Saturday 9 July 2016

Layers Of Cyber Security


Components of Cyber Fraud & Risk Management Layer 5


1. Data Capture & Collection


  • Network sniffing: transactions, screens, intra-application messages, database access
  • Log files and databases
  • Reference Data

2. Forensic Visual Audit Trail


  • Replay user activity screen by screen “Google like” search on captured data, e.g. Who accessed a specific customer account in a specific time-frame?
  • Captured data is encrypted and digitally signed - potentially admissible in court when needed

     3. Fraud Analytics


  •      Dynamic Profiling and scoring of various entities
  •       Customizable business rules
  •       Real-time alerts
  •       New rules may be applied after-the-fact

    4. Investigation Workbench & Case Management


  •      Manage Cases, Alerts and Incidents
  •      Flexible Reporting 
  •      Control parameters of rules, profiles and scoring

  For further information email: kazungu@infosolkenya.com   

No comments:

Post a Comment