SlideShare una empresa de Scribd logo
1 de 49
Descargar para leer sin conexión
CREDIT CARD FRAUDS,[object Object],RASTISLAV TUREK,[object Object]
Who am i,[object Object],Blogger ,[object Object],(blog.synopsi.com),[object Object],Slovak,[object Object],Independent security consultant,[object Object],      (synopsi.com),[object Object],Twitterholic,[object Object],(almost 6 500 tweets in year and half),[object Object],Technologist,[object Object]
Before we start,[object Object],… little survey,[object Object],Do you know the differences between credit and debit card?,[object Object],Do you have one or two debit or credit cards?,[object Object],Do you have more than two cards?,[object Object],Do you know what credit card number means?,[object Object],Did somebody steal money from you card?,[object Object]
History of Credit Cards,[object Object],First credit card (1920” in US),[object Object],Diners Club (1950),[object Object],First modern credit card company,[object Object],American Express (1958),[object Object],BankAmericard (1958),[object Object],     later Visa,[object Object],Everything Card (1967),[object Object],      later Master Charge (1969),[object Object],     later Master Card (1979),[object Object]
Card security improvements,[object Object],Personal,[object Object],[object Object]
Magnetic stripe from 1966
Pin from 1967
Chip and Pin from 2003Internet,[object Object],[object Object]
MasterCard from 1997
Visa from 2001
3D Secure from 2004
Verified By Visa
MasterCardSecureCode
J/SecureGlobal,[object Object],[object Object]
Payment Application Data Security Standard,[object Object]
Card number,[object Object],All magnetic stripe identification cards are generated in ISO/IEC 7812,[object Object],Almost every issued card number can be validated with Luhn “mod 10” algorithm,[object Object],You can check your card via IS (BIN) on http://bins.bankinfo.sk,[object Object]
IssuerIdentificationNumber,[object Object],Previously “Bank IdentificationNumber” (BIN),[object Object],This number is used to identify:,[object Object],[object Object]
Issued bank (HSBC, Citibank, Commerce AG, …)
Exact card type (Credit Gold, Debit Business, …)
Issuer phone number for card blocking* Card Number Length,[object Object]
PIN,[object Object],[object Object]
generated by encrypting PAN (Primary Account Number) with PGK (PIN Generation KEY) with 3DES and at the end decimalised. Sometimes can be added offset to original PINCVV/CVV2/CVC/CVC2,[object Object],[object Object],4 digit, printed on the back side ,[object Object],of card, AMEX on the front,[object Object],[object Object],Card security elements,[object Object]
Card security elements,[object Object],Magnetic Stripe,[object Object],Track 1B4888603170607238^Head/Potato^050510100000000001203191805191000000,[object Object],Track 24888603170607238=05051011203191805191,[object Object],Track 2 plus/se (Track 3)014888603170607238==0401000000000000003000000000000007020===0=,[object Object],Track 2 can be generated manually from track 1 and vice versa. ,[object Object],Also Track 3 can be generated from Track 1, but not vice versa.,[object Object]
Card security elements,[object Object],Chip,[object Object],More secure than Magnetic stripe,[object Object],Same CHIP as in GSM SIM cards (not encryption),[object Object],Encrypted data by 3DES or RSA,[object Object],Key set is usually loaded (DES) or generated (RSA),[object Object],After decryption, there are similar tracks as in ,[object Object],Magnetic stripe,[object Object],Chip (Track 2)4974101234567890=0810221xxxxxx40600004970891234567890=0909221xxxxxx3000000,[object Object],Magnetic (Track 2)4974101234567890=0810221xxxxxx02100004970891234567890=0909221xxxxxx3370000,[object Object]
3-D Secure,[object Object],XML based protocol,[object Object],Always using SSL connection,[object Object],You are buying something from a merchant,[object Object],He will redirects you to payment processor page (encrypted),[object Object],You’ll enter card information (encrypted),[object Object],Payment processor checks if you card is valid for VBV/MSC/JSC,[object Object],If it’s ok, it redirects you to card issuer website (your bank). Many banks are outsourcing this step, then you can be redirected to different website (encrypted),[object Object],You’re prompted to fill up form (if you’re there for first time), or fill up password (SMS code, etc.) (encrypted),[object Object],If verification passed, you are redirected back to payment processor website which will check your supplied card data (encrypted),[object Object],And at the last step you are redirected back to merchant website,[object Object],Card security elements,[object Object]
