Known Fraudulent Methods that Adopt New Techniques to Overcome Protection Barriers and Violate Information Security
GEORGE CHRISTOPHER ROCIO
In recent years, we have noticed an increase in the number of crimes in which criminal agents use increasingly sophisticated mechanisms to break the security barrier related to authentication processes.
This article highlights the need to adopt Artificial Intelligence (AI) awareness and discusses some devices used by criminal agents to break protection authentication and security barriers and then access Information Systems or resources.
The techniques and methods presented in this article serve as a warning and the need to implement more elaborate security mechanisms at the time of authentication.
An awareness of secure authentication and control is required, focusing on information security, as well as the need to implement additional processes of identification and verification to reduce the risks of new information security incidents.
Introduction
This article aims to inform, warn, and expose the practice of criminal conduct that has been carried out with the use of more sophisticated technologies and is increasingly accessible to a large part of the population.
This article is limited to the observation of two cases registered during April and May 2023. Both cases made use of techniques and tools pertinent to the use of artificial intelligence and alleged weaknesses related to information security.
I will also be limited to detailing the facts that are under investigation and presenting the facts of an expert investigation at the end of the process conducted by the police....