SlideShare uma empresa Scribd logo
1 de 14
SECURE INTERNETSECURE INTERNET
BANKINGBANKING
AUTHENTICATIONAUTHENTICATION
AARTHI KANNAPPAN
DHIVYAA.R
MAHA LAKSHMI.S
2
Network SecurityNetwork Security
Introduction
Introduction
Attacks on
authentication
Online channel
Attack taxonomy
Attack taxonomy
Offline credential
objectives
Short time pwd
Conclusion
Abstract
Certificate based solution
3
PRESENTATIONPRESENTATION
OBJECTIVESOBJECTIVES
 Understand network security services
 Be aware of vulnerabilities and threats
 Realize why network security is necessary
 Highly attractive solution for valuable and
secure future.
4
The authors present two challenge response Internet
banking authentication solutions
 one based on short-time passwords
 and one on certificates
attacks on authentication
transaction-signing option
ABSTRACTABSTRACT
5
INTRODUCTIONINTRODUCTION
 The Internet is an integral part of our
daily lives, and the proportion of people
who expect to be able to manage their
bank accounts anywhere, anytime is
constantly growing
This article describes current
Authentication threats and two proposed
solutions as well as how these solutions
can be extended in the face of more
complex future attacks
6
ATTACKS ON AUTHENTICATION
 Internet banking systems must
authenticate users before granting
them access to particular services.
 successful authentication
eventually enables users to access
their private information. We can
classify all Internet banking
authentication methods according
to their resistance to two types of
common attacks
 offline credential-stealing
attacks
online channel-breaking
attacks
Offline credential-stealing attacks
 Security precautions can
help users protect
themselves from
malicious software.
 For example-- installing
and maintaining a
firewall and up-to date
antivirus software,
regularly applying
operating system and
browser patches
7
Online channel-breaking attack
 The intruder noticeably
intercepts messages between
the client PC and the
banking server by
masquerading as the server
to the client and vice versa
 Online channel-breaking
attacks don’t necessarily
compromise the user’s
credentials but the
session’s credentials and
therefore typically require
the user-initiated banking
session to work properly.
8
AN ATTACK TAXONOMY
Taxonomy of Internet banking authentication methods. Methods
are classified according to their resistance against offline
credential-stealing and online channel-breaking attacks.
9
SHORT-TIME PASSWORD
SOLUTION
 It uses symmetric cryptography in combination with a hardware
security module .
User authentication works as follows:
1. The user connects to the Internet banking
2. The user claims his or her identity by entering an account number
in the bank’s login form
3. The user opens his or her smart card by entering the corresponding
PIN in the reader before entering the given challenge.
4. The user manually copies the shown response to the bank’s login
form to be checked by the bank’s authentication server.
10
The Need for Web Security 11
CERTIFICATE-BASED SOLUTION
User authentication works as
follows.
 First, the user establishes an
SSL/TLS channel between
the user PC and
the bank’s Web server by
setting up an SSL/TLS
session without client
authentication.
Once the card is available,
its certificates become visible
in the Web browser.
12
13
Conclusion
Internet banking has turned into
an arms race between financial
institutions and public network
attackers.
Both solutions offer high
security against common attacks.
However, changing legislation
and the eventually spread of e-IDs
among customers makes this
solution a highly attractive and
valuable alternative for the future.
14
THANK YOUTHANK YOU
Network
security!!!!!!!!

Mais conteúdo relacionado

Destaque

Miranda's Clinical Poster_01_06_16
Miranda's Clinical Poster_01_06_16Miranda's Clinical Poster_01_06_16
Miranda's Clinical Poster_01_06_16miranda olding
 
Aggressiveness as driver in the spread and evolution of P. striiformis
Aggressiveness as driver in the spread and evolution of P. striiformisAggressiveness as driver in the spread and evolution of P. striiformis
Aggressiveness as driver in the spread and evolution of P. striiformisBorlaug Global Rust Initiative
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Webinar - How To Be An Author An Grow Your Business
Webinar - How To Be An Author An Grow Your BusinessWebinar - How To Be An Author An Grow Your Business
Webinar - How To Be An Author An Grow Your BusinessBhavna Dalal
 
Evolutionary development and anatomy of the lungs
Evolutionary development and anatomy of the lungsEvolutionary development and anatomy of the lungs
Evolutionary development and anatomy of the lungsmeducationdotnet
 
First steps in Social Media creativity
First steps in Social Media creativityFirst steps in Social Media creativity
First steps in Social Media creativityNir Cohen Paraira
 
IHEA - A Study of the Locavore Movement
IHEA - A Study of the Locavore MovementIHEA - A Study of the Locavore Movement
IHEA - A Study of the Locavore MovementKeith G. Tidball
 
1.2.4 Универсальные шкафы для IT-оборудования RAM telecom
1.2.4 Универсальные шкафы для IT-оборудования RAM telecom1.2.4 Универсальные шкафы для IT-оборудования RAM telecom
1.2.4 Универсальные шкафы для IT-оборудования RAM telecomIgor Golovin
 
1.3.24 Универсальные шкафы для it оборудования ram telecom
1.3.24 Универсальные шкафы для it оборудования ram telecom1.3.24 Универсальные шкафы для it оборудования ram telecom
1.3.24 Универсальные шкафы для it оборудования ram telecomIgor Golovin
 