Card transactions,[object Object],ATM, POS and Internet payments works very similar, there are just little differences.,[object Object],You give card to a merchant,[object Object],He puts it in to POS terminal,[object Object],POS terminal send important information ,[object Object],to payment processor (encrypted),[object Object],Payment processor checks who is a issuer and,[object Object],	ask him if your card is ok, if you have enough ,[object Object],money for this transaction (encrypted),[object Object],Bank will send response (only YES, NO) to payment,[object Object],processor (encrypted),[object Object],Payment processor sends response to your ,[object Object],merchant (encrypted),[object Object],If response is positive, you’ll get your stuff,[object Object]
Frauds,[object Object],There are many ways how to steal from people ,[object Object],But there are just few ways how to cash money from stolen cards,[object Object],There is bran new business just for this,[object Object],In this part you will see business models of thieves,[object Object],You will see real life examples, from real businesses used by these people,[object Object]
Stealing,[object Object],Your card can be stolen using many ways :,[object Object],[object Object]
hacked payment processor
hacked bank
hacked mall
skimming
phishing / vhishing
stolen card
malware / keylogger
generated card				 	       http://www.ic3.gov/media/annualreports.aspx,[object Object]
Business models,[object Object],Universal business model to get cash from stolen credit cards,[object Object],Sometimes one person is able to serve several positions,[object Object]
Position: Hacker,[object Object],His job is get credit card with all accessible information,[object Object],Middle dangerous position,[object Object],As a “freelancer” will get only approximately $1 for each working card,[object Object],In a group he gets smallest cut,[object Object],How he gets credit cards?,[object Object],SQLi  on websites (mostly eShops),[object Object],Hacking payment processors (millions cards),[object Object],Eavesdropping traffic in mall,[object Object],all cards are checked before selling,[object Object]
Hacker’s Pricelist,[object Object],Talking about “freelancer”,[object Object],Prices mostly depends on amount of information ,[object Object],He can get much more, if he can provide information like balance of credit on the card, SSN, DOB, MMN, etc.,[object Object],all cards are checked before selling,[object Object]
Position: Skimmer,[object Object],His job is get cards information from Magnetic Stripe / Chip / RFID,[object Object],Very dangerous position,[object Object],As a “freelancer” will get approximately $25 for each working card,[object Object]
Skimmer’s Pricelist,[object Object],Talking about “freelancer”,[object Object],Price depends on type of card, issued country and bank,[object Object],He can get much more, if he can provide information about balance,[object Object],Price also depends on source of card (Hotels have high value, restaurants have low value, …),[object Object],all cards are checked before selling,[object Object]
Skimmer in action,[object Object]
Skimmer in action,[object Object]
Skimmer in action,[object Object]
Skimmer in action,[object Object]
This will not help,[object Object]
Position: Phisher/Vhisher,[object Object],His job is to get information about cards by using social engineering ,[object Object],Low dangerous position,[object Object],Success only in 0.001% from all sent emails (depends on quality of email and site),[object Object],He mostly get all information about card and his owner (on black market known as Fullz, high valuable cards),[object Object],In 65% he also get access to owners email and in 47% is the target site PayPal,[object Object],Vhishing is form of phishing but over the phone (much more successful),[object Object]
Phisher’sPricelist,[object Object],Talking about “freelancer”,[object Object],High valuable cards,[object Object],They’re mostly selling with cards PayPal, MoneyBookers, eBay, RapidShare, … accounts.,[object Object],Declined Fullz can be used for shopping with “Bill Me Later, PayPal Later, …”,[object Object],all cards are checked before selling,[object Object],Talking about Fullz (SSN, DOB, MMN, PIN, …),[object Object]
Phisher’sSuccess,[object Object]

