SlideShare a Scribd company logo
Cyber Security in
Internet Banking
Presented By
Deepika Goyal
www.company.com
Internet Banking
•Paper-free transactions
•Account balances, transfers, bill payment,
statements
•Fast and convenient
www.company.com
Cyber Crime in Internet
Banking
• Crime committed using a computer and
the internet to steal a person’s identity or
illegal imports or malicious programs.
•With the advent of technology banking
sector saw a paradigm shift in the general
phenomenon which enable their
customers to access their bank finances
24*7 using ATM and online banking.
•However with the enhancement of
technology, banking frauds have also
increased.
www.company.com
Incidents and financial
impacts continue to grow
The number of stolen
Credit card
information has
Increased by
48%
Credit card
information
Theft via Point of
Sales infections have
Increased by
700%
The number of
userID
and password thefts
has increased
By 410%
Cyber Threat intelligence Report
First Quarter 2014
www.company.com
Target of Attacks
Phishing Attacks
Trojan Attacks
Pharming
DNS Spoofing
Network Interception
Web
Application
Attacks
Attacking
Server
www.company.com
Client Attacks
Most promising attack on the client:
• Phishing
•Motivate user to enter confidential information
on fake web site
• Simple Trojans
• Limited to a handful of eBanking applications
• Steal username, password and one time
password
• Steals session information and URL and sends it
to attacker
• Attacker imports information into his browser to
access the same account
www.company.com
Generic Trojans
•Infection of client with user interaction
• Email attachments (ZIP, Exe, etc.)
• Email with link to malicious web site
• Links in social networks
• Integrated in popular software (downloads)
• File transfer of instant messaging/VoIP/file
sharing
• CD-ROM/USB Stick
www.company.com
Features
• In the wild since 2007, but still in
development
• Can attack any eBanking (and any web
application)
• New configuration is downloaded
continously
Infection of client without user
interaction
• Malicious web sites
• Infection of trusted, popular web
sites (IFRAME …)
• Misusing software update
functionality (like Bundestrojaner)
• Attacks on vulnerable, exposed
computer (network/wireless)
www.company.com
Pharming
•Pharming is a cyber attack intended
to redirect a website's traffic to
another, fake site. Pharming can be
conducted either by changing the
hosts file on a victim's computer or by
exploitation of a vulnerability in DNS
server software.
www.company.com
Actors of Banking Fraud
The actors of banking fraud can be
categorised into four main categories.
•Malacious Exploiters
•Money Mules
•Victims
•Security Guardians
www.company.com
Malacious Exploiters
It can be categorised into five sub categories:
• Innovators
• Amateur
• Insiders
• Copy Cats
• Criminals
Individuals recruitted wittingly and often
unwittingly by criminals, to facilitate illegal funds
transfers from bank accounts
Money Mules
www.company.com
Victims
• Banks
• User of these banks
It can be categorised into two sub categories:
Security Guardians
They are the most important actor of this system as they
improve the existing banking system and help in removing
the vulnerabilites and development of systems so that
these frauds can be mitigated.
www.company.com
Security Measures
• Attack Detection
• Second Channel / Secured Channel
• Secure Client
Secure Client Second Channel
Secured Channel
Attack Detection
www.company.com
Attack Detection
• Detect session hijacking attacks
• Monitor and compare request parameters
• Identify SSL Session and IP address changes
• Transaction verification / user profiling
• Statistic about normal user behaviour
• Compare transaction with normal user
behaviour
• White list target accounts
• Limits on transaction amount
www.company.com
