This is the relatively simple data process of cyberfraud regarding credit cards. I completed my interviews with Jason Bartolacci who works for Synchrony Financial. So I used the circle to indicate that the process has started of course. The first step is to get the credit card numbers. You need these numbers to see what cards to start labeling for the investigation. Jason also mentioned that he used a macro whenever he completes this process which we also learned when in previous chapters and completing exercises in excel. The next step is to look for additional information, this can include pin numbers or anything that can help Jason during this process of investigation. The triangle represents him waiting for the information. Once the information is gained (or not), the fraud people during this time will be calling into the bank and try to get access to account numbers, bank statements, trying to convince the bank to send them a new card with a new pin, etc. Next, Jason will try to see if this is someone who is involved in the Unites States or even in a different country. Sometimes these hackers which we have learned in chapter 12 live in different countries and part of their ultimate goal is financial gain. Jason will then log this information into a secure service to investigate more information. Once he waits for the cards and then once they have been checked, then he knows that they have been compromised. One of the next important components is moving onto the mitigation plan. This lets the cardholder know that their card is under investigation. The court process if and when the person or persons has been caught will immediately begin. Lastly, if there is enough evidence linking back to the fraudulent person or persons then they will be charged with the criminal activity and the cardholder will then have a new card, new information, or however their bank goes about it. This ends the process.
URL: https://www.draw.io/
|
No comments:
Post a Comment