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Presentation on Debit and credit card
Presentation on Debit and credit cardPresentation on Debit and credit card
Presentation on Debit and credit card
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Electronic or digital cash
Electronic or digital cashElectronic or digital cash
Electronic or digital cash
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 

Destacado

Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Pollenizer Universal Startup Pitch Deck
Pollenizer Universal Startup Pitch DeckPollenizer Universal Startup Pitch Deck
Pollenizer Universal Startup Pitch DeckMick Liubinskas
 
Výročná správa SK-NIC, a.s. za rok 2008
Výročná správa SK-NIC, a.s. za rok 2008Výročná správa SK-NIC, a.s. za rok 2008
Výročná správa SK-NIC, a.s. za rok 2008Rastislav Turek
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionanthonytaylor01
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Výročná správa SK-NIC, a.s. za rok 2007
Výročná správa SK-NIC, a.s. za rok 2007Výročná správa SK-NIC, a.s. za rok 2007
Výročná správa SK-NIC, a.s. za rok 2007Rastislav Turek
 
Kritika pravidiel poskytovania menného priestoru v internetovej doméne sk
Kritika pravidiel poskytovania menného priestoru v internetovej doméne skKritika pravidiel poskytovania menného priestoru v internetovej doméne sk
Kritika pravidiel poskytovania menného priestoru v internetovej doméne skRastislav Turek
 
Dodatok k zmluve o spolupraci
Dodatok k zmluve o spolupraciDodatok k zmluve o spolupraci
Dodatok k zmluve o spolupraciRastislav Turek
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)k.surya kumar
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
Credit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationCredit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationAyapparaj SKS
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionJustluk Luk
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
How Credit Card Processing Works
How Credit Card Processing WorksHow Credit Card Processing Works
How Credit Card Processing WorksBusiness.com
 

Destacado (20)

Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Pollenizer Universal Startup Pitch Deck
Pollenizer Universal Startup Pitch DeckPollenizer Universal Startup Pitch Deck
Pollenizer Universal Startup Pitch Deck
 
Výročná správa SK-NIC, a.s. za rok 2008
Výročná správa SK-NIC, a.s. za rok 2008Výročná správa SK-NIC, a.s. za rok 2008
Výročná správa SK-NIC, a.s. za rok 2008
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Výročná správa SK-NIC, a.s. za rok 2007
Výročná správa SK-NIC, a.s. za rok 2007Výročná správa SK-NIC, a.s. za rok 2007
Výročná správa SK-NIC, a.s. za rok 2007
 
Kritika pravidiel poskytovania menného priestoru v internetovej doméne sk
Kritika pravidiel poskytovania menného priestoru v internetovej doméne skKritika pravidiel poskytovania menného priestoru v internetovej doméne sk
Kritika pravidiel poskytovania menného priestoru v internetovej doméne sk
 
Dodatok k zmluve o spolupraci
Dodatok k zmluve o spolupraciDodatok k zmluve o spolupraci
Dodatok k zmluve o spolupraci
 
Zmluva o spolupraci
Zmluva o spolupraciZmluva o spolupraci
Zmluva o spolupraci
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Credit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationCredit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client Presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Credit Cards
Credit CardsCredit Cards
Credit Cards
 
How Credit Card Processing Works
How Credit Card Processing WorksHow Credit Card Processing Works
How Credit Card Processing Works
 

Similar a Credit Card Frauds

Id Theft
Id TheftId Theft
Id Theftmojo_5
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and financeJia
 
Virtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVirtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVijayan Ganapathy
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemWarren Smith
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
Credit Debit Card And Debit Cards
Credit Debit Card And Debit CardsCredit Debit Card And Debit Cards
Credit Debit Card And Debit CardsChristina Martin
 
Ec2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systemsEc2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systemsNuth Otanasap
 
Identity Theft Investigator Training
Identity Theft Investigator TrainingIdentity Theft Investigator Training
Identity Theft Investigator TrainingSLINGR
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Donald E. Hester
 

Similar a Credit Card Frauds (20)

Id Theft
Id TheftId Theft
Id Theft
 
carding.pdf
carding.pdfcarding.pdf
carding.pdf
 
Area of impact -banking and finance
Area of impact -banking and financeArea of impact -banking and finance
Area of impact -banking and finance
 
