Azhar et al., 2020 - Google Patents
E-banking frauds: The current scenario and security techniquesAzhar et al., 2020
- Document ID
- 17506279934615405225
- Author
- Azhar S
- Shahi M
- Chhapola V
- Publication year
- Publication venue
- Encyclopedia of Criminal Activities and the Deep Web
External Links
Snippet
The digitization of banking has caused a revolution in e-banking frauds. Today, e-banking frauds have become an industry where cyber criminals are employing sophisticated tools to steal information and commit frauds. It is made possible through techniques like phishing …
- 238000000034 method 0 title abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Use of an alias or a single-use code
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khrais | Highlighting the vulnerabilities of online banking system | |
US20210014245A1 (en) | In-stream malware protection | |
Mos et al. | The growing influence of ransomware | |
Houy et al. | Security aspects of cryptocurrency wallets—a systematic literature review | |
González Briones et al. | Review of the main security problems with multi-agent systems used in e-commerce applications | |
Yoo et al. | Case study of the vulnerability of OTP implemented in internet banking systems of South Korea | |
Altwairqi et al. | Four most famous cyber attacks for financial gains | |
Kalla et al. | Phishing detection implementation using databricks and artificial Intelligence | |
Erinle et al. | Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets | |
Sharma | Securing Payments and Banking Systems from Cybersecurity Threats | |
Azhar et al. | E-banking frauds: The current scenario and security techniques | |
Singh et al. | Detection and prevention of phishing attack using dynamic watermarking | |
Thangavel et al. | Review on machine and deep learning applications for cyber security | |
Brar et al. | Vulnerabilities in e-banking: A study of various security aspects in e-banking | |
Sidheeq et al. | Utilizing trusted platform module to mitigate botnet attacks | |
Sultana et al. | Survey on centric data protection method for cloud storage application | |
Komandla | Enhancing Security and Fraud Prevention in Fintech: Comprehensive Strategies for Secure Online Account Opening | |
Ibrahim | A review on online-banking security models, successes, and failures | |
McGee et al. | How to counter cybercrime intrusions | |
Pillai et al. | Design Considerations for Protection of Blockchain based Digital Identity Ecosystem. | |
Best et al. | Cyber Security in Banking Sector. | |
Vakil et al. | Cyber Attacks: Detection and Prevention | |
Vilà | Identifying and combating cyber-threats in the field of online banking. | |
Kaur et al. | CYBER SECURITY ATTACKS IN DIGITAL BANKING: EMERGING SECURITY CHALLENGES AND THREATS | |
Srividhya et al. | Revolution of Digital Transformation Technology: Artificial Intelligence and Blockchain Technology in Cyber Security |