SlideShare a Scribd company logo
E-Banking & Security Concern
Syed Akhtar-uz-zaman (IFIC-010)
• What is E-Banking ??
• Evaluation of E-Banking
• Threats and preventive measures of
 ATM
 Mobile Banking
 Online Banking
Presentation Outline
• on-line, real time banking
E-Banking
• the automated delivery of banking products and
services directly to customers through electronic,
interactive communication channels.
• Traditional banking business assumes:
– Customer desk at bank’s building
– Office hours from 10.00 am to 6.00 pm
Traditional banking
• Solving time constraint
Evaluation of E-Banking
• Solving place constraint
• Virtual banking(everything is
possible)
• “brick and mortar” institution
(has a building and personal service representatives)
• “brick and click” institution
(physical structure + Internet bank services)
• “virtual bank”
(no public building – exists only online)
Banking Option
Internet Approach:
Users directly log on to their bank website and
complete all their work online.
Approaches E-banking
Dial-in Approach:
Requires users to have a separate finance
software, so that they can do all the process offline
and connect to the bank just for transactions.
E- Banking devices
 Automated teller machines (ATMs)
 Cellular and smart phones
 Personal computers (PCs)
Automated teller machines (ATMs)
A machine that automatically provides cash and
performs other banking services on insertion of a
special card by the account holder.
Functions of ATM
24-hour access to cash
View Account Balances & Mini-statements
Order a Cheque Book / Account Statement
Transfer Funds between accounts
Refill your Prepaid card
Pay your utility bills
Deposit cash or cheques
Structure of ATM
Card reader
Keypad
Speaker
Display screen
Receipt printer
Cash dispenser
ATM Threaths
Attacks against ATMs may be classified as:
ATM physical attacks
ATM fraud
Functions of ATM
Safety Tips To Follow
While Using an ATM
Safety against physical attacks
Debit card security
Check your surroundings
Limit your transaction time
PIN number security
Stay alert
Notify loss of card
ATM Skimming
The act of using a skimmer to illegally collect data from the
magnetic stripe of a credit, debit or ATM card. This information is
copied onto another blank card's magnetic stripe
The skimmer is an electronic device that scans a credit/debit card
and stores the information contained in the magnetic stripe
PIN capturing
PIN capturing refers to a method of strategically attaching
cameras and various other imaging devices to ATMs in
order to fraudulently capture the ATM user’s PIN
ATM skimming process
Mitigating risk
Mitigating risk-S1
Shield Your PIN
Use your other hand to shield your fingers while you type in your PIN. Experts say taking this one
simple step could practically eliminate ATM skimming. This is because if the hidden camera can’t
capture your PIN, the mag stripe data captured by the skimmer is useless to the thief.
Mitigating risk-S2
Examine an ATM carefully before inserting your card. While skimmers may be hard for the untrained
eye to spot, they actually become pretty obvious if you’re on the lookout for them. They usually
consist of an extra piece of plastic that sits atop the slot where you insert your ATM card. They’re
usually attached to the ATM using two-sided tape, so if it looks suspicious, jiggle it a little — if it’s
loose, it might be a skimmer.
Check the ATM
Mitigating risk-S3
Avoid Low Traffic Areas
Don’t use ATMs in secluded, low-traffic areas. It takes a few minutes for thieves to install skimmers, so
they usually choose ATMs in more secluded areas with less foot traffic so they’re less likely to be seen.
If possible, try to only use ATMs in high-traffic areas like grocery stores, the mall or outside the bank
itself.
EMV Chip Card Technology
"EMV® is a global standard for credit and debit payment cards based on
chip card technology”. The standard covers the processing of credit and
debit card payments using a card that contains a microprocessor chip.
Mobile Banking
Mobile banking or m-banking is a term used for
performing banking activities on mobile phones and
tablets.
The earliest mobile banking services were offered
over SMS.