•Second Channel
• Send verification using another channel
• Another application on the client computer
• Another medium like mobile phones (SMS)
•Secured Channel
• Enter data on an external device
• External device can not be controlled by Trojan
• Externel device contains a secret key
Security Measures
www.company.com
•Secure Platform
• A computer that is only used for eBanking
• Bootable CD-ROM, Bootable USB Stick
• Virtual Machine
• eBanking Laptop
•Secure Environment
• Start an application (eg Browser) that protects
itself from Trojans.
• Proprietary Application (fat client)
• Verify environment before login is possible
Security Measures
www.company.com
Security trends
Current client security approaches:
•A) Secured Application/Virtualization
• Hardened Browser on USB stick
• Application to secure the client
• Virtual operating system on host system
• Bootable CD-ROM/USB stick
•B) Transaction Signing
• Transaction details and unlock code on
mobile (SMS)
• External device with SmartCard
• Read information from screen and decrypt
on external device
www.company.com
A) Secured Application/Virtualization
www.company.com
B) Transaction Signing
• Devices (some examples):
• Mobile phones
• IBM ZTIC, EVM CAP, Axsionics
• Tricipher
www.company.com
Security trends
www.company.com
Secure Communication
• In our fictious example we have a user Alice
who wishes to login to her bank. We also have a
vicious attacker Eve who is trying to steal Alice's
hard-earned money. The bank is using a
username and password to protect
• Alice's account has no encryption. This scheme
is obviously vulnerable to a snooping attack as
illustrated in below Figure. One way to improve
security is by employing One-time Passwords.
www.company.com
• One-time passwords (OTPs) are, like the name
suggests, passwords that are used only once.
One-time passwords
• The OTPs can be implemented using a hash-chain
algorithm.
www.company.com
Secure Socket Layer
• Secure Socket Layer abbreviated as SSL is a
protocol designed to provide security and data
integrity.
• SSL supports a wide range of algorithms, some
very strong and some weak. For example
Handelsbanken, a Swedish bank, uses SHA-1
for signing and RSA for encryption.
www.company.com
Security Token
• We saw how OTPs are constructed and
used.
• We can further enhance the security by a
PIN-code.
• This two-factor authentication makes it more
dificult to gain access to an account.
www.company.com
Security Token
www.company.com
Chip Authentication Program
(CAP)
• CAP is a relatively new protocol based on
the older EMV standard.
• It was developed by MasterCard and is
based on digitally signing transactions.
• CAP can operate in three modes: identify,
respond and sign.
www.company.com
CAP Modes
• Identify : Without requiring any further input, the CAP
reader interacts with the smartcard to produce a decimal
one-time password, which can be used, for example, to log
in to a banking website.
• Response : This mode implements
challenge-response authentication, where the bank's
website asks the customer to enter a "challenge" number
into the CAP reader, and then copy the "response" number
displayed by the CAP reader into the web site.
• Sign : This mode is an extension of the previous, where
not only a random "challenge" value, but also crucial
transaction details such as the transferred value, the
currency, and recipient's account number have to be typed
into the CAP reader
www.company.com
Response-mode of the CAP-
protocol
www.company.com
Recent…
Kaspersky Lab, a Russian security
company, said that hackers had infiltrated
more than 100 banks in 30 countries in the
past two years which has stolen up to $1bn
from banks and financial institutions
around the world in what could be one of
the biggest banking breaches ever
recorded.
www.company.com
Thank You! 

