SlideShare a Scribd company logo
1 of 46
Detailing the fraud & security issues surrounding mobile payments Barcellona, 28.09.2011 Stefano Maria De' Rossi Francesco Magini
Agenda Mobile payment overview Brief overview of Mobile Fraud Mobile payment threat management Key takeaways
What are mobile payments ?
Mobile payment: a definition Mobile Payments Mobile Financial services Mobile Banking Mobile Commerce Mobile Money transfer
Mobile payment: a definition Mobile Payment is a  composite payment   model  which encompasses  different paradigms , all characterized by the use of the  Mobile phone as their primary means   of interaction .  Mobile device may be used to do any/all of the steps: ,[object Object],[object Object],[object Object]
SEPA set apart 2 types of mobile payments SUB POINT Remote payments SEPA mobile payment framework  Proximity payments
Main types of mobile payments SEPA main type  Proximity payments ,[object Object],[object Object],[object Object],[object Object]
Main types of mobile payments Remote payments SEPA main type  ,[object Object],[object Object],[object Object],[object Object]
5  types of  Mobile Payments
MOBILE AT THE POINT OF SALE (the mobile wallet) It’s paying for things at a store with a mobile device using NFC or “tap & go” or some other yet to be hyped method
MOBILE AS THE POINT OF SALE (every smartphone is a cash register) This is merchant using a mobile device to process credit card payments. Do not confuse this with mobile payment. They are not the same thing
MOBILE PAYMENT PLATFORM (everything else mobile payment) This is a “catch all” category for product that let consumer send money to merchants or even each other (p2p) using mobile device. It might be at the point of sales, it might be on line.
DIRECT CARRIER BILLING (Put it on my phone bill) This is consumer buying ringtones or games or digital content by putting the charges on their cell phone bill
CLOSED LOOP MOBILE PAYMENT (the return of the store credit card: now it’s mobile) If a company doesn’t want to wait for someone else to build a wallet or a platform, it can always build it’s own. Starbucks did 3 million transaction in their first two months.
Mobile Money Initiative within GSMA Mobile Ticketing
“ Pay-Buy-Mobile”: introduction  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pillar 1 - UICC  The UICC is considered the most appropriate NFC secure element for the mobile phone The UICC (Universal Integrated Circuit Card)  is also known as the “SIM Card”) The SIM card is used as a multi-application Secure Element to perform trusted transactions with a contactless terminal.
Pillar 2 - Near Field Communications  NFC, or near-field communications, is a short-wave radio communications technology that provides a way for two devices to communicate small amounts of data when they're placed about four inches apart. NFC is the technology of choice for the mobile industry to enable proximity-based services using the mobile phone
46 Participating MNOs currently participating ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
M-payment status around the world – some examples Source:  Frost &  Sullivan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
That’s the technology… but what about the money ?
M-payment is positioned as a potentially lucrative revenue stream Time Market Volume Low Introduction Growth Maturity Decline High Fixed telephony Mobile communications Enhanced TV services Fixed broad-band Source:  Frost & Sullivan Broadcast mobile TV services NB: bubble size approximates revenue accruing to communications service providers Mobile payments (excluding SMS-based) Quad-Play services Mobile broadband Triple Play services
Mobile payments are growing
A €6 billion opportunity by 2013 in Western Europe The market is expected to grow at an average of 25 per cent annually over the next five years
[object Object],[object Object],[object Object]
The bad news – mobile fraud losses (*)  www.cfca.org Communications Fraud Control Association (*)
