{"title":"商业电子邮件破解 (BEC) 欺诈及如何防范","authors":"Dwi Siska Susanti, Fitria Errinandini Subandi, Naila Failasufa, Wibi Anska Putri","doi":"10.21532/apfjournal.v8i2.307","DOIUrl":null,"url":null,"abstract":"Cybercrime is on the rise both at the national and cross-border levels. The latest mode of cybercrime is fraud using Business Email Compromise (BEC). A qualitive analysis method with literature study is applied to discuss two key questions of this paper. First, how does the BEC scheme occur?. Second, how an organization/company can prevent/mitigate the risk of BEC fraud. This paper concludes that BEC can be executed in the form of phishing emails sent by perpetrators (both internal and external actors of the organization) to the target victim (organization’s employees) in order to deceive and obtain financial gain. Various efforts can be made by an organization/company to prevent the risk of BEC fraud, among others in the form of implementing a risk management system, implementing an information security management system, and increasing the organization’s internal awareness.","PeriodicalId":251943,"journal":{"name":"Asia Pacific Fraud Journal","volume":"50 ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Business Email Compromise (BEC) Fraud and How to Prevent it\",\"authors\":\"Dwi Siska Susanti, Fitria Errinandini Subandi, Naila Failasufa, Wibi Anska Putri\",\"doi\":\"10.21532/apfjournal.v8i2.307\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cybercrime is on the rise both at the national and cross-border levels. The latest mode of cybercrime is fraud using Business Email Compromise (BEC). A qualitive analysis method with literature study is applied to discuss two key questions of this paper. First, how does the BEC scheme occur?. Second, how an organization/company can prevent/mitigate the risk of BEC fraud. This paper concludes that BEC can be executed in the form of phishing emails sent by perpetrators (both internal and external actors of the organization) to the target victim (organization’s employees) in order to deceive and obtain financial gain. Various efforts can be made by an organization/company to prevent the risk of BEC fraud, among others in the form of implementing a risk management system, implementing an information security management system, and increasing the organization’s internal awareness.\",\"PeriodicalId\":251943,\"journal\":{\"name\":\"Asia Pacific Fraud Journal\",\"volume\":\"50 \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Asia Pacific Fraud Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21532/apfjournal.v8i2.307\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asia Pacific Fraud Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21532/apfjournal.v8i2.307","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Business Email Compromise (BEC) Fraud and How to Prevent it
Cybercrime is on the rise both at the national and cross-border levels. The latest mode of cybercrime is fraud using Business Email Compromise (BEC). A qualitive analysis method with literature study is applied to discuss two key questions of this paper. First, how does the BEC scheme occur?. Second, how an organization/company can prevent/mitigate the risk of BEC fraud. This paper concludes that BEC can be executed in the form of phishing emails sent by perpetrators (both internal and external actors of the organization) to the target victim (organization’s employees) in order to deceive and obtain financial gain. Various efforts can be made by an organization/company to prevent the risk of BEC fraud, among others in the form of implementing a risk management system, implementing an information security management system, and increasing the organization’s internal awareness.