More Related Content

What's hot

E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
BPalmer13
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 
CSI2008 Gunter Ollmann Man-in-the-browser
CSI2008 Gunter Ollmann Man-in-the-browserCSI2008 Gunter Ollmann Man-in-the-browser
CSI2008 Gunter Ollmann Man-in-the-browser
guestb1956e
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactions
DaveEdwards12
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
Network Intelligence India
 
Security@ecommerce
Security@ecommerceSecurity@ecommerce
Security@ecommerce
Om Vikram Thapa
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
VASCO Data Security
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Simpletel
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
Vipin Subhash
 
E banking & security
E banking & securityE banking & security
E banking & security
Sumeer Sharma
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
Andris Soroka
 
E-Banking Web Security
E-Banking Web SecurityE-Banking Web Security
E-Banking Web Security
Dragos Lungu
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
Sudeshna07
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
Goutama Bachtiar
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
Gc university faisalabad
 
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 B 2018)
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 B 2018)E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 B 2018)
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 B 2018)
Shandy Aditya
 
E banking security
E banking securityE banking security
E banking security
Iman Rahmanian
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
IBM Security
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
Ajilal
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
VidaB
 

What's hot (20)

E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
CSI2008 Gunter Ollmann Man-in-the-browser
CSI2008 Gunter Ollmann Man-in-the-browserCSI2008 Gunter Ollmann Man-in-the-browser
CSI2008 Gunter Ollmann Man-in-the-browser
 
Man in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactionsMan in the Browser attacks on online banking transactions
Man in the Browser attacks on online banking transactions
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Security@ecommerce
Security@ecommerceSecurity@ecommerce
Security@ecommerce
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Internet threats and its effect on E-commerce
Internet threats and its effect on E-commerceInternet threats and its effect on E-commerce
Internet threats and its effect on E-commerce
 
E banking & security
E banking & securityE banking & security
E banking & security
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
 
E-Banking Web Security
E-Banking Web SecurityE-Banking Web Security
E-Banking Web Security
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 B 2018)
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 B 2018)E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 B 2018)
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 B 2018)
 
E banking security
E banking securityE banking security
E banking security
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 

Similar to Cybercrime

Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
Panama-Paper-Leak
Panama-Paper-LeakPanama-Paper-Leak
Cyber cash
Cyber cashCyber cash
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techLecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Serious_SamSoul
 
Ib final project
Ib final projectIb final project
Ib final project
Manasi Deliwala
 
Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
chethu6391
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
Mitesh Katira
 
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
PROIDEA
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
Daniel Versola
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 students
Sartha Gupta
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
Aman Singh (असर)
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
Wen-Pai Lu
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
Himanshu Pathak
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
Pragati Rai
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
Surajsingh809614
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
snehateddy
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
snehateddy
 

Similar to Cybercrime (20)

Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
 
Panama-Paper-Leak
Panama-Paper-LeakPanama-Paper-Leak
Panama-Paper-Leak
 
Cyber cash
Cyber cashCyber cash
Cyber cash
 
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techLecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
 
Ib final project
Ib final projectIb final project
Ib final project
 
Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 students
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
security threats.pptx
security threats.pptxsecurity threats.pptx
security threats.pptx
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 

Recently uploaded

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 

Recently uploaded (20)

