![]() |
Over the past few years, I have spoken to countless executives about the challenges of managing fraud risk – from corporate banking to online gaming and digital marketplaces. Whether the goal is to protect billions of investment dollars or prevent bad guys from buying online gaming credits with a stolen credit card, the same sentiments always ring true.
One concept used to explain control techniques that has resonated better than most is above vs. below the line controls. Above vs. below the line is a well-known marketing concept that I’ve re-purposed into a fraud risk paradigm. In marketing, they are defined as:
When we apply this concept to fraud and security controls, we may tweak the definition slightly, but ultimately the same principles apply. Above the line controls are those which a consumer can ‘touch and feel’, whereas below the line controls work in the background. Strong authentication is a great example of an ATL control as it is something that a consumer can directly interact with, such as a step-up challenge they may receive if transacting from an unrecognized device. Threat intelligence, data analysis and customer profiling are examples of BTL controls. Above the line controls – The good and not so good Contactless credit card transactions are a perfect example. The perception of security for ‘tap and go’ purchases is mixed, even though the controls are actually far stronger than old school mag-stripes and signatures. No one has ever asked me if it was ok to swipe my card’s (un-encrypted) mag-stripe, yet people still ask if it is okay to tap my card! (That is an article for another day) Although above the line techniques are the starting point for the fraud and security controls of an organization, there are two fundamental weaknesses:
Let’s take SMS one-time factor passcode (OTP) as an example. On its own, it was a very effective control until attackers figured out how to defeat it with phone porting and mobile malware. Figuring out how to migrate millions of customers from SMS OTP to something more robust is now a big problem for many organizations. Below the line controls
To help demonstrate the implications and importance of a balanced fraud risk control approach, let’s play out a hypothetical, but real world scenario Company A Profile: Primarily invests in ‘Above the Line’ controls including:
Company B Profile: Primarily invests in ‘Below the Line’ controls including:
If you were an attacker, which organization would you target? For me, it has to be Company A. It has two-factor authentication at the front door, but once you’re in, it’s Christmas! Just ensure not to get too greedy as you know customers are emailed for every payment greater than $500. It is highly unlikely that you would be detected in the short-term, and you could probably steal large sums of money. As a bad guy, Company B would be very frustrating to attack and not worth my trouble. Like the typical fraudster, I seek the biggest payday possible with the least amount of effort. Trying to beat dynamic controls that I can’t reverse engineer requires investment of time and money, with no guarantee of an outcome. Besides, I have expensive cars to drive, virtual currency to launder and malware coders to pay! The Solution
Just as in the marketing world, the most effective fraud control frameworks use a blend of both approaches to achieve an optimal outcome. Take two minutes out of your day and write down your company’s key fraud controls (above or below a line). You might be surprised what it looks like. The post Applying Common Marketing Practices to Save Millions in Fraud appeared first on Speaking of Security - The RSA Blog. |