Mobile Phone Frauds Mobile phone fraud is not a new topic and today’s mobile security reflects the industry’s experience of fighting against fraud Analog Cellular mobile cloning Magnetic Stripe skimming Radio Telephony 1950 1970 1990 2000 2010 3G 4G mobile tampering Evolution of technical threats against mobiles and cards Analog Cellular mobile cloning 1G Digital Cellular 2G SIM USIM EMV Magnetic Stripe Embossing skimming counterfeiting 1980 Chip and PIN
Evolution of fraud scenario Phreaking fraud Vishing fraud
TLC market: new services trend Changes in the telco world are affected by radical evolutions starting from new technologies up to new services linked to different markets (Internet, media, banking) New types of threats and frauds are on the rise
What are the big concerns regarding mobile payments? Source: Mobile Money Market: Key Market Drivers & Restraints (2010-2015) Lack of regulation on mobile transactions Quality of service Lack of collaboration between players High cost of solution Better user awareness Ease of payment Secure network Interoperability across networks and platforms Efficiency and speed of mobile networks Drivers Restraints Security will remain a key inhibitor Security concerns
Mobile Payment Risks Mobile payment services need a complex architecture involving many players with different roles… Mobile Payment application Source: Aujas
A chain is only as strong as its weakest link…
Mobile Payment Risk Assessment In order to make a complete risk assessment it’s important to analyze the entire mobile payment ecosystem Man-in-the-middle attack Replay attacks Repudiation Impersonation Unauthorized access Source: Security Issues in Mobile Payment Systems, University of India Mobile payment Protocol Design flaws in mobile protocols Design flaws in m-payment protocols Weak cryptographic algorithm Platform HW SW Side channel attack SIM cloning Vulnerable APIs/Apps Devices Malware Spyware OS
Mobile Payment Security Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Payment Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Major Threats Impacts ,[object Object],[object Object],[object Object],[object Object]
Are hackers/fraudsters really interested in mobile payment?
Just some examples… ,[object Object],[object Object],[object Object],[object Object]
Let’s take a look at some possible frauds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Application Security
Mobile Application Security User Security The final user becomes a central and strategical point for the entire end-to-end ecosystem security Source: Mobile Payment Security, PWC ,[object Object],[object Object],[object Object],[object Object]
Mobile Application Security Endpoint Security Devices are anywhere and always on, the security perimeter is wider and boundaries are not well defined ,[object Object],[object Object],[object Object]
The Secure Element ,[object Object],[object Object],Device manufacturers Card companies Mobile Operators
Summary & key messages Market status There has been progress in m-payment trials and deployments in Europe but mass adoption remains to be seen.  Market outlook The outlook for m-payment remains positive because of technology availability, an increased sense of urgency amongst key stakeholders to enable m-payment functions, and a growing number of end users being comfortable with m-payment functions.  Market expectations M-payment methods will vary across Europe; the dominance of SMS-based m-payment functions will continue but contactless technology may become important over the medium term.
Key success factors Ease of use for the consumer In the absence of any life critical need, m-payment is a new service that requires consumers to change their habits.  Convenience of use becomes very critical.  Security assurance We strongly believes that the predominant m-payment technology will be the one that provides an appropriate security level proportionate to the m-transacton. Standardisation & Interoperability The eco-system requires further development to reduce complexity in interactions amongst stakeholders.  Standardisation and efforts of interoperability are crucial to decrease fragmentation in the eco system.
 
