SOCIAL ENGINEERING TACTICS USED IN MOBILE MONEY THEFT IN TANZANIA

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1897
  • Access Fee: ₦5,000 ($14)
  • Pages: 127 Pages
  • Format: Microsoft Word
  • Views: 411
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

ABSTRACT

Social engineering is one of the most common attacking vectors in mobile money transactions. With the increasing rate of mobile money use, it has directly increased the number of social engineering incidents in mobile money services. It is therefore important to evolve a framework for detecting malicious and phishing messages. This could help to reduce threats posed by mobile phone criminals. As of now, some customers and agents have already lost thousands of shillings due to social engineering attacks. This study, investigated the common social engineering techniques used by cybercriminals to steal money from mobile money users. PIN sharing, lack of security awareness, PIN requests and storing PINs in address books were recognized as major sources of vulnerability in mobile money theft. The study revealed that, mobile money users were conned by social engineers using techniques such as, business collaboration benefits, alleged wrong remittance of money, SIM swaps, impersonation of mobile company officials, promotional benefits, employment opportunities, SMS phishing and fraudulent SMS from lost or stolen phones. The study recommends that mobile network operators set time limit for customers to reset their PINs. They should also periodically provide security education to their customers through advertisements and SMS. Customers are also advised not to share their PINs or store them in the address book of their phones to reduce exposure to cyber criminals. Furthermore governmental institutions are advised to acquire professional knowledge, get educational trainings and form strong collaboration to fight against cybercrimes in general and social engineering particularly. 

SOCIAL ENGINEERING TACTICS USED IN MOBILE MONEY THEFT IN TANZANIA
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1897
  • Access Fee: ₦5,000 ($14)
  • Pages: 127 Pages
  • Format: Microsoft Word
  • Views: 411
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1897
    Fee ₦5,000 ($14)
    No of Pages 127 Pages
    Format Microsoft Word

    Related Works

    Social engineering refers to the use of deception by an attacker, with the intent of psychologically manipulating the target/victim, into sharing crucial/confidential information which could either be leaked or used to swindle them. Without a clear understanding of social engineering, mobile users may be highly likely to be victims of social... Continue Reading
    TABLE OF CONTENTS DECLARATION APPROVAL DEDICATION ACKNOWLEDGEMENT iv LIST OF ACRONYMS vii TABLE OF CONTENTS ABSTRACT CHAPTER ONE 1 [NTRODUCTION 1 1.0 Introduction 1 1.1 Background to the study 1 1.1.1 Historical background Perspective 1 1.1.2 Theoretical perspective 2 1.1.3 Conceptual Perspective 3 1.1.4 Contextual Perspective 4 1.2 Problem... Continue Reading
    Table of Contents DECLARATION ii APPROVAL 1 DEDICATION ACKNOWLEDGEMENT v LIST OF TABLES LIST OF FIGURES x ABSTRACT CHAPTER ONE 1 1.0. Introduction 1 Li. 0. Background 1 1.1.1. Flistorical perspective 1 1.1.2 Theoretical frame work 1 1.1.3 Conceptual perspective 2 1.1.4 Contextual perspective 3 1.2. Problem statement 3 1.3. Objectives of the study... Continue Reading
    ABSTRACT This study, which is about the need of value for money audit in public sector, was carried out at MLHSD, Headquarter Dares salaam. The research took the period of 60 days (two months) The intention of the study was to assess the importance of value for money audit in achieving the economy, efficiency and effectiveness in public sector.... Continue Reading
    Researchers have shown that majority of the populace in the developing nations are rural dwellers that do not have access to basic financial services and are poor. This class of people are peasant farmers and petty traders who rely mostly on remittances from their wards and relations in major cities and abroad to meet their financial obligations... Continue Reading
    Abstract The use of Unstructured Supplementary Service Data (USSD) applications in conducting monetary transactions is an unsafe and slow means of payment. Research has shown that USSD applications utilize outdated encryption techniques, which make it susceptible to hackers during data transmission; they are unreliable and have long processes... Continue Reading
    Researchers have shown that majority of the populace in the developing nations are rural dwellers that  do not have access to basic financial services and are poor. This class of people are peasant farmers  and petty traders who rely mostly on remittances from their wards and relations in major cities and  abroad to meet their financial... Continue Reading
    Abstract “Money makes the world go round”. The importance of money has made it a very powerful tool man cannot live without. Thus, it is very important for people to have money when they need it. The mobile phone has developed drastically from a device just for making and receiving calls to one that can be used to take pictures, send emails,... Continue Reading
    ABSTRACT This Research is aimed at the critical analysis of the laws governing mobile money banking, the relationships involved in mobile money operation there in, the regulatory concerns in the mobile money sector and the risks there in. The research also focuses on the challenges, loopholes and critics with in the mobile money sector and their... Continue Reading
    ABSTRACT :obilc money transactions today, have taken over the payment .systems ranging.fi-om offerings such as air time purchase, person to person, and person to business money tramjers. And as such mobile money is considered by many as another mode in the banking system; this has been through commercial banks- partnering with mobile money in the... Continue Reading
    Call Us
    whatsappWhatsApp Us