[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Azhar et al., 2020 - Google Patents

E-banking frauds: The current scenario and security techniques

Azhar et al., 2020

Document ID
17506279934615405225
Author
Azhar S
Shahi M
Chhapola V
Publication year
Publication venue
Encyclopedia of Criminal Activities and the Deep Web

External Links

Snippet

The digitization of banking has caused a revolution in e-banking frauds. Today, e-banking frauds have become an industry where cyber criminals are employing sophisticated tools to steal information and commit frauds. It is made possible through techniques like phishing …
Continue reading at www.igi-global.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Use of an alias or a single-use code

Similar Documents

Publication Publication Date Title
Khrais Highlighting the vulnerabilities of online banking system
US20210014245A1 (en) In-stream malware protection
Mos et al. The growing influence of ransomware
Houy et al. Security aspects of cryptocurrency wallets—a systematic literature review
González Briones et al. Review of the main security problems with multi-agent systems used in e-commerce applications
Yoo et al. Case study of the vulnerability of OTP implemented in internet banking systems of South Korea
Altwairqi et al. Four most famous cyber attacks for financial gains
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
Erinle et al. Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets
Sharma Securing Payments and Banking Systems from Cybersecurity Threats
Azhar et al. E-banking frauds: The current scenario and security techniques
Singh et al. Detection and prevention of phishing attack using dynamic watermarking
Thangavel et al. Review on machine and deep learning applications for cyber security
Brar et al. Vulnerabilities in e-banking: A study of various security aspects in e-banking
Sidheeq et al. Utilizing trusted platform module to mitigate botnet attacks
Sultana et al. Survey on centric data protection method for cloud storage application
Komandla Enhancing Security and Fraud Prevention in Fintech: Comprehensive Strategies for Secure Online Account Opening
Ibrahim A review on online-banking security models, successes, and failures
McGee et al. How to counter cybercrime intrusions
Pillai et al. Design Considerations for Protection of Blockchain based Digital Identity Ecosystem.
Best et al. Cyber Security in Banking Sector.
Vakil et al. Cyber Attacks: Detection and Prevention
Vilà Identifying and combating cyber-threats in the field of online banking.
Kaur et al. CYBER SECURITY ATTACKS IN DIGITAL BANKING: EMERGING SECURITY CHALLENGES AND THREATS
Srividhya et al. Revolution of Digital Transformation Technology: Artificial Intelligence and Blockchain Technology in Cyber Security