[email_address] [email_address]

More Related Content

What's hot

E financial services (payment gateway)
E financial services (payment gateway)E financial services (payment gateway)
E financial services (payment gateway)valliappan1991
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway SystemMannu Khani
 
Stripe connect for marketplaces
Stripe connect for marketplacesStripe connect for marketplaces
Stripe connect for marketplacesUmangChugh2
 
How an online payment gateway works
How an online payment gateway worksHow an online payment gateway works
How an online payment gateway worksIkajo International
 
What is FinTech- Technology in Finance
What is FinTech- Technology in Finance  What is FinTech- Technology in Finance
What is FinTech- Technology in Finance Mobcoder
 
Role and impact of Information Technology on Indian Banks
Role and impact of Information Technology on Indian BanksRole and impact of Information Technology on Indian Banks
Role and impact of Information Technology on Indian BanksDrAbhinavSharma1
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022Capgemini
 
India’s Emerging Payments Market
India’s Emerging Payments MarketIndia’s Emerging Payments Market
India’s Emerging Payments MarketPradeep Kharvi
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College ProjectSheril Daniel
 

What's hot (20)

E financial services (payment gateway)
E financial services (payment gateway)E financial services (payment gateway)
E financial services (payment gateway)
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway System
 
Digital payments
Digital payments Digital payments
Digital payments
 
Stripe connect for marketplaces
Stripe connect for marketplacesStripe connect for marketplaces
Stripe connect for marketplaces
 
How an online payment gateway works
How an online payment gateway worksHow an online payment gateway works
How an online payment gateway works
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Retail banking
Retail banking Retail banking
Retail banking
 
