit here.


User journey analysis: The case of the missing dollar

Imagine that the head of security for one of the largest financial institutions in the country receives a call from their team that $500,000 is missing. After many hours of analyzing transactions, the team traces the missing money to an employee who also stole $1 six months earlier.

The employee in question made several $1 transactions to his own account on the company’s claims handling portal. Once the employee realized that no one was closely monitoring these transactions, they became increasingly brazen and began to embezzle larger sums. Eventually, greed got the better of them as they attempted to send $500,000, after which the security team discovered the incident and sprang into action.

This is a realistic example of an insurance company.

Event

Intelligent Security Summit on demand

Learn the critical role of AI and ML in cybersecurity and industry-specific case studies. Check out on-demand sessions today.

Look here

Insider Threat: What you can’t detect makes you vulnerable

Many of today’s threats to financial institutions around the world come not just from external threats, but from within. Or by external actors using stolen credentials of authenticated users. As a result, financial institutions are tightening their security to be vigilant for potential misuse or abuse by employees and contractors using their SaaS and custom applications.

Cybersecurity technology solutions enable the detection of malicious activity on networks, operating systems and devices. Malicious activity and fraud are mainly detected in two ways:

  • Rule-based and signature-based detection that identifies potentially malicious behavior through rules and known bad indicators.
  • Statistical volumetric frequency methods, also known as User Entity Behavior Analytics (UEBA).

These solutions have been effective at the network, endpoint, and access layers. But when it comes to the application layer, these methods of detection and response fall short. Assessing abnormal user behavior against average daily activities does not yield accurate results, as there is no such thing as “average” behavior.

For example, let’s take a manager at an insurance company: part of her days are spent handling claims and transferring money to customers’ accounts. On other days she prepares reports and towards the end of the quarter she spends a few days preparing a presentation of her department’s activities. Dawn doesn’t have your average day-to-day behavior, she does different things all the time.

So, how can we detect intentional abuse from within? We need to construct user journeys in business applications and learn the typical usage patterns of internal and external users.

User journey analysis for internal threat detection

User journey analysis does not look at a single activity from a single user. Instead, it analyzes sequences of activities of a particular user and forms a series of travel profiles that user undertakes in an application. Since users perform multiple actions in different sequences and time intervals, this method learns what is considered a “typical” user journey for each user. When an employee performs an action that falls outside these normative user journeys, he identifies the changed journey as an ‘outlier’.

Learn user journeys at scale to prevent threats

Let’s go back to the example we started with. By deploying user journey analytics, the insurance company would have seen instances of abnormal behavior for the employee crediting $1 to their account. This anomaly would have alerted potential malicious activity, narrowing the focus on the employee in question and enabling timely intervention.

Doron Hendler is co-founder and CEO of RevealSecurity.

Data decision makers

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people who do data work, can share data-related insights and innovation.

To read about advanced ideas and up-to-date information, best practices and the future of data and data technology, join DataDecisionMakers.

You might even consider contributing an article yourself!

Read more from DataDecisionMakers

Shreya Christinahttp://ukbusinessupdates.com
Shreya has been with ukbusinessupdates.com for 3 years, writing copy for client websites, blog posts, EDMs and other mediums to engage readers and encourage action. By collaborating with clients, our SEO manager and the wider ukbusinessupdates.com team, Shreya seeks to understand an audience before creating memorable, persuasive copy.

Latest news

1xbet Зеркало Букмекерской Конторы 1хбет На следующий ️ Вход и Сайт Прямо тольк

1xbet Зеркало Букмекерской Конторы 1хбет На следующий ️ Вход и Сайт Прямо только1xbet Зеркало на Сегодня Рабочий официальный Сайт...

Mostbet Pakistan ᐉ Online Casino Review Official Website

Join us to dive into an immersive world of top-tier gaming, tailored for the Kenyan audience, where fun and...

Casino Pin Up Pin-up Casino Resmi Sitesi Türkiye Proloq Ve Kayıt Çevrimiçi

ContentPin Up Nə Say Onlayn Kazino Təklif Edir?Pin Up Casino-da Pul Çıxarmaq Nə Miqdar Müddət Alır?Vəsaiti Kartadan Çıxarmaq üçün...

Играть В Авиатора: Самолетик Pin Up

ContentAviator: Son Qumar Oyunu Təcrübəsini AçınMobil Proqram Pin UpPin Up Aviator Nasıl Oynanır?Бонус За Регистрацию В Pin Up?Pin Up...

Pin Up 306 Casino əvvəl Qeydiyyat, Bonuslar, Yukl The National Investo

ContentDarajalarfoydalanuvchilar Pin UpCasino Pin-up Pin-up On Line Casino Resmi Sitesi Türkiye Başlanğıc Ve Kayıt ÇevrimiçPromosyon Və Qeydiyyatdan KeçməkAviator OyunuAviator...

Find Experts to Write My Paper for Me. Just Click a Button Even though you may have many...

Must read

You might also likeRELATED
Recommended to you