2. L’usurpation d’identité est à la
base de l’arnaque au
Président, au changement de
RIB, au faux fournisseur, au
faux ordre de virement (FOVI).
Une attaque FOVI peut
tuer une PME…
17. Immersive Fictitious Data Architectures (IFDA) - Financial Attacks Model
Attacker : Goal, Strategy S, Gain function to maximize
Attacker produces a series of actions : [ (AR1,AD1), (AR2,AD2), …… , (ARn,ADn) Goal or not]
where ARi is an action on physical space,
ADi is an action on cyberspace (sending mail, SMS, dataset, files, malware, html link, video, audio, text).
(AR2, AD2) = S < (AR1,AD1) ; (TR1,TD1) >
(AR3, AD3) = S < [(AR1,AD1)(TR1,TD1)(AR2,AD2)] ; (TR2,TD2) >
…..
( ARk , ADk ) = S < [(AR1-AD1), (TR1,TD1), ….. , (ARk-1,ADk-1)] ; (TRk-1,TDk-1) >
Preserving the trust of the target in the sequence :
TRUST-TARGET < [(AR1-AD1), (TR1,TD1), ….. , (ARk-1,ADk-1), (TRk-1,TDk-1), (ARk, ADk) ] > = 1 (if 0 stop)
Preserving the consistency of the sequence :
CONSISTENCY < [(AR1-AD1), (TR1,TD1), ….. , (ARk-1,ADk-1), (TRk-1,TDk-1), (ARk, ADk) ] > = 1 (if 0 stop)
Maximize the IMMERSIVITY of the sequence
Target : Target produces (or not) a series of actions (physical space – cyberspace) : [ TR1-TD1, TR2-TD2, …… , TRn-
TDn,…. ] in response (or not) to the actions of Attacker.