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 

Cybercrime

  • 1. Cyber Security in Internet Banking Presented By Deepika Goyal
  • 2. www.company.com Internet Banking •Paper-free transactions •Account balances, transfers, bill payment, statements •Fast and convenient
  • 3. www.company.com Cyber Crime in Internet Banking • Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. •With the advent of technology banking sector saw a paradigm shift in the general phenomenon which enable their customers to access their bank finances 24*7 using ATM and online banking. •However with the enhancement of technology, banking frauds have also increased.
  • 4. www.company.com Incidents and financial impacts continue to grow The number of stolen Credit card information has Increased by 48% Credit card information Theft via Point of Sales infections have Increased by 700% The number of userID and password thefts has increased By 410% Cyber Threat intelligence Report First Quarter 2014
  • 5. www.company.com Target of Attacks Phishing Attacks Trojan Attacks Pharming DNS Spoofing Network Interception Web Application Attacks Attacking Server
  • 6. www.company.com Client Attacks Most promising attack on the client: • Phishing •Motivate user to enter confidential information on fake web site • Simple Trojans • Limited to a handful of eBanking applications • Steal username, password and one time password • Steals session information and URL and sends it to attacker • Attacker imports information into his browser to access the same account
  • 7. www.company.com Generic Trojans •Infection of client with user interaction • Email attachments (ZIP, Exe, etc.) • Email with link to malicious web site • Links in social networks • Integrated in popular software (downloads) • File transfer of instant messaging/VoIP/file sharing • CD-ROM/USB Stick
  • 8. www.company.com Features • In the wild since 2007, but still in development • Can attack any eBanking (and any web application) • New configuration is downloaded continously Infection of client without user interaction • Malicious web sites • Infection of trusted, popular web sites (IFRAME …) • Misusing software update functionality (like Bundestrojaner) • Attacks on vulnerable, exposed computer (network/wireless)
  • 9. www.company.com Pharming •Pharming is a cyber attack intended to redirect a website's traffic to another, fake site. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software.
  • 10. www.company.com Actors of Banking Fraud The actors of banking fraud can be categorised into four main categories. •Malacious Exploiters •Money Mules •Victims •Security Guardians
  • 11. www.company.com Malacious Exploiters It can be categorised into five sub categories: • Innovators • Amateur • Insiders • Copy Cats • Criminals Individuals recruitted wittingly and often unwittingly by criminals, to facilitate illegal funds transfers from bank accounts Money Mules
  • 12. www.company.com Victims • Banks • User of these banks It can be categorised into two sub categories: Security Guardians They are the most important actor of this system as they improve the existing banking system and help in removing the vulnerabilites and development of systems so that these frauds can be mitigated.
  • 13. www.company.com Security Measures • Attack Detection • Second Channel / Secured Channel • Secure Client Secure Client Second Channel Secured Channel Attack Detection
  • 14. www.company.com Attack Detection • Detect session hijacking attacks • Monitor and compare request parameters • Identify SSL Session and IP address changes • Transaction verification / user profiling • Statistic about normal user behaviour • Compare transaction with normal user behaviour • White list target accounts • Limits on transaction amount
  • 15. www.company.com •Second Channel • Send verification using another channel • Another application on the client computer • Another medium like mobile phones (SMS) •Secured Channel • Enter data on an external device • External device can not be controlled by Trojan • Externel device contains a secret key Security Measures
  • 16. www.company.com •Secure Platform • A computer that is only used for eBanking • Bootable CD-ROM, Bootable USB Stick • Virtual Machine • eBanking Laptop •Secure Environment • Start an application (eg Browser) that protects itself from Trojans. • Proprietary Application (fat client) • Verify environment before login is possible Security Measures
  • 17. www.company.com Security trends Current client security approaches: •A) Secured Application/Virtualization • Hardened Browser on USB stick • Application to secure the client • Virtual operating system on host system • Bootable CD-ROM/USB stick •B) Transaction Signing • Transaction details and unlock code on mobile (SMS) • External device with SmartCard • Read information from screen and decrypt on external device
  • 19. www.company.com B) Transaction Signing • Devices (some examples): • Mobile phones • IBM ZTIC, EVM CAP, Axsionics • Tricipher
  • 21. www.company.com Secure Communication • In our fictious example we have a user Alice who wishes to login to her bank. We also have a vicious attacker Eve who is trying to steal Alice's hard-earned money. The bank is using a username and password to protect • Alice's account has no encryption. This scheme is obviously vulnerable to a snooping attack as illustrated in below Figure. One way to improve security is by employing One-time Passwords.
  • 22. www.company.com • One-time passwords (OTPs) are, like the name suggests, passwords that are used only once. One-time passwords • The OTPs can be implemented using a hash-chain algorithm.
  • 23. www.company.com Secure Socket Layer • Secure Socket Layer abbreviated as SSL is a protocol designed to provide security and data integrity. • SSL supports a wide range of algorithms, some very strong and some weak. For example Handelsbanken, a Swedish bank, uses SHA-1 for signing and RSA for encryption.
  • 24. www.company.com Security Token • We saw how OTPs are constructed and used. • We can further enhance the security by a PIN-code. • This two-factor authentication makes it more dificult to gain access to an account.
  • 26. www.company.com Chip Authentication Program (CAP) • CAP is a relatively new protocol based on the older EMV standard. • It was developed by MasterCard and is based on digitally signing transactions. • CAP can operate in three modes: identify, respond and sign.
  • 27. www.company.com CAP Modes • Identify : Without requiring any further input, the CAP reader interacts with the smartcard to produce a decimal one-time password, which can be used, for example, to log in to a banking website. • Response : This mode implements challenge-response authentication, where the bank's website asks the customer to enter a "challenge" number into the CAP reader, and then copy the "response" number displayed by the CAP reader into the web site. • Sign : This mode is an extension of the previous, where not only a random "challenge" value, but also crucial transaction details such as the transferred value, the currency, and recipient's account number have to be typed into the CAP reader
  • 29. www.company.com Recent… Kaspersky Lab, a Russian security company, said that hackers had infiltrated more than 100 banks in 30 countries in the past two years which has stolen up to $1bn from banks and financial institutions around the world in what could be one of the biggest banking breaches ever recorded.