강의

멘토링

커뮤니티

NEW
Security & Network

/

Computer Security

Personal Financial Fraud (Hacking) Prevention and Response Methods

Voice phishing, URL, mobile, accounts, card usage, internet banking, ARS authentication, and other various financial fraud incidents are causing an increase in victims. Recently, hacking and fraud techniques utilizing various vulnerabilities such as open banking, simple payment (pay), strengthened fraud methods, hackers utilizing leaked personal information, and taking control of personal PCs and mobile devices are being reinforced. Financial authorities and various financial companies do not specifically disclose accident procedures and hacking methods related to financial consumers, which has led to growing misunderstandings among people who have never experienced hacking. We have recognized the seriousness of this issue through reports from our surroundings and have produced educational materials. Please, we hope you will recognize accurate hacking methods, and also understand related laws and policies to appropriately establish preventive systems and strengthen response measures in advance. (In case of incidents, it is your own responsibility under current law.)

2 learners are taking this course

  • jueygrace
협업말센스
Penetration Testing
System Hacking
ISMS-P
CPPG
Engineer information security

What you will gain after the course

  • Whether I can steal someone else's assets using their personal information

  • Whether vulnerable services can be found to involve others in crimes through simple fraud methods

🛡️ Online Financial Fraud Prevention Professional Training Guide

– Link/QR access, account hijacking, vulnerable service payment damage… Why won't they compensate? –

📌 Recently, sophisticated financial scams targeting individuals have surged dramatically in online spaces. Damages that appear to occur from simply clicking links or QR codes, and incidents where multiple payments are made using personal information entered just once on phishing sites have already become everyday risks we encounter. However, most financial consumers are not properly informed about why such damages are processed as 'non-compensable', and how laws are actually applied.


⚠️ 1. Financial fraud methods we misunderstand

🔗 ① Money gets stolen just by accessing links or QR codes?
In reality, it's nearly impossible for money to be withdrawn from accounts through simple access alone,
but when combined with malicious app installation, remote control permission, or entering information on phishing sites without the user's knowledge,
it creates a situation that 'appears as if money was stolen just by accessing' the link.

📥 ② Once you enter information on a phishing site, multiple payments occur
Some simple payment services like Naver and Coupang have structures that allow login and payment with just ID/PW,
and in this case, the responsibility for not activating additional authentication (2FA) is judged as 100% user negligence.

📱 ③ Others opening mobile phones under my name for malicious use
When someone else opens an additional SIM card under the same name, verification texts are sent to that number,
and victims have virtually no way of knowing this.



⚖️ 2. Compensation is difficult even when damage occurs? — The reality of regulations

According to the Telecommunications Basic Act and Electronic Transactions Act
✔️ Financial institutions have no compensation obligation if the cause of personal information leakage lies with the consumer
✔️ No legal liability as long as basic abnormal transaction detection and authentication services are provided

Also, even if you report to the police,
✔️ Due to differences in the application of laws and regulations, it is difficult to achieve actual damage relief


🧪 3. Why aren't PC and mobile malicious apps visible?

📌 Some malicious apps hide their icons or disguise themselves as system apps, making it
difficult for users to find them directly.


🧭 4. Threat Scenarios Based on Real Incident Cases

📌 Incident Cases #1~#3:
– Personal information theft followed by exploitation through SMS, app, and simple payment integration
– Automatic payments after account login, gift card and point conversion methods
– Possibility of file theft from PC also exists


🛡️ 5. Essential Personal-Level Protection Measures

🧰 ① Mandatory implementation of 2-step authentication (OTP, biometric authentication)
🧱 ② Check automatic payments and account linking for simple payment services
🔍 ③ Regular verification of additional SIM card activations
📵 ④ Absolutely prohibit clicking on links or QR codes from unknown sources
🛑 ⑤ Regular inspection of uninstalled apps and 'device administrator permissions' settings
💉 ⑥ Install reputable antivirus software and perform regular scans



🎓 6. Objectives of This Course

🌐 Accurately understand the gap between reality and regulations and
🔐 Clearly explain the technical and institutional background of financial fraud methods while
🛡️ Providing practical response strategies that individuals can use to protect themselves.

Recommended for
these people

Who is this course right for?

  • Non-experts who have experienced financial fraud but find it difficult to establish additional security measures on their own

  • Someone who hasn't experienced financial fraud but knows about actual hacking and finds it difficult to know how to be cautious and make judgments as someone without experience

Need to know before starting?

  • Understanding the Telecommunications Business Act

  • Understanding Electronic Commerce Act

Hello
This is

86

Learners

6

Reviews

4.2

Rating

23

Courses

보안컨설팅

Curriculum

All

3 lectures ∙ (29min)

Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

Limited time deal

$7,700.00

30%

$8.80

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!