The future of banking
ADVANTAGES OF M-BANKING
Benefits for Banks
Large customer coverage
Reducing the costs of operations
Promoting their services and products internationally
Benefits for Small to Medium Businesses
To run its operations more effectively
Lower cost than traditional financial management mechanisms
Benefits for Customers
Convenience
Cost
Speed
Competitiveness
Communication
Environmental
ACCESS METHODS
Text messaging
Mobile app
Vulnerability of mobile apps
Prime targets for attackers
Data
Identity
Availability
Types Of Mobile Frauds
Cyber Attacks and Malware
Top mobile attack methods are:
Social engineering threats
Malvertising
Repacked, malicious apps on third party app stores
The most common threats
7 mobile banking security tips
Online banking
Online banking is the performance of banking activities via the
Internet. Online banking is also known as "Internet banking" or
"Web banking." A good online bank will offer customers just
about every service traditionally available through a local branch
May 1995: Wells Fargo – the first bank in the world offer
customer access to their accounts over the internet.
The Benefits of Virtual Banking
Online banking has plenty of perks. These include:
Convenience
Services
Ease of monitoring
Transfer services
Available account balance & information at the touch of a
button
Advantage of virtual banking
Electronic funds transfer
Bill payments and wire transfers
Loan application and repayments
Deposit cash or cheques
downloading bank statements
viewing images of paid checques
Online Banking FRAUD
Phishing
Pharming
Social Engineering
Malware
Phishing
Electronic means of acquiring customers’ sensitive
information by disguising as a very trustworthy entity.
Phishing
Fake e-mail or fake websites sent to customers, as if it’s
from their banks that lead customer to a fake website.
Pharming
Pharming is a type of fraud that involves diverting the client Internet
connection to a counterfeit website, so that even when the user enters
the correct address into his browser, it ends up on the forged site
Social Engineering
Social Engineering is a
non-technical method
of intrusion hackers
use that relies heavily
on human interaction
and often involves
tricking people into
breaking normal
security procedures.
Malware
A Malware is a set of instructions that run on your
computer and make your system do something that an
attacker wants it to do
The Malware family
Computer Viruses
Trojan Horses
Internet Worms
Scareware
Adware
Ransomware
Keyloggers
How malware works
Banking fraud prevention tips
Malware Protection
Multi-factor Authentication
Personal Firewalls
Spike Activity Identification
KeCrypt tool
Malware Protection
Implement powerful an antivirus and an antimalware
software with on-access / real-time scanner checking
legitimacy of files.
Anti-malware programs
They provide real-time protection against
the installation of malware software
Scans all incoming network data for
malware and blocks any threat it comes
across - can be used solely for
detection and removal of installed
malware software.
Multi-factor Authentication
Supports another level of authorization in addition to the
initial login requirement, usually involving real-time
generation of a code.
Personal Firewalls
This program monitors all outgoing and incoming information between your device
and the internet and only familiar authorized connections are allowed.
A personal firewall will usually protect only the computer on which it is installed.
Spike Activity Identification
Trend analysis helps in this process, when an un-usual activity
occurs in an account, either a high amount or different location
or frequency
Accounts associated with a lot of high-risk behavior should be
on top list of banks investigation.
Encryption
Involves encoding
messages or information
in such a way that only
authorized parties can
read it when decoded.
The common encryption
standard adopted by
most browsers is called
Secure Socket Layer (SSL)
Is E-Banking Really Necessary?
H2: Savings interest rate, online banking, closing hour, waiting time, security
and confidentiality are the major parameters for selecting their bank.
E banking & security concern