ATM
ATMATM
ATM
 
Payments & Its Innovations
Payments & Its InnovationsPayments & Its Innovations
Payments & Its Innovations
 
PLASTIC MONEY
PLASTIC MONEYPLASTIC MONEY
PLASTIC MONEY
 
Virtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerceVirtual money, internet, privacy, piracy & e-commerce
Virtual money, internet, privacy, piracy & e-commerce
 
Replace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card SystemReplace The Current Antiquated Credit Card System
Replace The Current Antiquated Credit Card System
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
Credit Debit Card And Debit Cards
Credit Debit Card And Debit CardsCredit Debit Card And Debit Cards
Credit Debit Card And Debit Cards
 
ID Theft
ID TheftID Theft
ID Theft
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
Ec2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systemsEc2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systems
 
Identity Theft Investigator Training
Identity Theft Investigator TrainingIdentity Theft Investigator Training
Identity Theft Investigator Training
 
credit card theft
credit card theftcredit card theft
credit card theft
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 

Más de Rastislav Turek

Sociálne siete a bezpečnosť
Sociálne siete a bezpečnosťSociálne siete a bezpečnosť
Sociálne siete a bezpečnosťRastislav Turek
 
Socialne siete: navod pre deti
Socialne siete: navod pre detiSocialne siete: navod pre deti
Socialne siete: navod pre detiRastislav Turek
 
SYNOPSI Boyfriend Audit 2.0
SYNOPSI Boyfriend Audit 2.0SYNOPSI Boyfriend Audit 2.0
SYNOPSI Boyfriend Audit 2.0Rastislav Turek
 
Cílené útoky na klienty banky
Cílené útoky na klienty bankyCílené útoky na klienty banky
Cílené útoky na klienty bankyRastislav Turek
 
Slovenské deti a riziká virtuálneho priestoru
Slovenské deti a riziká virtuálneho priestoruSlovenské deti a riziká virtuálneho priestoru
Slovenské deti a riziká virtuálneho priestoruRastislav Turek
 
Rodičovská kontrola vo Windows Vista
Rodičovská kontrola vo Windows VistaRodičovská kontrola vo Windows Vista
Rodičovská kontrola vo Windows VistaRastislav Turek
 
Vraj rodinách chýbajú pravidlá
Vraj rodinách chýbajú pravidláVraj rodinách chýbajú pravidlá
Vraj rodinách chýbajú pravidláRastislav Turek
 
Pravá zdravá strava alebo Jeden Vifon, prosím
Pravá zdravá strava alebo Jeden Vifon, prosímPravá zdravá strava alebo Jeden Vifon, prosím
Pravá zdravá strava alebo Jeden Vifon, prosímRastislav Turek
 
Information Security Survey in Slovak Republic 2008
Information Security Survey in Slovak Republic 2008Information Security Survey in Slovak Republic 2008
Information Security Survey in Slovak Republic 2008Rastislav Turek
 
Information Security Survey in Czech Republic 2007
Information Security Survey in Czech Republic 2007Information Security Survey in Czech Republic 2007
Information Security Survey in Czech Republic 2007Rastislav Turek
 

Más de Rastislav Turek (13)

Sociálne siete a bezpečnosť
Sociálne siete a bezpečnosťSociálne siete a bezpečnosť
Sociálne siete a bezpečnosť
 
Socialne siete: navod pre deti
Socialne siete: navod pre detiSocialne siete: navod pre deti
Socialne siete: navod pre deti
 
SYNOPSI Boyfriend Audit 2.0
SYNOPSI Boyfriend Audit 2.0SYNOPSI Boyfriend Audit 2.0
SYNOPSI Boyfriend Audit 2.0
 
Cílené útoky na klienty banky
Cílené útoky na klienty bankyCílené útoky na klienty banky
Cílené útoky na klienty banky
 
Slovenské deti a riziká virtuálneho priestoru
Slovenské deti a riziká virtuálneho priestoruSlovenské deti a riziká virtuálneho priestoru
Slovenské deti a riziká virtuálneho priestoru
 
