Alsayed et al., 2017 - Google Patents
E-banking security: Internet hacking, phishing attacks, analysis and prevention of fraudulent activitiesAlsayed et al., 2017
View PDF- Document ID
- 8173280859064207363
- Author
- Alsayed A
- Bilgrami A
- Publication year
- Publication venue
- International Journal of Emerging Technology and advanced engineering
External Links
Snippet
Since the introduction of internet banking to the banking sector, many users have discovered hard ways that their use of e-banking can place their financial data at risk. Therefore, security has become a frequent concern for both banks and users. A phishing attack refers to …
- 230000000694 effects 0 title abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Use of an alias or a single-use code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alsayed et al. | E-banking security: Internet hacking, phishing attacks, analysis and prevention of fraudulent activities | |
US12093992B2 (en) | Systems and methods for detection of session tampering and fraud prevention | |
Badotra et al. | A systematic review on security of E-commerce systems | |
US8826400B2 (en) | System for automated prevention of fraud | |
Yoo et al. | Case study of the vulnerability of OTP implemented in internet banking systems of South Korea | |
Furnell | E-commerce security: a question of trust | |
Afaq et al. | A critical analysis of cyber threats and their global impact | |
Nwogu et al. | Security issues analysis on online banking implementations in Nigeria | |
Muntode et al. | An Overview on Phishing-its types and Countermeasures | |
Deo et al. | Information security-recent attacks in Fiji | |
Abdulla et al. | Consumer use of E-banking in Iraq: Security breaches and offered solution | |
Hutchings | Computer security threats faced by small businesses in Australia | |
Hamirani | The challenges for cyber security in e-commerce | |
Brar et al. | Vulnerabilities in e-banking: A study of various security aspects in e-banking | |
Thiyagarajan et al. | Anti-phishing technique using automated challenge response method | |
Sidheeq et al. | Utilizing trusted platform module to mitigate botnet attacks | |
Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
San Martino et al. | A model for securing e-banking authentication process: antiphishing approach | |
Ahmad et al. | User requirement model for federated identities threats | |
Sekhon | The Dark Side of Cashless Transactions: Understanding Threats to Banking Security | |
Mihai | Overview on phishing attacks | |
Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
Mapoka et al. | Hack the Bank and Best Practices for Secure Bank | |
Kamal et al. | Security and Privacy Issues in Wireless Networks and Mitigation Methods | |
Belghith | e-CommerceShield: A Framework for Enhanced Security in E-Commerce with Awareness, DNS Matching, and Blockchain Integration |