More Related Content

What's hot

Core banking
Core bankingCore banking
E wallet
E walletE wallet
E wallet
Ayushi Shah
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
Dharmik
 
E banking
E bankingE banking
E banking
JPEAGLES
 
Mobile banking project
Mobile banking projectMobile banking project
Mobile banking project
Arfan Afzal
 
e payment system ppt
e payment system ppte payment system ppt
e payment system ppt
minisharma35
 
Payment systems
Payment systemsPayment systems
Payment systems
mohitkumar1232001
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
snehateddy
 
Alternative channels of banking
Alternative channels of bankingAlternative channels of banking
Alternative channels of banking
Ravi Arora
 
Payment gateway
Payment gatewayPayment gateway
Payment gateway
HananBahy
 
Mobile banking project
Mobile banking projectMobile banking project
Mobile banking project
Arfan Afzal
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce Application
Mahesh Shetty
 
E Banking
E BankingE Banking
E Banking
cssangoram
 
Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION   Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION
jaldumanohar manohar
 
Core banking solutions
Core banking solutionsCore banking solutions
Core banking solutions
Romano Machoka
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)
rahul kundu
 
What is Core Banking System | Sesameindia
What is Core Banking System | SesameindiaWhat is Core Banking System | Sesameindia
What is Core Banking System | Sesameindia
Sesameindia Pvt Ltd
 
Digital Lending
Digital LendingDigital Lending
Digital Lending
Aguai Solutions Pvt Ltd
 
Banking products
Banking productsBanking products
Banking products
Parag Tikekar
 
Core banking solution
Core banking solutionCore banking solution
Core banking solution
RishiSundar2
 

What's hot (20)

Core banking
Core bankingCore banking
Core banking
 
E wallet
E walletE wallet
E wallet
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
 
E banking
E bankingE banking
E banking
 
Mobile banking project
Mobile banking projectMobile banking project
Mobile banking project
 
e payment system ppt
e payment system ppte payment system ppt
e payment system ppt
 
Payment systems
Payment systemsPayment systems
Payment systems
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Alternative channels of banking
Alternative channels of bankingAlternative channels of banking
Alternative channels of banking
 
Payment gateway
Payment gatewayPayment gateway
Payment gateway
 
Mobile banking project
Mobile banking projectMobile banking project
Mobile banking project
 
Consumer Oriented E commerce Application
Consumer Oriented E commerce ApplicationConsumer Oriented E commerce Application
Consumer Oriented E commerce Application
 
E Banking
E BankingE Banking
E Banking
 
Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION   Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION
 
Core banking solutions
Core banking solutionsCore banking solutions
Core banking solutions
 
Electronic payment system(EPS)
Electronic payment system(EPS)Electronic payment system(EPS)
Electronic payment system(EPS)
 
What is Core Banking System | Sesameindia
What is Core Banking System | SesameindiaWhat is Core Banking System | Sesameindia
What is Core Banking System | Sesameindia
 
Digital Lending
Digital LendingDigital Lending
Digital Lending
 
Banking products
Banking productsBanking products
Banking products
 
Core banking solution
Core banking solutionCore banking solution
Core banking solution
 

Similar to E banking & security concern

Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
chethu6391
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
sathyananda prabhu
 
E banking
E bankingE banking
E banking
Abhishek Tanna
 
Mobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceMobile banking issues in banking and insurance
Mobile banking issues in banking and insurance
Kumarrebal
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
Hai Nguyen
 
E banking-10092118-phpapp02
E banking-10092118-phpapp02E banking-10092118-phpapp02
E banking-10092118-phpapp02
saritabajaj54
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
Mani Rai
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Fusion Informatics
 
E banking-130826111407-phpapp01
E banking-130826111407-phpapp01E banking-130826111407-phpapp01
E banking-130826111407-phpapp01
haris ali
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
Saikiran Panjala
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
VISTA InfoSec
 
e-banking
e-bankinge-banking
e-banking
Anmol Marya
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
SafeDeposit
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
Nana Kwame(Emeritus) Gyamfi
 
E-Banking (1).pptx
E-Banking (1).pptxE-Banking (1).pptx
E-Banking (1).pptx
Abhay306393
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
IRJET Journal
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
IRJET Journal
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
ITIO Innovex
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
John Williams
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
Happiest Minds Technologies
 