Introduction to emv
Introduction to emvIntroduction to emv
Introduction to emv
 
Mobile Wallet functions
Mobile Wallet functionsMobile Wallet functions
Mobile Wallet functions
 
What is FinTech- Technology in Finance
What is FinTech- Technology in Finance  What is FinTech- Technology in Finance
What is FinTech- Technology in Finance
 
E wallet
E walletE wallet
E wallet
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 
Role and impact of Information Technology on Indian Banks
Role and impact of Information Technology on Indian BanksRole and impact of Information Technology on Indian Banks
Role and impact of Information Technology on Indian Banks
 
Top Trends in Payments 2022
Top Trends in Payments 2022Top Trends in Payments 2022
Top Trends in Payments 2022
 
India’s Emerging Payments Market
India’s Emerging Payments MarketIndia’s Emerging Payments Market
India’s Emerging Payments Market
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
E banking Services
E banking ServicesE banking Services
E banking Services
 
Payment gateways
Payment gateways Payment gateways
Payment gateways
 
Digital Banking - Revolution in Bangladesh
Digital Banking - Revolution in BangladeshDigital Banking - Revolution in Bangladesh
Digital Banking - Revolution in Bangladesh
 

Viewers also liked

Plano de Aula - Trabalhando aspectos da língua inglesa com o filme Tropa De E...
Plano de Aula - Trabalhando aspectos da língua inglesa com o filme Tropa De E...Plano de Aula - Trabalhando aspectos da língua inglesa com o filme Tropa De E...
Plano de Aula - Trabalhando aspectos da língua inglesa com o filme Tropa De E...Fabio Lemes
 
Scanning and skimming
Scanning and skimmingScanning and skimming
Scanning and skimminginglessII
 
Prot Abdome
Prot AbdomeProt Abdome
Prot Abdomefabarros
 
Skimming Scanning
Skimming ScanningSkimming Scanning
Skimming Scanningjjutglar
 
Refund Fraud/Credit Card Skimming
Refund Fraud/Credit Card SkimmingRefund Fraud/Credit Card Skimming
Refund Fraud/Credit Card SkimmingCurtisBaillie
 
Skimming and scanning_in_reading
Skimming and scanning_in_readingSkimming and scanning_in_reading
Skimming and scanning_in_readingshandi219
 
Skimming and Scanning to Achieve Inferential Comprehension
Skimming and Scanning to Achieve Inferential ComprehensionSkimming and Scanning to Achieve Inferential Comprehension
Skimming and Scanning to Achieve Inferential ComprehensionUCsanatadharma
 
Skimming and scanning speed reading techniques
Skimming and scanning  speed reading techniquesSkimming and scanning  speed reading techniques
Skimming and scanning speed reading techniquesCésar Narváez Vilema
 
Introduction of Effluent Treatment Plant
Introduction of Effluent Treatment PlantIntroduction of Effluent Treatment Plant
Introduction of Effluent Treatment PlantAkash Tikhe
 
SKIMMIMG AND SCANNING
SKIMMIMG AND SCANNINGSKIMMIMG AND SCANNING
SKIMMIMG AND SCANNINGSachin patel
 
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...Ralph Schneider
 
Pricing Analytics: Price Skimming
Pricing Analytics: Price SkimmingPricing Analytics: Price Skimming
Pricing Analytics: Price SkimmingMichael Lamont
 
Student lesson 2 prereading skimming scanning
Student lesson 2 prereading skimming scanningStudent lesson 2 prereading skimming scanning
Student lesson 2 prereading skimming scanningAmanda Allison
 

Viewers also liked (20)

Plano de Aula - Trabalhando aspectos da língua inglesa com o filme Tropa De E...
Plano de Aula - Trabalhando aspectos da língua inglesa com o filme Tropa De E...Plano de Aula - Trabalhando aspectos da língua inglesa com o filme Tropa De E...
Plano de Aula - Trabalhando aspectos da língua inglesa com o filme Tropa De E...
 
