SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsSkimming is a topic that I had never heard of until a work associate, whom was making suggestions for my practical, mentioned it. I was quite curious and embarked to see whether I could find any information on this topic. My associate did not know the term used for this activity or that for the device used to accomplish it. However, upon speaking to my mentor about it, he provided the appropriate term, 'skimming' and indicated that this might be a good topic. What I have learned in my research has truly amazed me and I endeavor to share some of that information in this paper. I will define skimming describe what a skimming device may look like discuss how skimming is done provide some statistical information and provide some pointers on how to avoid being skimmed and what to do if it happens. In addition I will provide some of the industry solutions and recommendations for this international problem. For those who have had their card information stolen and/or had their identities stolen as a result of skimming I will provide information that may be helpful to your recovery.