Similar to E banking & security concern (20)

Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
 
E banking
E bankingE banking
E banking
 
Mobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceMobile banking issues in banking and insurance
Mobile banking issues in banking and insurance
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
E banking-10092118-phpapp02
E banking-10092118-phpapp02E banking-10092118-phpapp02
E banking-10092118-phpapp02
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
E banking-130826111407-phpapp01
E banking-130826111407-phpapp01E banking-130826111407-phpapp01
E banking-130826111407-phpapp01
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
e-banking
e-bankinge-banking
e-banking
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
E-Banking (1).pptx
E-Banking (1).pptxE-Banking (1).pptx
E-Banking (1).pptx
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 

Recently uploaded

Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 

Recently uploaded (20)

Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 

E banking & security concern

  • 1. E-Banking & Security Concern Syed Akhtar-uz-zaman (IFIC-010)
  • 2. • What is E-Banking ?? • Evaluation of E-Banking • Threats and preventive measures of  ATM  Mobile Banking  Online Banking Presentation Outline
  • 3. • on-line, real time banking E-Banking • the automated delivery of banking products and services directly to customers through electronic, interactive communication channels.
  • 4. • Traditional banking business assumes: – Customer desk at bank’s building – Office hours from 10.00 am to 6.00 pm Traditional banking
  • 5. • Solving time constraint Evaluation of E-Banking • Solving place constraint • Virtual banking(everything is possible)
  • 6. • “brick and mortar” institution (has a building and personal service representatives) • “brick and click” institution (physical structure + Internet bank services) • “virtual bank” (no public building – exists only online) Banking Option
  • 7. Internet Approach: Users directly log on to their bank website and complete all their work online. Approaches E-banking Dial-in Approach: Requires users to have a separate finance software, so that they can do all the process offline and connect to the bank just for transactions.
  • 8. E- Banking devices  Automated teller machines (ATMs)  Cellular and smart phones  Personal computers (PCs)
  • 9. Automated teller machines (ATMs) A machine that automatically provides cash and performs other banking services on insertion of a special card by the account holder.
  • 10. Functions of ATM 24-hour access to cash View Account Balances & Mini-statements Order a Cheque Book / Account Statement Transfer Funds between accounts Refill your Prepaid card Pay your utility bills Deposit cash or cheques
  • 11. Structure of ATM Card reader Keypad Speaker Display screen Receipt printer Cash dispenser
  • 12. ATM Threaths Attacks against ATMs may be classified as: ATM physical attacks ATM fraud
  • 13. Functions of ATM Safety Tips To Follow While Using an ATM
  • 14. Safety against physical attacks Debit card security Check your surroundings Limit your transaction time PIN number security Stay alert Notify loss of card
  • 15. ATM Skimming The act of using a skimmer to illegally collect data from the magnetic stripe of a credit, debit or ATM card. This information is copied onto another blank card's magnetic stripe The skimmer is an electronic device that scans a credit/debit card and stores the information contained in the magnetic stripe
  • 16. PIN capturing PIN capturing refers to a method of strategically attaching cameras and various other imaging devices to ATMs in order to fraudulently capture the ATM user’s PIN
  • 19. Mitigating risk-S1 Shield Your PIN Use your other hand to shield your fingers while you type in your PIN. Experts say taking this one simple step could practically eliminate ATM skimming. This is because if the hidden camera can’t capture your PIN, the mag stripe data captured by the skimmer is useless to the thief.
  • 20. Mitigating risk-S2 Examine an ATM carefully before inserting your card. While skimmers may be hard for the untrained eye to spot, they actually become pretty obvious if you’re on the lookout for them. They usually consist of an extra piece of plastic that sits atop the slot where you insert your ATM card. They’re usually attached to the ATM using two-sided tape, so if it looks suspicious, jiggle it a little — if it’s loose, it might be a skimmer. Check the ATM
