[go: up one dir, main page]

Alsayed et al., 2017 - Google Patents

E-banking security: Internet hacking, phishing attacks, analysis and prevention of fraudulent activities

Alsayed et al., 2017

View PDF
Document ID
8173280859064207363
Author
Alsayed A
Bilgrami A
Publication year
Publication venue
International Journal of Emerging Technology and advanced engineering

External Links

Snippet

Since the introduction of internet banking to the banking sector, many users have discovered hard ways that their use of e-banking can place their financial data at risk. Therefore, security has become a frequent concern for both banks and users. A phishing attack refers to …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Use of an alias or a single-use code
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
Alsayed et al. E-banking security: Internet hacking, phishing attacks, analysis and prevention of fraudulent activities
US12093992B2 (en) Systems and methods for detection of session tampering and fraud prevention
Badotra et al. A systematic review on security of E-commerce systems
US8826400B2 (en) System for automated prevention of fraud
Yoo et al. Case study of the vulnerability of OTP implemented in internet banking systems of South Korea
Furnell E-commerce security: a question of trust
Afaq et al. A critical analysis of cyber threats and their global impact
Nwogu et al. Security issues analysis on online banking implementations in Nigeria
Muntode et al. An Overview on Phishing-its types and Countermeasures
Deo et al. Information security-recent attacks in Fiji
Abdulla et al. Consumer use of E-banking in Iraq: Security breaches and offered solution
Hutchings Computer security threats faced by small businesses in Australia
Hamirani The challenges for cyber security in e-commerce
Brar et al. Vulnerabilities in e-banking: A study of various security aspects in e-banking
Thiyagarajan et al. Anti-phishing technique using automated challenge response method
Sidheeq et al. Utilizing trusted platform module to mitigate botnet attacks
Hutchings et al. Criminals in the cloud: Crime, security threats, and prevention measures
San Martino et al. A model for securing e-banking authentication process: antiphishing approach
Ahmad et al. User requirement model for federated identities threats
Sekhon The Dark Side of Cashless Transactions: Understanding Threats to Banking Security
Mihai Overview on phishing attacks
Reuvid The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
Mapoka et al. Hack the Bank and Best Practices for Secure Bank
Kamal et al. Security and Privacy Issues in Wireless Networks and Mitigation Methods
Belghith e-CommerceShield: A Framework for Enhanced Security in E-Commerce with Awareness, DNS Matching, and Blockchain Integration