Scanning and skimming
Scanning and skimmingScanning and skimming
Scanning and skimming
 
Tcp aula 4
Tcp aula 4Tcp aula 4
Tcp aula 4
 
Prot Abdome
Prot AbdomeProt Abdome
Prot Abdome
 
Skimming Scanning
Skimming ScanningSkimming Scanning
Skimming Scanning
 
Refund Fraud/Credit Card Skimming
Refund Fraud/Credit Card SkimmingRefund Fraud/Credit Card Skimming
Refund Fraud/Credit Card Skimming
 
Marketing strategies
Marketing    strategiesMarketing    strategies
Marketing strategies
 
Skimming & scanning
Skimming & scanningSkimming & scanning
Skimming & scanning
 
Advanced reading-course-27-may-2015
Advanced reading-course-27-may-2015Advanced reading-course-27-may-2015
Advanced reading-course-27-may-2015
 
Skimming and scanning_in_reading
Skimming and scanning_in_readingSkimming and scanning_in_reading
Skimming and scanning_in_reading
 
Skimming and Scanning to Achieve Inferential Comprehension
Skimming and Scanning to Achieve Inferential ComprehensionSkimming and Scanning to Achieve Inferential Comprehension
Skimming and Scanning to Achieve Inferential Comprehension
 
Skimming and scanning speed reading techniques
Skimming and scanning  speed reading techniquesSkimming and scanning  speed reading techniques
Skimming and scanning speed reading techniques
 
Introduction of Effluent Treatment Plant
Introduction of Effluent Treatment PlantIntroduction of Effluent Treatment Plant
Introduction of Effluent Treatment Plant
 
Skimming y scanning ss
Skimming y scanning ssSkimming y scanning ss
Skimming y scanning ss
 
SKIMMIMG AND SCANNING
SKIMMIMG AND SCANNINGSKIMMIMG AND SCANNING
SKIMMIMG AND SCANNING
 
Eng7 skimming
Eng7 skimmingEng7 skimming
Eng7 skimming
 
Product life cycle
Product life cycleProduct life cycle
Product life cycle
 
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
 
Pricing Analytics: Price Skimming
Pricing Analytics: Price SkimmingPricing Analytics: Price Skimming
Pricing Analytics: Price Skimming
 
Student lesson 2 prereading skimming scanning
Student lesson 2 prereading skimming scanningStudent lesson 2 prereading skimming scanning
Student lesson 2 prereading skimming scanning
 

Similar to Mobile Payment Fraud & Security Issues

Mr. Ali Rashid al Mohannadi's presentation at QITCOM 2011
Mr. Ali Rashid al Mohannadi's presentation at QITCOM 2011Mr. Ali Rashid al Mohannadi's presentation at QITCOM 2011
Mr. Ali Rashid al Mohannadi's presentation at QITCOM 2011QITCOM
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative CompaniesMEDICI admin
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationMarc Vael
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment SystemsAmit Naik
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
Setting up a Mobile Money ecosystem: the M-Commerce Hub, 2010
Setting up a Mobile Money ecosystem: the M-Commerce Hub, 2010Setting up a Mobile Money ecosystem: the M-Commerce Hub, 2010
Setting up a Mobile Money ecosystem: the M-Commerce Hub, 2010Giorgio Andreoli
 
Mobile Convention Amsterdam - 22 May 2013
Mobile Convention Amsterdam - 22 May 2013Mobile Convention Amsterdam - 22 May 2013
Mobile Convention Amsterdam - 22 May 2013Dan Armstrong
 
contactless mobile payments
contactless mobile paymentscontactless mobile payments
contactless mobile paymentsBoni
 
Protocols in Mobile Electronic Commerce
Protocols in Mobile Electronic CommerceProtocols in Mobile Electronic Commerce
Protocols in Mobile Electronic CommerceIJERA Editor
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a surveyIAEME Publication
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital PaymentsSantosh Potadar
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
 

Similar to Mobile Payment Fraud & Security Issues (20)

Mobile payment
Mobile paymentMobile payment
Mobile payment
 
Mr. Ali Rashid al Mohannadi's presentation at QITCOM 2011
Mr. Ali Rashid al Mohannadi's presentation at QITCOM 2011Mr. Ali Rashid al Mohannadi's presentation at QITCOM 2011
Mr. Ali Rashid al Mohannadi's presentation at QITCOM 2011
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
 
