|
Portable network accessPortable network access is a type of POS machine event that involves connecting unknown or old POS machines, or even directly modified POS machines, to the platform through a relationship. The acquiring platform only needs a "machine terminal number" and a "key issuance" to access the network. Making it impossible for acquiring institutions or banks to access the security monitoring of this POS machine has resulted in the regulatory authorities losing their inspection mechanism for this POS machine, posing security risks to the financial system. The Hazards of Carrying a Computer to the Network The source of POS terminals carried by related parties is unknown, and the agent's own security awareness and inspection methods are lacking. POS terminals belong to the financial category, and first of all, the terminals must comply with security testing and certification. There are a large number of cheap POS terminals in the market that do not have security testing and certification, and more importantly, there are a large number of old models whose terminal programs have been cracked by the public, In addition, there are also two phones and three phones that have lost the "self destruct" function. The above models all have the possibility of being installed with "card stealing devices", and based on the various POS terminals that have been discovered with "card stealing devices" installed, these possibilities have been infinitely increased. Nowadays, the most feared thing is to steal credit cards, which have become an indispensable part of many people's lives. Illegal individuals take advantage of the opportunity to obtain consumer information through various illegal means, one of which is to modify POS machines and use them to access the internet. Therefore, carrying a computer to access the internet is a relatively dangerous way. According to the latest data, 74% of the incidents of credit card theft are related to the modification of POS machines. After the modification of the program, the modified POS machines are used as a cleaning machine, and then fraud or theft is carried out by obtaining the information of the cardholder, or by accessing the platform with a laptop to obtain the cardholder's information. In the special inspection of bank card information protection carried out by the Central People's Bank of China, risks such as illegal modification and information leakage of POS terminals were strictly investigated. The China Payment and Clearing Association jointly issued an initiative to eliminate modification of POS machines, focusing on the types of reports of illegal and irregular payment and settlement of modified POS machines. This shows how deeply the country detests modification of POS machines. So carrying a computer to the internet is usually a behavior that we explicitly prohibit. |