Overview
Explore fraud detection techniques and real-time trust decisions in this 47-minute conference talk from BSidesSF 2016. Delve into the parallels between fraud detection and computer security, examining adversarial and technological ecosystems with exploits and attack surfaces. Learn about the challenges faced by businesses in identifying fraudulent activity as the on-demand economy shortens the window between purchase and service delivery. Discover common methods fraudsters use to attack online commerce, from traditional storefront attacks to challenges in real-time marketplaces. Gain insights into techniques and technologies employed to combat online fraud, drawing parallels with traditional network and application security practices. The talk covers topics such as the Target Credit Card Breach, credit card fraud history, classic attacks, reshipping, relationship graphs, machine learning, and lessons learned in security.
Syllabus
Introduction
Thesis
The Red Team
Target Credit Card Breach
Credit Card Fraud
Fraud History
Classic Attack
Reshipping
Assumptions
Relationship graphs
Machine learning
Lessons learned
Security parallels
Questions
Taught by
Security BSides San Francisco