31.01.2023 Views

Cyber Defense eMagazine February Edition for 2023

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Cloud vendors' features can be deployed quickly, the algorithms used are highly trained and optimized,<br />

have already proven effective, can be tailored to some extent, and are updated.For example, Google<br />

developed a smart analytics design pattern that helps users build a scalable real-time fraud detection<br />

solution in one hour. The serverless feature can provide fraud notifications and dashboards to monitor<br />

the per<strong>for</strong>mance of the fraud detection pipeline.<br />

Cloud-ready anti-fraud models can be very cost-efficient. However, they do have limitations. Most cloud<br />

vendors mainly provide credit card fraud detection ML. Other types of fraud, such as internal fraud, may<br />

require the development of custom ML models.<br />

On the other hand, with ML-as-a-service, your company can develop a unique algorithm custom-made<br />

<strong>for</strong> your particular business needs. Depending on the complexity of your business, these models may be<br />

more or less expensive than ML in the cloud. The main benefit of having a company build its ML model<br />

is ownership.<br />

Both cloud anti-fraud ML models and ML-as-a-service, require some level of expertise. It's critical <strong>for</strong> any<br />

company to understand the basics of anti-fraud ML be<strong>for</strong>e venturing into this journey.<br />

Finally, the most challenging road, especially <strong>for</strong> startups that do not have a resourceful team of data<br />

scientists, is creating, building, training, testing, and deploying their own ML anti-fraud model. While this<br />

can be expensive and time-consuming, it is highly customizable, and you will own your own technology.<br />

How to build ML anti-fraud models<br />

How exactly do anti-fraud AI-ML technologies work? As mentioned be<strong>for</strong>e, the main goal of your ML<br />

model will be to know your customers, suppliers, workers, and partners. The first step is to identify fraud<br />

patterns in your organization.<br />

ML is trained to recognize “normal” behavior by double-checking key data of financial transactions. ML<br />

models analyze a wide range of different data, checking it against historical data, and can identify wether<br />

the operation aligns with “normal” behaviour. If it does not, ML solutions will flag and shut down the<br />

operation. For example, the ML model may check where the transaction originates and whether it<br />

matches where the customer lives.<br />

Most companies run fraud programs to deter, prevent, and resolve online payment fraud. However, it's a<br />

good idea to consider expanding the models to include possible internal fraud, corporate fraud, payroll,<br />

overbilling, or inventory fraud. These types of fraud are common and are not perpetrated by consumers<br />

but happen from within your company.<br />

Monitoring fraud activity <strong>for</strong> workers, partners, suppliers, and other business contacts can help you create<br />

a holistic program that works on all levels. Once you have identified fraud patterns and defined your<br />

program's scope, you can start defining your data sets—what data you will use in the anti-fraud ML model.<br />

When you use your historical database, you should choose the data that best helps you understand your<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2023</strong> <strong>Edition</strong> 145<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!