• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Tackling Financial Fraud With Machine Learning

flyytech by flyytech
September 17, 2022
Home Security
Share on FacebookShare on Twitter



Deepfakes — also known as synthetic media — can be used for more than impersonating celebrities and making disinformation more believable. They can also be used for financial fraud.

Fraudsters can use deepfake technology to trick employees at financial institutions into changing account numbers and initiating money transfer requests for substantial amounts, says Satish Lalchand, principal at Deloitte Transaction and Business Analytics. He notes that these transactions are often difficult, if not impossible, to reverse.

Cybercriminals are constantly adopting new techniques to evade know-your-customer verification processes and fraud detection controls. In response, many businesses are exploring ways machine learning (ML) can detect fraudulent transactions involving synthetic media, synthetic identity fraud, or other suspicious behaviors. However, security teams should be mindful of the limitations of using ML to identify fraud at scale.

Finding Fraud at Scale

Fraud in the financial services sector over the past two years was driven by the fact that many transactions were pushed to digital channels as a result of the COVID-19 pandemic, Lalchand says. He cites three risk factors driving the adoption of ML technologies for customer and business verification: customers, employees, and fraudsters.

Though employees at financial services firms are typically monitored via cameras and digital chats at the office, remote workers are not surveilled as much, Lalchand says. With more customers signing up for financial services virtually, financial services firms are increasingly incorporating ML into their customer verification and authentication processes to close that window for both employees and customers. ML can also be used to identify fraudulent applications for government assistance or identity fraud, Lalchand says.

In addition to spotting fraudulent Paycheck Protection Program loans, ML models can be trained to recognize transaction patterns that could signal human trafficking or elder abuse scams, says Gary Shiffman, co-founder of Consilient, an IT firm specializing in financial crime prevention.

Financial institutions are now seeing fraud emerge across multiple products, but they tend to search for fraudulent transactions in silos. Artificial intelligence and ML technology can help bring together fraud signals from across multiple areas, Shiffman says.

“Institutions continue to do the whack-a-mole, and continue to try and identify where fraud was increasing, but it was just happening from all over the place,” Lalchand says. “The fusion of information … is called CyFi, bringing cyber and financial data together.”

ML tools can assist in positively identifying customers, detecting identity fraud, and spotting the likelihood of risk, says Jose Caldera, chief product officer of global products for Acuant at GBG. ML can examine past behavior and risk signals and apply those lessons in the future, he says.

The Limits of Machine Learning

Though ML models can analyze data points to detect fraud at scale, there will always be false positives and false negatives, and the models will degrade over time, Caldera says. Therefore, cybersecurity teams training the algorithm to spot fraud must update their models and monitor its findings regularly, not just every six months or every year, he says.

“You have to make sure that you understand that the process is not a one-time [task]. And … you need to have the proper staffing that would allow you to maintain that process over time,” Caldera says. “You’re always going to get more information, and … you need to be able to use it constantly on improving your models and improving your systems.”

For IT and cybersecurity teams evaluating the effectiveness of ML algorithms, Shiffman says they will need to establish ground truth — the correct or “true” answer to a query or problem. To do so, teams using ML technologies try out a model using a test data set, using an answer key to count its false negatives, false positives, true positives, and true negatives, he says. Once these errors and correct answers are accounted for, companies can recalibrate their ML models to identify fraudulent activity in the future, he explains.

Besides updating their algorithms to detect fraud, IT and cybersecurity teams using ML technology must also be aware of legal restrictions on sharing data with other entities, even to identify fraud, Shiffman says. If you’re handling data from another country, you may not be legally able to transfer it to the US, he says.

For teams looking to use ML technology for fraud detection, Caldera cautions that such tools are just one component of a fraud prevention strategy and that there is no one solution to solving that problem. After onboarding new customers, cybersecurity and IT professionals must stay abreast of how they are changing behaviors over time.

“The use or not of technology or machine learning is just one component of your toolset,” Caldera says. “You as a business, you have to understand: What is the cost that you are putting to this, what is the risk tolerance that you have, and then what is the customer position that you want?”



Source_link

flyytech

flyytech

Next Post
LattePanda 3 Delta Review: The Maker Desktop

LattePanda 3 Delta Review: The Maker Desktop

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Google reminds app developers there is something special about the Pixel 7 line

Google reminds app developers there is something special about the Pixel 7 line

October 29, 2022
NCSC Implements Vulnerability Scanning Program Across UK

NCSC Implements Vulnerability Scanning Program Across UK

November 4, 2022

Trending.

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

October 23, 2022
Allen Parr’s false teaching examined. Why you should unfollow him.

Allen Parr’s false teaching examined. Why you should unfollow him.

September 24, 2022
Review: Zoom ZPC-1

Review: Zoom ZPC-1

January 28, 2023
Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

January 14, 2023
CPU Benchmarks Hierarchy 2022: Processor Ranking Charts

CPU Benchmarks Hierarchy 2022: Processor Ranking Charts

September 11, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

Dynamics SL to Dynamics 365 Business Central Migration 2023

Dynamics SL to Dynamics 365 Business Central Migration 2023

March 31, 2023
BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist

BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist

March 31, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT