Orucho et al., 2023 - Google Patents
Assessing Operation of Mobile Banking Applications that Support Customers to Access Banking Services RemotelyOrucho et al., 2023
- Document ID
- 11141028180073549705
- Author
- Orucho D
- Awuor F
- Oduor C
- Publication year
- Publication venue
- International Conference on Optimization and Data Science in Industrial Engineering
External Links
Snippet
Mobile banking applications are programs that are created by banks to help their customers' access banking services remotely. This study assesses operation of mobile banking applications that enable customers to access banking services from their devices …
- 238000003339 best practice 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rizvi et al. | Identifying the attack surface for IoT network | |
| Yang et al. | Privacy and security aspects of E-government in smart cities | |
| Srinivas et al. | Government regulations in cyber security: Framework, standards and recommendations | |
| US20230412626A1 (en) | Systems and methods for cyber security and quantum encapsulation for smart cities and the internet of things | |
| US20170374057A1 (en) | System and method for secure online authentication | |
| Anisetti et al. | Security threat landscape | |
| Ibrahim | A review on the mechanism mitigating and eliminating internet crimes using modern technologies: mitigating internet crimes using modern technologies | |
| Stewart | CompTIA Security+ Review Guide: Exam SY0-601 | |
| Ojugo et al. | Social engineering detection model for mobile smartphone clients | |
| JP2025506007A (en) | SYSTEM AND METHOD FOR PROTECTING DEVICES IN A COMPUTER ENVIRONMENT - Patent application | |
| Kaushik et al. | A novel approach for an automated advanced MITM attack on IoT networks | |
| Haber et al. | Attack vectors | |
| Jagannath et al. | Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures | |
| Perumal et al. | Cybercrime issues in smart cities networks and prevention using ethical hacking | |
| Gowda et al. | Data breach as a threat in the banking sector and steps to avoid it | |
| Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
| Sarjiyus et al. | Improved online security framework for e-banking services in Nigeria: A real world perspective | |
| Au et al. | Mobile security and privacy: Advances, challenges and future research directions | |
| Luvanda | Proposed framework for securing mobile banking applications from man in the middle attacks | |
| Orucho et al. | Assessing Operation of Mobile Banking Applications that Support Customers to Access Banking Services Remotely | |
| Fedorenko et al. | Investigating vulnerabilities of personal data on financial websites. | |
| Kothawade et al. | Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment. | |
| Gottipati | A proposed cybersecurity model for cryptocurrency exchanges | |
| Jawad et al. | Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems | |
| Lingamgunta | Cyber Security For Beginners |