Rodičovská kontrola vo Windows Vista
Rodičovská kontrola vo Windows VistaRodičovská kontrola vo Windows Vista
Rodičovská kontrola vo Windows Vista
 
Vraj rodinách chýbajú pravidlá
Vraj rodinách chýbajú pravidláVraj rodinách chýbajú pravidlá
Vraj rodinách chýbajú pravidlá
 
Pravá zdravá strava alebo Jeden Vifon, prosím
Pravá zdravá strava alebo Jeden Vifon, prosímPravá zdravá strava alebo Jeden Vifon, prosím
Pravá zdravá strava alebo Jeden Vifon, prosím
 
Information Security Survey in Slovak Republic 2008
Information Security Survey in Slovak Republic 2008Information Security Survey in Slovak Republic 2008
Information Security Survey in Slovak Republic 2008
 
Information Security Survey in Czech Republic 2007
Information Security Survey in Czech Republic 2007Information Security Survey in Czech Republic 2007
Information Security Survey in Czech Republic 2007
 
OWASP Testing Guide v3
OWASP Testing Guide v3OWASP Testing Guide v3
OWASP Testing Guide v3
 
Practical Web Attacks
Practical Web AttacksPractical Web Attacks
Practical Web Attacks
 
Synopsi Barcamp
Synopsi BarcampSynopsi Barcamp
Synopsi Barcamp
 

Último

ANALYSIS OF BANK MANDIRI S HEALTH LEVEL BASED ON RISK PROFILE, GOOD CORPORATE...
ANALYSIS OF BANK MANDIRI S HEALTH LEVEL BASED ON RISK PROFILE, GOOD CORPORATE...ANALYSIS OF BANK MANDIRI S HEALTH LEVEL BASED ON RISK PROFILE, GOOD CORPORATE...
ANALYSIS OF BANK MANDIRI S HEALTH LEVEL BASED ON RISK PROFILE, GOOD CORPORATE...indexPub
 
Buy-Side Leaps Into Gen AI Era by Jasper Colin
Buy-Side Leaps Into Gen AI Era by Jasper ColinBuy-Side Leaps Into Gen AI Era by Jasper Colin
Buy-Side Leaps Into Gen AI Era by Jasper ColinJasper Colin
 
Stock Market Brief Deck FOR 31124 yt.pdf
Stock Market Brief Deck FOR 31124 yt.pdfStock Market Brief Deck FOR 31124 yt.pdf
Stock Market Brief Deck FOR 31124 yt.pdfMichael Silva
 
14.11.2024 AMOO-MOCA African Creative Economy Summit London summary.pdf
14.11.2024 AMOO-MOCA African Creative Economy Summit London summary.pdf14.11.2024 AMOO-MOCA African Creative Economy Summit London summary.pdf
14.11.2024 AMOO-MOCA African Creative Economy Summit London summary.pdfjamie766122
 
The Role of Non-Banking Financial Companies (NBFCs).pdf
The Role of Non-Banking Financial Companies (NBFCs).pdfThe Role of Non-Banking Financial Companies (NBFCs).pdf
The Role of Non-Banking Financial Companies (NBFCs).pdfChampak Jhagmag
 
2024.03 Strategic Resources_Pub presentation
2024.03 Strategic Resources_Pub presentation2024.03 Strategic Resources_Pub presentation
2024.03 Strategic Resources_Pub presentationAdnet Communications
 
2024.03 Strategic Resources_Pub (1). pdf
2024.03 Strategic Resources_Pub (1). pdf2024.03 Strategic Resources_Pub (1). pdf
2024.03 Strategic Resources_Pub (1). pdfAdnet Communications
 
Swift_Maintaining Critical Standards(...).pptx.pdf
Swift_Maintaining Critical Standards(...).pptx.pdfSwift_Maintaining Critical Standards(...).pptx.pdf
Swift_Maintaining Critical Standards(...).pptx.pdfNeo4j
 
Pros and Cons of Interest-Only DSCR Loans
Pros and Cons of Interest-Only DSCR LoansPros and Cons of Interest-Only DSCR Loans
Pros and Cons of Interest-Only DSCR LoansPark Place Finance LLC
 
