Cybercrime in "Credit Card Systems": Case Study on the 2014 Korean Credit Bureau Data Leak
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Case Studies | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014

Cybercrime in "Credit Card Systems": Case Study on the 2014 Korean Credit Bureau Data Leak

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman

As technology is advancing Credit card systems have become the corner stone of E-commerce-related payments. People have become dependent on online payment systems. The increase in its importance causes a lot of privacy and security concerns. The researchers performed a business case analysis on the 2014 internal attack on the Korean Credit Bureaus databases focusing on the stolen credit card details of customers. A study on literature review was conducted to identify the possible threats, formulate solutions and develop a framework as a countermeasure from future attacks.

Keywords: privacy, security, threats, ecommerce, framework

Edition: Volume 3 Issue 3, March 2014

Pages: 530 - 534

Share this Article

How to Cite this Article?

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman, "Cybercrime in "Credit Card Systems": Case Study on the 2014 Korean Credit Bureau Data Leak", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131201, Volume 3 Issue 3, March 2014, 530 - 534

71 PDF Views | 56 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on User's Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Similar Articles with Keyword 'security'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the User's Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Similar Articles with Keyword 'threats'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Case Studies, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 530 - 534

Cybercrime in "Credit Card Systems": Case Study on the 2014 Korean Credit Bureau Data Leak

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 12, December 2017

Pages: 1757 - 1761

Primary Factor Investigation for Decreasing the Computational Complexity of LAMSTAR DDoS

Dhanasekaran R, Balaji P

Share this Article

Similar Articles with Keyword 'ecommerce'

Case Studies, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 530 - 534

Cybercrime in "Credit Card Systems": Case Study on the 2014 Korean Credit Bureau Data Leak

Walter. T. Mambodza, Robert T. R. Shoniwa, V. M. Shenbagaraman

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1391 - 1395

A Review on Automatic News Classification using the Probabilistic Classification Algorithms

Mandeep Kaur, Pravneet Kaur

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 495 - 500

Web Service Application to Access Climate Data from Cloud using Spring Framework

Vijayshree, Dr. Rekha Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 372 - 375

Study of Semantic Models in Identifying Aspects in Customer Reviews

Mily Lal, Akanksha Goel, Amruta Chore

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 8 Issue 5, May 2019

Pages: 868 - 872

Connecting Social Media to E-Commerce Product Recommendation using Top-K

Nisha T

Share this Article

Similar Articles with Keyword 'framework'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2116 - 2119

Approach to Detect and Block DDOS Attack at Application Layer Using Novel Framework

V. Mogal, Shekhar H. Pingale

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2505 - 2507

Performance Management in Network Management System

Shankar N, Dr. Shantharam Nayak

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1063 - 1066

A Survey on Automatic Fault Detection Framework for Cloud based Application

Kshitija Nandgaonkar, Swarupa Kamble

Share this Article
Top