[go: up one dir, main page]

Orucho et al., 2023 - Google Patents

Assessing Operation of Mobile Banking Applications that Support Customers to Access Banking Services Remotely

Orucho et al., 2023

Document ID
11141028180073549705
Author
Orucho D
Awuor F
Oduor C
Publication year
Publication venue
International Conference on Optimization and Data Science in Industrial Engineering

External Links

Snippet

Mobile banking applications are programs that are created by banks to help their customers' access banking services remotely. This study assesses operation of mobile banking applications that enable customers to access banking services from their devices …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Rizvi et al. Identifying the attack surface for IoT network
Yang et al. Privacy and security aspects of E-government in smart cities
Srinivas et al. Government regulations in cyber security: Framework, standards and recommendations
US20230412626A1 (en) Systems and methods for cyber security and quantum encapsulation for smart cities and the internet of things
US20170374057A1 (en) System and method for secure online authentication
Anisetti et al. Security threat landscape
Ibrahim A review on the mechanism mitigating and eliminating internet crimes using modern technologies: mitigating internet crimes using modern technologies
Stewart CompTIA Security+ Review Guide: Exam SY0-601
Ojugo et al. Social engineering detection model for mobile smartphone clients
JP2025506007A (en) SYSTEM AND METHOD FOR PROTECTING DEVICES IN A COMPUTER ENVIRONMENT - Patent application
Kaushik et al. A novel approach for an automated advanced MITM attack on IoT networks
Haber et al. Attack vectors
Jagannath et al. Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures
Perumal et al. Cybercrime issues in smart cities networks and prevention using ethical hacking
Gowda et al. Data breach as a threat in the banking sector and steps to avoid it
Kujo Implementing zero trust architecture for identities and endpoints with Microsoft tools
Sarjiyus et al. Improved online security framework for e-banking services in Nigeria: A real world perspective
Au et al. Mobile security and privacy: Advances, challenges and future research directions
Luvanda Proposed framework for securing mobile banking applications from man in the middle attacks
Orucho et al. Assessing Operation of Mobile Banking Applications that Support Customers to Access Banking Services Remotely
Fedorenko et al. Investigating vulnerabilities of personal data on financial websites.
Kothawade et al. Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment.
Gottipati A proposed cybersecurity model for cryptocurrency exchanges
Jawad et al. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems
Lingamgunta Cyber Security For Beginners