  • 21. Mitigating risk-S3 Avoid Low Traffic Areas Don’t use ATMs in secluded, low-traffic areas. It takes a few minutes for thieves to install skimmers, so they usually choose ATMs in more secluded areas with less foot traffic so they’re less likely to be seen. If possible, try to only use ATMs in high-traffic areas like grocery stores, the mall or outside the bank itself.
  • 22. EMV Chip Card Technology "EMV® is a global standard for credit and debit payment cards based on chip card technology”. The standard covers the processing of credit and debit card payments using a card that contains a microprocessor chip.
  • 23. Mobile Banking Mobile banking or m-banking is a term used for performing banking activities on mobile phones and tablets. The earliest mobile banking services were offered over SMS.
  • 24. The future of banking
  • 25. ADVANTAGES OF M-BANKING Benefits for Banks Large customer coverage Reducing the costs of operations Promoting their services and products internationally Benefits for Small to Medium Businesses To run its operations more effectively Lower cost than traditional financial management mechanisms Benefits for Customers Convenience Cost Speed Competitiveness Communication Environmental
  • 27.
  • 29. Prime targets for attackers Data Identity Availability
  • 30. Types Of Mobile Frauds
  • 31. Cyber Attacks and Malware Top mobile attack methods are: Social engineering threats Malvertising Repacked, malicious apps on third party app stores
  • 32. The most common threats
  • 33. 7 mobile banking security tips
  • 34. Online banking Online banking is the performance of banking activities via the Internet. Online banking is also known as "Internet banking" or "Web banking." A good online bank will offer customers just about every service traditionally available through a local branch May 1995: Wells Fargo – the first bank in the world offer customer access to their accounts over the internet.
  • 35. The Benefits of Virtual Banking Online banking has plenty of perks. These include: Convenience Services Ease of monitoring Transfer services Available account balance & information at the touch of a button
  • 36. Advantage of virtual banking Electronic funds transfer Bill payments and wire transfers Loan application and repayments Deposit cash or cheques downloading bank statements viewing images of paid checques
  • 38. Phishing Electronic means of acquiring customers’ sensitive information by disguising as a very trustworthy entity.
  • 39. Phishing Fake e-mail or fake websites sent to customers, as if it’s from their banks that lead customer to a fake website.
  • 40. Pharming Pharming is a type of fraud that involves diverting the client Internet connection to a counterfeit website, so that even when the user enters the correct address into his browser, it ends up on the forged site
  • 41. Social Engineering Social Engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
  • 42. Malware A Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do The Malware family Computer Viruses Trojan Horses Internet Worms Scareware Adware Ransomware Keyloggers
  • 44. Banking fraud prevention tips Malware Protection Multi-factor Authentication Personal Firewalls Spike Activity Identification KeCrypt tool
  • 45. Malware Protection Implement powerful an antivirus and an antimalware software with on-access / real-time scanner checking legitimacy of files.
  • 46. Anti-malware programs They provide real-time protection against the installation of malware software Scans all incoming network data for malware and blocks any threat it comes across - can be used solely for detection and removal of installed malware software.
  • 47. Multi-factor Authentication Supports another level of authorization in addition to the initial login requirement, usually involving real-time generation of a code.
  • 48. Personal Firewalls This program monitors all outgoing and incoming information between your device and the internet and only familiar authorized connections are allowed. A personal firewall will usually protect only the computer on which it is installed.
  • 49. Spike Activity Identification Trend analysis helps in this process, when an un-usual activity occurs in an account, either a high amount or different location or frequency Accounts associated with a lot of high-risk behavior should be on top list of banks investigation.
  • 50. Encryption Involves encoding messages or information in such a way that only authorized parties can read it when decoded. The common encryption standard adopted by most browsers is called Secure Socket Layer (SSL)
  • 51. Is E-Banking Really Necessary? H2: Savings interest rate, online banking, closing hour, waiting time, security and confidentiality are the major parameters for selecting their bank.