First, Second, and Third Generation Islamic Economicss
First, Second, and Third Generation Islamic EconomicssFirst, Second, and Third Generation Islamic Economicss
First, Second, and Third Generation Islamic EconomicssAsad Zaman
 
Stock Market Brief Deck FOR 3142024..pdf
Stock Market Brief Deck FOR 3142024..pdfStock Market Brief Deck FOR 3142024..pdf
Stock Market Brief Deck FOR 3142024..pdfMichael Silva
 
powerpoint presentation about asian regioonalism
powerpoint presentation about asian regioonalismpowerpoint presentation about asian regioonalism
powerpoint presentation about asian regioonalismrezeraaisla
 
Challenging Factors of Rural Women Entrepreneurs in West Bengal
Challenging Factors of Rural Women Entrepreneurs in West  BengalChallenging Factors of Rural Women Entrepreneurs in West  Bengal
Challenging Factors of Rural Women Entrepreneurs in West BengalNabarun Chakraborty
 
Planning of societal re/production in a commonist society
Planning of societal re/production in a commonist societyPlanning of societal re/production in a commonist society
Planning of societal re/production in a commonist societyStefanMz
 
Economic Risk Factor Update: March 2024 [SlideShare]
Economic Risk Factor Update: March 2024 [SlideShare]Economic Risk Factor Update: March 2024 [SlideShare]
Economic Risk Factor Update: March 2024 [SlideShare]Commonwealth
 
AUDITING FRAUDS OF AN ENGLISH COMPANY.PPTX
AUDITING FRAUDS OF AN ENGLISH COMPANY.PPTXAUDITING FRAUDS OF AN ENGLISH COMPANY.PPTX
AUDITING FRAUDS OF AN ENGLISH COMPANY.PPTXkamikazekujoh
 
Mytilineos (OW, TP_ €46.0_sh)_ Strong organic progress 14-03-2024.pdf
Mytilineos (OW, TP_ €46.0_sh)_ Strong organic progress 14-03-2024.pdfMytilineos (OW, TP_ €46.0_sh)_ Strong organic progress 14-03-2024.pdf
Mytilineos (OW, TP_ €46.0_sh)_ Strong organic progress 14-03-2024.pdfNewsroom8
 
renaltumors upasana sahu Group 50.pptxism
renaltumors upasana sahu Group 50.pptxismrenaltumors upasana sahu Group 50.pptxism
renaltumors upasana sahu Group 50.pptxismthxz2fdqxw
 
BIHC Briefing Greece March 2024, with Crédit Agricole CIB
BIHC Briefing Greece March 2024, with Crédit Agricole CIBBIHC Briefing Greece March 2024, with Crédit Agricole CIB
BIHC Briefing Greece March 2024, with Crédit Agricole CIBNeil Day
 

Último (20)

ANALYSIS OF BANK MANDIRI S HEALTH LEVEL BASED ON RISK PROFILE, GOOD CORPORATE...
ANALYSIS OF BANK MANDIRI S HEALTH LEVEL BASED ON RISK PROFILE, GOOD CORPORATE...ANALYSIS OF BANK MANDIRI S HEALTH LEVEL BASED ON RISK PROFILE, GOOD CORPORATE...
ANALYSIS OF BANK MANDIRI S HEALTH LEVEL BASED ON RISK PROFILE, GOOD CORPORATE...
 
Closing Remarks International Women's Day 2024
Closing Remarks International Women's Day 2024Closing Remarks International Women's Day 2024
Closing Remarks International Women's Day 2024
 
Buy-Side Leaps Into Gen AI Era by Jasper Colin
Buy-Side Leaps Into Gen AI Era by Jasper ColinBuy-Side Leaps Into Gen AI Era by Jasper Colin
Buy-Side Leaps Into Gen AI Era by Jasper Colin
 
Stock Market Brief Deck FOR 31124 yt.pdf
Stock Market Brief Deck FOR 31124 yt.pdfStock Market Brief Deck FOR 31124 yt.pdf
Stock Market Brief Deck FOR 31124 yt.pdf
 