Report
ReportReport
Report
 
Cmsc666 Mc
Cmsc666 McCmsc666 Mc
Cmsc666 Mc
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment Systems
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
MIS 11 M-Commerce
MIS 11 M-CommerceMIS 11 M-Commerce
MIS 11 M-Commerce
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Setting up a Mobile Money ecosystem: the M-Commerce Hub, 2010
Setting up a Mobile Money ecosystem: the M-Commerce Hub, 2010Setting up a Mobile Money ecosystem: the M-Commerce Hub, 2010
Setting up a Mobile Money ecosystem: the M-Commerce Hub, 2010
 
Mobile Convention Amsterdam - 22 May 2013
Mobile Convention Amsterdam - 22 May 2013Mobile Convention Amsterdam - 22 May 2013
Mobile Convention Amsterdam - 22 May 2013
 
contactless mobile payments
contactless mobile paymentscontactless mobile payments
contactless mobile payments
 
Protocols in Mobile Electronic Commerce
Protocols in Mobile Electronic CommerceProtocols in Mobile Electronic Commerce
Protocols in Mobile Electronic Commerce
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital Payments
 
M commerce
M commerceM commerce
M commerce
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
 

More from Stefano Maria De' Rossi

Tecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud managementTecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud managementStefano Maria De' Rossi
 
Data mining in support of fraud management
Data mining in support of fraud managementData mining in support of fraud management
Data mining in support of fraud managementStefano Maria De' Rossi
 
Storia della bambina e della stella marina
Storia della bambina e della stella marinaStoria della bambina e della stella marina
Storia della bambina e della stella marinaStefano Maria De' Rossi
 
Using business intelligence for competitive advantage
Using business intelligence for competitive advantageUsing business intelligence for competitive advantage
Using business intelligence for competitive advantageStefano Maria De' Rossi
 

More from Stefano Maria De' Rossi (20)

Tecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud managementTecniche di Data Mining a supporto del fraud management
Tecniche di Data Mining a supporto del fraud management
 
CRM Value proposition - smdr
CRM Value proposition - smdrCRM Value proposition - smdr
CRM Value proposition - smdr
 
Crm value proposition
Crm value propositionCrm value proposition
Crm value proposition
 
2015 GALA breve presentazione_12.05
2015 GALA breve presentazione_12.052015 GALA breve presentazione_12.05
2015 GALA breve presentazione_12.05
 
GALA breve presentazione maggio 2015
GALA breve presentazione maggio 2015GALA breve presentazione maggio 2015
GALA breve presentazione maggio 2015
 
2015 GALA presentazione apr2016
2015 GALA presentazione apr20162015 GALA presentazione apr2016
2015 GALA presentazione apr2016
 
slide PROGEDIL PS da paura
slide PROGEDIL  PS da paura slide PROGEDIL  PS da paura
slide PROGEDIL PS da paura
 
Presentazione AD Mind 2012
Presentazione AD Mind 2012Presentazione AD Mind 2012
Presentazione AD Mind 2012
 
Data mining in support of fraud management
Data mining in support of fraud managementData mining in support of fraud management
Data mining in support of fraud management
 
Storia della bambina e della stella marina
Storia della bambina e della stella marinaStoria della bambina e della stella marina
Storia della bambina e della stella marina
 
Tackling Card not present Fraud
Tackling Card not present FraudTackling Card not present Fraud
Tackling Card not present Fraud
 
Merging fraud in a full IP environment
Merging fraud in a full IP environmentMerging fraud in a full IP environment
Merging fraud in a full IP environment
 
introduzione al data mining
introduzione al data mining introduzione al data mining
introduzione al data mining
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Presentazione ADM 2011
Presentazione ADM 2011Presentazione ADM 2011
Presentazione ADM 2011
 
Competitive_intelligence
Competitive_intelligenceCompetitive_intelligence
Competitive_intelligence
 
Mind mapping
Mind mapping Mind mapping
Mind mapping
 
Identifying high value customers
Identifying high value customersIdentifying high value customers
Identifying high value customers
 
Costruire la relazione
Costruire la relazioneCostruire la relazione
Costruire la relazione
 
Using business intelligence for competitive advantage
Using business intelligence for competitive advantageUsing business intelligence for competitive advantage
Using business intelligence for competitive advantage
 

Recently uploaded

Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 

Recently uploaded (20)

Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 

Mobile Payment Fraud & Security Issues

  • 1. Detailing the fraud & security issues surrounding mobile payments Barcellona, 28.09.2011 Stefano Maria De' Rossi Francesco Magini
  • 2. Agenda Mobile payment overview Brief overview of Mobile Fraud Mobile payment threat management Key takeaways
  • 3. What are mobile payments ?
  • 4. Mobile payment: a definition Mobile Payments Mobile Financial services Mobile Banking Mobile Commerce Mobile Money transfer
  • 5.
  • 6. SEPA set apart 2 types of mobile payments SUB POINT Remote payments SEPA mobile payment framework Proximity payments
  • 7.
  • 8.
  • 9. 5 types of Mobile Payments
  • 10. MOBILE AT THE POINT OF SALE (the mobile wallet) It’s paying for things at a store with a mobile device using NFC or “tap & go” or some other yet to be hyped method
  • 11. MOBILE AS THE POINT OF SALE (every smartphone is a cash register) This is merchant using a mobile device to process credit card payments. Do not confuse this with mobile payment. They are not the same thing
  • 12. MOBILE PAYMENT PLATFORM (everything else mobile payment) This is a “catch all” category for product that let consumer send money to merchants or even each other (p2p) using mobile device. It might be at the point of sales, it might be on line.
  • 13. DIRECT CARRIER BILLING (Put it on my phone bill) This is consumer buying ringtones or games or digital content by putting the charges on their cell phone bill
  • 14. CLOSED LOOP MOBILE PAYMENT (the return of the store credit card: now it’s mobile) If a company doesn’t want to wait for someone else to build a wallet or a platform, it can always build it’s own. Starbucks did 3 million transaction in their first two months.
  • 15. Mobile Money Initiative within GSMA Mobile Ticketing
  • 16.
  • 17. Pillar 1 - UICC The UICC is considered the most appropriate NFC secure element for the mobile phone The UICC (Universal Integrated Circuit Card) is also known as the “SIM Card”) The SIM card is used as a multi-application Secure Element to perform trusted transactions with a contactless terminal.
  • 18. Pillar 2 - Near Field Communications NFC, or near-field communications, is a short-wave radio communications technology that provides a way for two devices to communicate small amounts of data when they're placed about four inches apart. NFC is the technology of choice for the mobile industry to enable proximity-based services using the mobile phone
  • 19.
  • 20.
  • 21. That’s the technology… but what about the money ?
  • 22. M-payment is positioned as a potentially lucrative revenue stream Time Market Volume Low Introduction Growth Maturity Decline High Fixed telephony Mobile communications Enhanced TV services Fixed broad-band Source: Frost & Sullivan Broadcast mobile TV services NB: bubble size approximates revenue accruing to communications service providers Mobile payments (excluding SMS-based) Quad-Play services Mobile broadband Triple Play services
  • 24. A €6 billion opportunity by 2013 in Western Europe The market is expected to grow at an average of 25 per cent annually over the next five years
  • 25.
  • 26. The bad news – mobile fraud losses (*) www.cfca.org Communications Fraud Control Association (*)
  • 27. Mobile Phone Frauds Mobile phone fraud is not a new topic and today’s mobile security reflects the industry’s experience of fighting against fraud Analog Cellular mobile cloning Magnetic Stripe skimming Radio Telephony 1950 1970 1990 2000 2010 3G 4G mobile tampering Evolution of technical threats against mobiles and cards Analog Cellular mobile cloning 1G Digital Cellular 2G SIM USIM EMV Magnetic Stripe Embossing skimming counterfeiting 1980 Chip and PIN
  • 28. Evolution of fraud scenario Phreaking fraud Vishing fraud
  • 29. TLC market: new services trend Changes in the telco world are affected by radical evolutions starting from new technologies up to new services linked to different markets (Internet, media, banking) New types of threats and frauds are on the rise
  • 30. What are the big concerns regarding mobile payments? Source: Mobile Money Market: Key Market Drivers & Restraints (2010-2015) Lack of regulation on mobile transactions Quality of service Lack of collaboration between players High cost of solution Better user awareness Ease of payment Secure network Interoperability across networks and platforms Efficiency and speed of mobile networks Drivers Restraints Security will remain a key inhibitor Security concerns
  • 31. Mobile Payment Risks Mobile payment services need a complex architecture involving many players with different roles… Mobile Payment application Source: Aujas
  • 32. A chain is only as strong as its weakest link…
  • 33. Mobile Payment Risk Assessment In order to make a complete risk assessment it’s important to analyze the entire mobile payment ecosystem Man-in-the-middle attack Replay attacks Repudiation Impersonation Unauthorized access Source: Security Issues in Mobile Payment Systems, University of India Mobile payment Protocol Design flaws in mobile protocols Design flaws in m-payment protocols Weak cryptographic algorithm Platform HW SW Side channel attack SIM cloning Vulnerable APIs/Apps Devices Malware Spyware OS
  • 34.
  • 35.
  • 36. Are hackers/fraudsters really interested in mobile payment?
  • 37.
  • 38.
  • 40.
  • 41.
  • 42.
  • 43. Summary & key messages Market status There has been progress in m-payment trials and deployments in Europe but mass adoption remains to be seen. Market outlook The outlook for m-payment remains positive because of technology availability, an increased sense of urgency amongst key stakeholders to enable m-payment functions, and a growing number of end users being comfortable with m-payment functions. Market expectations M-payment methods will vary across Europe; the dominance of SMS-based m-payment functions will continue but contactless technology may become important over the medium term.
  • 44. Key success factors Ease of use for the consumer In the absence of any life critical need, m-payment is a new service that requires consumers to change their habits. Convenience of use becomes very critical. Security assurance We strongly believes that the predominant m-payment technology will be the one that provides an appropriate security level proportionate to the m-transacton. Standardisation & Interoperability The eco-system requires further development to reduce complexity in interactions amongst stakeholders. Standardisation and efforts of interoperability are crucial to decrease fragmentation in the eco system.
  • 45.  

