Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?

A.
Intrusion detection systems
B.
Data mining techniques
C.
Firewalls
D.
Packet filtering routers
Explanation:
Data mining is a technique used to detect trends or patterns of transactions or datA . If the historical pattern of charges against a credit card account is changed, then it is a flag that the transaction may have resulted from a fraudulent use of the card.
I choose B
0
0