14.11.2024 AMOO-MOCA African Creative Economy Summit London summary.pdf
14.11.2024 AMOO-MOCA African Creative Economy Summit London summary.pdf14.11.2024 AMOO-MOCA African Creative Economy Summit London summary.pdf
14.11.2024 AMOO-MOCA African Creative Economy Summit London summary.pdf
 
The Role of Non-Banking Financial Companies (NBFCs).pdf
The Role of Non-Banking Financial Companies (NBFCs).pdfThe Role of Non-Banking Financial Companies (NBFCs).pdf
The Role of Non-Banking Financial Companies (NBFCs).pdf
 
2024.03 Strategic Resources_Pub presentation
2024.03 Strategic Resources_Pub presentation2024.03 Strategic Resources_Pub presentation
2024.03 Strategic Resources_Pub presentation
 
2024.03 Strategic Resources_Pub (1). pdf
2024.03 Strategic Resources_Pub (1). pdf2024.03 Strategic Resources_Pub (1). pdf
2024.03 Strategic Resources_Pub (1). pdf
 
Swift_Maintaining Critical Standards(...).pptx.pdf
Swift_Maintaining Critical Standards(...).pptx.pdfSwift_Maintaining Critical Standards(...).pptx.pdf
Swift_Maintaining Critical Standards(...).pptx.pdf
 
Pros and Cons of Interest-Only DSCR Loans
Pros and Cons of Interest-Only DSCR LoansPros and Cons of Interest-Only DSCR Loans
Pros and Cons of Interest-Only DSCR Loans
 
First, Second, and Third Generation Islamic Economicss
First, Second, and Third Generation Islamic EconomicssFirst, Second, and Third Generation Islamic Economicss
First, Second, and Third Generation Islamic Economicss
 
Stock Market Brief Deck FOR 3142024..pdf
Stock Market Brief Deck FOR 3142024..pdfStock Market Brief Deck FOR 3142024..pdf
Stock Market Brief Deck FOR 3142024..pdf
 
powerpoint presentation about asian regioonalism
powerpoint presentation about asian regioonalismpowerpoint presentation about asian regioonalism
powerpoint presentation about asian regioonalism
 
Challenging Factors of Rural Women Entrepreneurs in West Bengal
Challenging Factors of Rural Women Entrepreneurs in West  BengalChallenging Factors of Rural Women Entrepreneurs in West  Bengal
Challenging Factors of Rural Women Entrepreneurs in West Bengal
 
Planning of societal re/production in a commonist society
Planning of societal re/production in a commonist societyPlanning of societal re/production in a commonist society
Planning of societal re/production in a commonist society
 
Economic Risk Factor Update: March 2024 [SlideShare]
Economic Risk Factor Update: March 2024 [SlideShare]Economic Risk Factor Update: March 2024 [SlideShare]
Economic Risk Factor Update: March 2024 [SlideShare]
 
AUDITING FRAUDS OF AN ENGLISH COMPANY.PPTX
AUDITING FRAUDS OF AN ENGLISH COMPANY.PPTXAUDITING FRAUDS OF AN ENGLISH COMPANY.PPTX
AUDITING FRAUDS OF AN ENGLISH COMPANY.PPTX
 
Mytilineos (OW, TP_ €46.0_sh)_ Strong organic progress 14-03-2024.pdf
Mytilineos (OW, TP_ €46.0_sh)_ Strong organic progress 14-03-2024.pdfMytilineos (OW, TP_ €46.0_sh)_ Strong organic progress 14-03-2024.pdf
Mytilineos (OW, TP_ €46.0_sh)_ Strong organic progress 14-03-2024.pdf
 
renaltumors upasana sahu Group 50.pptxism
renaltumors upasana sahu Group 50.pptxismrenaltumors upasana sahu Group 50.pptxism
renaltumors upasana sahu Group 50.pptxism
 
BIHC Briefing Greece March 2024, with Crédit Agricole CIB
BIHC Briefing Greece March 2024, with Crédit Agricole CIBBIHC Briefing Greece March 2024, with Crédit Agricole CIB
BIHC Briefing Greece March 2024, with Crédit Agricole CIB
 

Credit Card Frauds