Editor's Notes

  1. 1) some short information about Telecom Italia 2) a mobile payment definition overview 3) an overview of mobile fraud 4) mobile payment threat management
  2. 1) some short information about Telecom Italia 2) a mobile payment definition overview 3) an overview of mobile fraud 4) mobile payment threat management
  3. build up a common definiton…what are, how can we define the so called mobile payment??
  4. if you think about the so called mobile financial services for a while we do have a spread of several different words fying around… Are these all business the same ? Do they have the same meaning ?
  5. Mobile Payment is a composite payment model which encompasses different paradigms, all characterized by the use of the Mobile phone as their primary means of interaction. There is a shift from paying “up close” in which the phone "emulates" a payment card (Mobile Proximity Payment), and the payment of services from a distance (remote) via SMS or Applications (Mobile Remote Payment), to managing in a broad sense, the entire process of purchase and payment remotely (mobile commerce) and the transfer of money between users or between users and financial institutions (Mobile Money Transfer). The common feature of these paradigms is the use of the phone and its distinctive features to innovate the payment methods: the huge population penetration (more than 5 billion devices worldwide), mobility, extreme portability and interactivity. We can evaluate the different types of mobile payment.
  6. Having in mind what we have said we can identify 5 types of mobile payment
  7. One upstart is called Square, which offers a smartphone app and a small piece of free hardware that plugs into a phone. The hardware swipes the credit card and charges $2.75 plus 15 cents for a swipe, or 3.5 percent plus 15 cents for a keyed-in credit-card entry. There are no contracts, no set-up fees, no monthly fees, and no monthly minimums. It has served as an alternative to payment gateways that charge higher fees.
  8. EBay estimates the value of goods sold via its eBay iPhone app topped $400 million this year alone.
  9. There are four major initiatives in the field of mobile money led by the GSM Association
  10. Pay buy mobile is the NFC technology based project chosen to enable proximity based services by the mobile industry
  11. Let’s start from the beginning…le’ts build up a common definiton…what are, how can we define the so called mobile payment??
  12. MOBILE PAYMENTS ARE GROWING ,BUT ARE SO FAR USED MOSTLY FOR LOW-VALUE TRANSACTIONS Frost & Sullivan estimate the value of global m-payments at €140 billion at the end of 2012 and more over the total payment value for NFC globally will reach more than €110 billion in 2015.
  13. T he mobile money market in Western Europe is forecast to increase up to €6 billion by 201.
  14. Let’s start from the beginning…le’ts build up a common definiton…what are, how can we define the so called mobile payment??
  15. Early analog technology was plagued by fraud Credit Card Fraud, Skimming, Chip PIN 1990, 2004
  16. If we take a look at the service from the customer point of view, we can affirm that one of the biggest concerns for consumers is certainly security. Security is traditionally regarded as a very straightforward matter in the eyes of consumers, namely allowing only intended purchases and preventing theft
  17. Security is of paramount importance in an e-payment system. As a first step in designing a cell phone-based e-payment system, it is important to analyze the various security issues that may arise from the choice of platform and of technologies. The truth, however, is that security is quite a complicated area in the mobile payments industry due to its complex architecture made of many players with different roles. In particular, retail and transit payments with a mobile phone require wireless carriers, retailers, transport providers and banks to all work together.
  18. Because we all know that a system is only as secure as the weakest link in the security chain so it is important to analyze every single link of the chain
  19. In order to perform a security analysis of a mobile-payment scheme it is necessary to understand the underlying standards, technologies, protocols and platforms used. An accurate security analysis is possible only if we take a holistic view of the vulnerabilities at each dimension instead of considering only a specific dimension of the m-payment system Based on some academic papers we used a taxonomy of some of vulnerabilities at different layers and their effects. This work it’s useful to examine how existing or proposed m-payment systems could be affected by them. Therefore, we started assessing the design flaws in protocols and standard in mobile network and m-payment system. We then assessed platforms from the hardware and software point of view and finally we analyzed devices especially taking into consideration new generations of malware and spyware.
  20. Let’s now take a look at some potential security issues affecting mobile payments. In 2008 Collin Mulliner demonstrated that the NFC technology can be attacked using man in the middle. So the connection should be protected using strong cryptographic algorithms at higher levels Nowadays it’s largely demosntrated that with low-cost equipement it’s possible to eavsdrop calls by cracking the A5/1 alogrithm used in the GSM network. The takeover is related to impersonation attack types. In this case it happens what is expected from a customer perspective but dealing with a different entity. Data modification and lost of an NFC/RFID device are quite self-explicative from the security point of view.
  21. We’re now aware of the major threats related to mobile payments Now let’s take a look at the possible impacts. They move from Revenue Losses in case of fraudolent transactions, to Loss of confidentiality especially associated to some information such as credit card datas, PINs etc. up to communication services and SIM card misuses
  22. Up to know we just described some theory and academic works even if we used a very pragmatic approach. But now we need to understand if someone, and I’m talking about hackers or fradusters are interested in mobile payment. The answer is, unfortunatley yes, and you don’t need to throw a dice… the rationale is always the same, fradusters will always follow the money and with mobile payments we’re just managing what they want.
  23. Everything it’s real and it’s already happening… Let me just give you some examples: last June Mr. Collin Mulliner gave a presentation of attacks to NFC at the hacker conference NinjaCon. What surprised the audience was that he did it using a very low-budget equipment which makes it even more risky. By the way, all the Operating System are impacted: Some hackers have added NFC to IPhone and others are trying to break Android systems with NFC embedded
  24. These types of threats and vulnerabilities will open the door to new fraud scenarios. Some evergreen frauds such as the identity theft and the skimming of transactions will be used to make purchase of goods. We’ll also have some convergence also from payment and mobile frauds: just imagine downloading malware/malicious codes hidde in a tag able to make calls or send SMS to Premium Rate Numbers in a complete transparent manner from the customer point of view.
  25. So we understood that security is a very complex matter in mobile payments because every link in the chain must be properly secured.
  26. Let’s now take a deeper look at some of these elements from the customer point of view. The final user becomes a central and strategical point for the entire end-to-end ecosystem security. What’s new from the user perspective? Certainly new behaviours so a new customer awareness is needed in order to increase the attention to security
  27. Also the endpoint is evolving. Devices anywhere and always on make difficult to define a perimeter so a new security apporach is needed…
  28. And here comes the security element. It is a critical element for the mobile payment security. Depending on where it is located, we can have different players involved in the security pattern. If i’s embedded the device manufaturer will be the protagonist, if it’s in the SD card of course will be a card company and if we choose the sim card option the mobile operator will be involved…
  29. Thank you very much for your attention
  30. And please if you have any question Stefano and I will be more than pleased to answer you now or during the coffe break