Review the two outcomes of the fraud scenario

Assignment Help Computer Network Security
Reference no: EM131759495

Business Case: HSBC Combats Fraud in Split-second Decisions

With billions of dollars, corporate reputations, customer loyalty, and criminal penalties for noncompliance at stake, financial firms must outsmart fraudsters.

Detecting and preventing fraudulent transactions across many lines of business (checking, savings, credit cards, loans, etc.) and online channels require comprehensive real time data analytics to assess and score transactions. That is, each transaction has to be analyzed within a split second to calculate the probability that it is fraudulent or legitimate.

A big part of a bank's relationship with customers is giving them confidence that they are protected against fraud, and balancing that protection with their need to have access to your services.

HSCB Overview

HSBC is a commercial bank known by many as the "world's local bank." HSBC is a United Kingdom-based company that provides a wide range of banking and related financial services. The bank reported a pre-tax profit of $6.8 billion in the first quarter of 2014 (1Q 2014). It has 6,300 offices in 75 countries and over 54 million customers.

Fighting Fraudulent Transactions

HSBC was able to reduce the incidence of fraud across tens of millions of debit and credit card accounts. The bank implemented the latest Fraud Management software from SAS. The software includes an application programming interface (API) and a real time transaction scoring system based on advanced data analytics.

Using the Fraud Management app, HSBC has reduced its losses from fraudulent transactions worldwide and its exposure to increasingly aggressive threats. The antifraud solution is live in the United States, Europe, and Asia, where it protects 100 percent of credit card transactions in real time.

Scenario

Consider this scenario. A credit card transaction request comes in for the purchase of $6,000 in home appliances. The bank has a moment to decide to approve the transaction, or reject it as potentially fraudulent. Two outcomes are possible:

• Legitimate purchase rejected: When a legitimate purchase is rejected, the customer might pay with another card. The bank loses the fee income from the purchase and the interest fee. Risks of account churn increases.

• Fraudulent purchase accepted: When a fraudulent purchase is accepted, a legitimate customer becomes a victim of a crime. The bank incurs the $6,000 loss, the cost of the fraud investigation, potential regulatory scrutiny, and bad publicity. Chances of recovering any losses are almost zero.

With trillions of dollars in assets, HSBC Holdings plc is a prime target for fraud. Fighting all forms of fraud-unauthorized use of cards for payment and online transactions, and even customer fraud-has risen to the top of the corporate agenda. Fraud losses are operating costs that damage the bottom line.

As required by regulations, HSBC has implemented policies to segregate duties, create dual controls, and establish strong audit trails to detect anomalies. In addition, the bank has antifraud technology, which includes SAS Fraud Management, to monitor and score the millions of daily transactions. It is the cornerstone of these efforts.

Fraud Management

In 2007 HSBC's first SAS implementation went live in the United States, which was their largest portfolio with 30 million cards issued there. All transactions were scored in real time.

Detection rates on debit ATM transactions have been very effective. HSBC has updated its Fraud Management solution multiple times as newer technology and threats emerged.

Of course, financial fraud morphs to avoid new detection methods so antifraud models have a very short shelf life. Once HSBC closes up one loophole, thieves devise new threats to exploit other potential vulnerabilities. To counteract threats, fraud-monitoring algorithms and scoring models require constant refreshing

Sources: Business Wire (2011), SAS.com (2014), Reuters (2014), YouTube video "HSBC Relies on SAS for Comprehensive Fraud Detection."

Questions

1. Analyze the reasons to invest millions of dollars to detect and prevent fraudulent transactions. In your evaluation, do a cost-benefit analysis to show why the investment cost is worthwhile.

2. Review the two outcomes of the fraud scenario. Assess the business implications of each of the following two goals. Explain why these goals are conflicting.

a. To minimize rejecting legitimate purchases by authorized customers

b. To minimize the risk of making customers victims of fraud

3. The Fraud Management solution is based on a scoring model. For example, assume the scores range from 1 to 10, with 10 being the highest probability that the transaction is fraudulent.

What cutoff score would you use to decide to approve a purchase? What cutoff score would you use to decide not to approve a purchase? If those cutoff scores are not the same, how do you suggest those falling between scores be treated?

4. Why are approval decisions made in a split second? Would customers tolerate a brief delay in the approval process if it reduced their risk of identity theft? Explain your answer.

5. Research ATM or other banking transaction fraud. How has a financial firm been defrauded or harmed?

Reference no: EM131759495

Questions Cloud

United states in international economics : The United States in International Economics: What are the ways that government policy impacts poverty?
Discuss hartford research issues bonds dated january : Hartford Research issues bonds dated January 1, 2015, that pay interest semiannually on June 30 and December 31
The demand curve for a monopolist : Suppose the The demand curve for a monopolist is QD = 47,000 -50 P, and the marginal revenue function is MR = 940 - 0.04Q. The monopolist
Write a piece of character analysis in two kinds by amy tan : Write a piece of character analysis in Two Kinds by Amy Tan pp. 222-229. Take the short story apart according to narrator, characters, and conflicts.
Review the two outcomes of the fraud scenario : Analyze the reasons to invest millions of dollars to detect and prevent fraudulent transactions.
Low-income and middle-income economies : Why are inflationary dangers lower in the high-income economies than in low-income and middle-income economies?
Calculate free cash flow for amazon for the current : Calculate free cash flow for Amazon for the current and prior years, Calculate free cash flow for Amazon for the current and prior years
Explain why converging economies : Explain why converging economies may present a strong argument for limiting flows of capital but not for limiting trade.
Improvement for the business continuity plan : BSBCON801 - Explain how the Plan-Do-Check-Act (PDCA) Model as a framework improvement for the Business Continuity Plan

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd