Security In Internet Banking 
Chiheb chebbi 
Chiheb-chebbi@outlook,11 
fr
Cyber risks: A severe and present danger everything is under attack 
‘’The annual cost of 
cybercrime to the global 
economy ranges from 
$375 billion to as much 
as $575 billion’’ 
22
The number of stolen 
Credit card information has 
Increased by 48% 
Cyber Threat intelligence Report 
First Quarter 2014 
Credit card information 
Theft via Point of Sales 
infections have 
Increased by 700% 
The number of userID 
and password thefts 
has increased 
By 410% 
Incidents and financial impacts continue to grow 
33
Who is a Hacker ? 
Intelligent individuals 
with excellent 
computer skills with 
the ability to create 
and explore 
computer’s software 
and Hardware 
For some 
hackers,hacking is a 
hobby to see how 
many computers they 
can compromise 
Their intention can 
either be to gain 
knowledge or to poke 
around to do illegal 
things 44
Hacker Classes : 
BBllaacckk HHaattss GGrreeyy HHaattss WWhhiittee HHaattss 
Individuals with 
extraordinary 
computing skills, 
Restoring to malicious 
or destructive 
activities and also 
known as Crackers 
Individuals professing 
hacker skills and using 
them for defensive 
purposes and are also 
known as Security 
Analysts 
Individuals who work 
both offensively and 
defensively at various 
times 
55
Hacking Phases 
RReeccoonnnnaaiissssaannccee SSccaannnniinngg Gaining 
Access 
Maintainin 
g Access 
Clearing 
Tracks 
66
Attacker Password Cracking: 
Vulnerable System 
Password Cracking techniques are used to 
recover passwords from computer systems 
Attackers use password cracking techniques to 
gain unauthorized access to the vulnerable 
system 
77
Password Cracking Techniques: 
Dictionary 
Attacks 
Brute Forcing 
Attacks 
HHyybbrriidd AAttttaacckkss 
A dictionary file is 
loaded into the 
cracking application 
that runs against user 
accounts 
The program tries 
every combination of 
caracters until the 
password is broken 
Like a dictionary 
attack but adds some 
numbers and symbols 
to the words 
88
Syllable 
Attacks 
Rule-Based 
Attacks 
Password Cracking Techniques: 
It is the combination 
of both brute force 
attack and the 
dictionary attack 
This attack is used 
when the attacker 
gets some information 
about the password 
99
Malwares: 
Is a program that record user ’s 
interaction with the computer and 
internet without the user ’s knowledge. 
Spyware: 
Trojan: It is a program in wich the malicious 
code is contained inside apparently 
harmless programming or data 
1100
Malwares: 
Is a self-replicating program that 
produces its own code by attaching 
copies of itself into other executable 
code 
Virus: 
Keylogger is a hardware or software 
device which monitors every keystroke, 
screen shots, chats etc typed on the 
computer. 
Keylogger: 
1111
1122
Total notifications 
of attempted 
infections by 
banking malware: 
1,387,080 
1133
Social Engineering: 
Social Engineering is the art of convincing people 
to reveal confidential information 
1144
Computer-based Social Engineering: 
Phishing 
‘ ’ Phishing is the attempt to acquire sensitive 
information such as usernames, passwords, 
and credit card details (and sometimes, 
indirectly, money) by masquerading as a trustworthy 
entity in an electronic communication ’ ’ 
1155
Computer-based Social Engineering: 
1166
The overall 
number of 
anti-phishing 
notifications: 
19,659,628 
1177
What is a Denial of service attack? 
In a Denial of service attack (DoS) attackers flood a victim system with 
Non-legitimate service requests or traffic to overload its resources 
Attack Traffic 
Normal Traffic 
1188
What are Destributed Denial of service attacks? 
A DDoS attack involves a multitude of compromised systems 
attacking a singel target 
To launch a Ddos attack,an attacker uses 
Botnets and attacks a single system 
1199
DDoS Attack Tool: LOIC 
2200
What are Botnets ? 
Botnets are software applications that run aytomated tasks 
Over the internet and perform simple repetitive tasks 
A Botnet is a huge network of compromised systems 2211
2222
What is SQL injection? 
SQL injection is a technique used to take advantage of non-validated 
Input vulnerabilities to pass SQL commands through a web App 
For execution by a backend database 
2233
2244
How to Defend against ccyybbeerr AAttttaacckkss?? 
2255
Intrusion Detection Systems (IDS) 
An intusion detection system gathers and analyszes 
information from within 
A computer or a network to identify the possible 
violation of security policy 
including Unauthorized access as well as misuse 
2266
2277
Firewalls 
Firewall is a hardware or software or combined of both designed 
To prevent unauthorized access to or from private network 
It is a placed at the gateway between the two networks which is usually 
a private Network and a public network such as the internet 
2288
Honeypot 
Honeypot is an information system resource that is expressly 
Set up to attract and trap people who attemp to penetrate 
An organization network 
A honeypot can be used to log access attempts o those ports 
Including the attacker’s keystrokes,This could send early warnings 
Of a more concerned attack 
2299
Cryptography 
Cryptography is the conversion of Data into a scrambled code that 
Is decrypted and sent across a private or public network 
3300
Types of Cryptography: 
Symmetric 
Encryption 
Asymmetric 
Encryption 
HHaasshh FFuunnccttiioonn 
Uses the same 
key for 
encryption as 
they do for 
decryption 
Uses different 
encryption keys for 
encryption and 
decryption(public 
and private key) 
Uses no key for 
encryption and 
decryption 
3311
Public Key infrastructure(PKI) 
PKI is a set of harware,software,people,policies,and procedures required 
To Create, Manage , distribute, use,and store digital certificates 
3322
3333
3344
Thank you for your attention !!! 
And 
Don’t Try this at Home !!! 
3355
3366

Security In Internet Banking

  • 1.
    Security In InternetBanking Chiheb chebbi Chiheb-chebbi@outlook,11 fr
  • 2.
    Cyber risks: Asevere and present danger everything is under attack ‘’The annual cost of cybercrime to the global economy ranges from $375 billion to as much as $575 billion’’ 22
  • 3.
    The number ofstolen Credit card information has Increased by 48% Cyber Threat intelligence Report First Quarter 2014 Credit card information Theft via Point of Sales infections have Increased by 700% The number of userID and password thefts has increased By 410% Incidents and financial impacts continue to grow 33
  • 4.
    Who is aHacker ? Intelligent individuals with excellent computer skills with the ability to create and explore computer’s software and Hardware For some hackers,hacking is a hobby to see how many computers they can compromise Their intention can either be to gain knowledge or to poke around to do illegal things 44
  • 5.
    Hacker Classes : BBllaacckk HHaattss GGrreeyy HHaattss WWhhiittee HHaattss Individuals with extraordinary computing skills, Restoring to malicious or destructive activities and also known as Crackers Individuals professing hacker skills and using them for defensive purposes and are also known as Security Analysts Individuals who work both offensively and defensively at various times 55
  • 6.
    Hacking Phases RReeccoonnnnaaiissssaanncceeSSccaannnniinngg Gaining Access Maintainin g Access Clearing Tracks 66
  • 7.
    Attacker Password Cracking: Vulnerable System Password Cracking techniques are used to recover passwords from computer systems Attackers use password cracking techniques to gain unauthorized access to the vulnerable system 77
  • 8.
    Password Cracking Techniques: Dictionary Attacks Brute Forcing Attacks HHyybbrriidd AAttttaacckkss A dictionary file is loaded into the cracking application that runs against user accounts The program tries every combination of caracters until the password is broken Like a dictionary attack but adds some numbers and symbols to the words 88
  • 9.
    Syllable Attacks Rule-Based Attacks Password Cracking Techniques: It is the combination of both brute force attack and the dictionary attack This attack is used when the attacker gets some information about the password 99
  • 10.
    Malwares: Is aprogram that record user ’s interaction with the computer and internet without the user ’s knowledge. Spyware: Trojan: It is a program in wich the malicious code is contained inside apparently harmless programming or data 1100
  • 11.
    Malwares: Is aself-replicating program that produces its own code by attaching copies of itself into other executable code Virus: Keylogger is a hardware or software device which monitors every keystroke, screen shots, chats etc typed on the computer. Keylogger: 1111
  • 12.
  • 13.
    Total notifications ofattempted infections by banking malware: 1,387,080 1133
  • 14.
    Social Engineering: SocialEngineering is the art of convincing people to reveal confidential information 1144
  • 15.
    Computer-based Social Engineering: Phishing ‘ ’ Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication ’ ’ 1155
  • 16.
  • 17.
    The overall numberof anti-phishing notifications: 19,659,628 1177
  • 18.
    What is aDenial of service attack? In a Denial of service attack (DoS) attackers flood a victim system with Non-legitimate service requests or traffic to overload its resources Attack Traffic Normal Traffic 1188
  • 19.
    What are DestributedDenial of service attacks? A DDoS attack involves a multitude of compromised systems attacking a singel target To launch a Ddos attack,an attacker uses Botnets and attacks a single system 1199
  • 20.
  • 21.
    What are Botnets? Botnets are software applications that run aytomated tasks Over the internet and perform simple repetitive tasks A Botnet is a huge network of compromised systems 2211
  • 22.
  • 23.
    What is SQLinjection? SQL injection is a technique used to take advantage of non-validated Input vulnerabilities to pass SQL commands through a web App For execution by a backend database 2233
  • 24.
  • 25.
    How to Defendagainst ccyybbeerr AAttttaacckkss?? 2255
  • 26.
    Intrusion Detection Systems(IDS) An intusion detection system gathers and analyszes information from within A computer or a network to identify the possible violation of security policy including Unauthorized access as well as misuse 2266
  • 27.
  • 28.
    Firewalls Firewall isa hardware or software or combined of both designed To prevent unauthorized access to or from private network It is a placed at the gateway between the two networks which is usually a private Network and a public network such as the internet 2288
  • 29.
    Honeypot Honeypot isan information system resource that is expressly Set up to attract and trap people who attemp to penetrate An organization network A honeypot can be used to log access attempts o those ports Including the attacker’s keystrokes,This could send early warnings Of a more concerned attack 2299
  • 30.
    Cryptography Cryptography isthe conversion of Data into a scrambled code that Is decrypted and sent across a private or public network 3300
  • 31.
    Types of Cryptography: Symmetric Encryption Asymmetric Encryption HHaasshh FFuunnccttiioonn Uses the same key for encryption as they do for decryption Uses different encryption keys for encryption and decryption(public and private key) Uses no key for encryption and decryption 3311
  • 32.
    Public Key infrastructure(PKI) PKI is a set of harware,software,people,policies,and procedures required To Create, Manage , distribute, use,and store digital certificates 3322
  • 33.
  • 34.
  • 35.
    Thank you foryour attention !!! And Don’t Try this at Home !!! 3355
  • 36.