Tuberculoma resident dc dan so
Tuberculoma resident dc dan soTuberculoma resident dc dan so
Tuberculoma resident dc dan soSandro Hasibuan
 
Fainting: Causes and Ways to Minimize Risk
Fainting: Causes and Ways to Minimize RiskFainting: Causes and Ways to Minimize Risk
Fainting: Causes and Ways to Minimize RiskSummit Health
 
Pediatric and adult ecmo talk
Pediatric and adult ecmo talkPediatric and adult ecmo talk
Pediatric and adult ecmo talkapollobgslibrary
 
Transposition of great_arteries
Transposition of great_arteriesTransposition of great_arteries
Transposition of great_arteriesdr amarja nagre
 
Kayla DeNapoli's Resume
Kayla DeNapoli's ResumeKayla DeNapoli's Resume
Kayla DeNapoli's ResumeKayla DeNapoli
 
Body CT for Emergency Physicians
Body CT for Emergency PhysiciansBody CT for Emergency Physicians
Body CT for Emergency PhysiciansRathachai Kaewlai
 
1.4.1 Интервью с продукт-менеджером компании ДКС Антоном Дьяконовым
1.4.1 Интервью с продукт-менеджером компании ДКС Антоном Дьяконовым1.4.1 Интервью с продукт-менеджером компании ДКС Антоном Дьяконовым
1.4.1 Интервью с продукт-менеджером компании ДКС Антоном ДьяконовымIgor Golovin
 

Destaque (17)

Miranda's Clinical Poster_01_06_16
Miranda's Clinical Poster_01_06_16Miranda's Clinical Poster_01_06_16
Miranda's Clinical Poster_01_06_16
 
Aggressiveness as driver in the spread and evolution of P. striiformis
Aggressiveness as driver in the spread and evolution of P. striiformisAggressiveness as driver in the spread and evolution of P. striiformis
Aggressiveness as driver in the spread and evolution of P. striiformis
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Webinar - How To Be An Author An Grow Your Business
Webinar - How To Be An Author An Grow Your BusinessWebinar - How To Be An Author An Grow Your Business
Webinar - How To Be An Author An Grow Your Business
 
Evolutionary development and anatomy of the lungs
Evolutionary development and anatomy of the lungsEvolutionary development and anatomy of the lungs
Evolutionary development and anatomy of the lungs
 
First steps in Social Media creativity
First steps in Social Media creativityFirst steps in Social Media creativity
First steps in Social Media creativity
 
IHEA - A Study of the Locavore Movement
IHEA - A Study of the Locavore MovementIHEA - A Study of the Locavore Movement
IHEA - A Study of the Locavore Movement
 
1.2.4 Универсальные шкафы для IT-оборудования RAM telecom
1.2.4 Универсальные шкафы для IT-оборудования RAM telecom1.2.4 Универсальные шкафы для IT-оборудования RAM telecom
1.2.4 Универсальные шкафы для IT-оборудования RAM telecom
 
1.3.24 Универсальные шкафы для it оборудования ram telecom
1.3.24 Универсальные шкафы для it оборудования ram telecom1.3.24 Универсальные шкафы для it оборудования ram telecom
1.3.24 Универсальные шкафы для it оборудования ram telecom
 
Tuberculoma resident dc dan so
Tuberculoma resident dc dan soTuberculoma resident dc dan so
Tuberculoma resident dc dan so
 
Fainting: Causes and Ways to Minimize Risk
Fainting: Causes and Ways to Minimize RiskFainting: Causes and Ways to Minimize Risk
Fainting: Causes and Ways to Minimize Risk
 
Pediatric and adult ecmo talk
Pediatric and adult ecmo talkPediatric and adult ecmo talk
Pediatric and adult ecmo talk
 
Transposition of great_arteries
Transposition of great_arteriesTransposition of great_arteries
Transposition of great_arteries
 
Kayla DeNapoli's Resume
Kayla DeNapoli's ResumeKayla DeNapoli's Resume
Kayla DeNapoli's Resume
 
Emergency CT: Updates
Emergency CT: UpdatesEmergency CT: Updates
Emergency CT: Updates
 
Body CT for Emergency Physicians
Body CT for Emergency PhysiciansBody CT for Emergency Physicians
Body CT for Emergency Physicians
 
1.4.1 Интервью с продукт-менеджером компании ДКС Антоном Дьяконовым
1.4.1 Интервью с продукт-менеджером компании ДКС Антоном Дьяконовым1.4.1 Интервью с продукт-менеджером компании ДКС Антоном Дьяконовым
1.4.1 Интервью с продукт-менеджером компании ДКС Антоном Дьяконовым
 

Semelhante a NetworkSecurity.ppt

Semelhante a NetworkSecurity.ppt (20)

NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
sad
sadsad
sad
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
one
oneone
one
 
disabled
disableddisabled
disabled
 
qa
qaqa
qa
 
Production verification
Production verificationProduction verification
Production verification
 
test 20072012
test 20072012test 20072012
test 20072012
 
test
testtest
test
 
ds
dsds
ds
 
wed
wedwed
wed
 
de
dede
de
 
dfsd
dfsddfsd
dfsd
 
the
thethe
the
 
this is test for download option
this is test for download optionthis is test for download option
this is test for download option
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
A Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking SystemA Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking System
 

Mais de DreamMalar

Mais de DreamMalar (20)

AQ
AQAQ
AQ
 
Latest PPT.pptx
Latest PPT.pptxLatest PPT.pptx
Latest PPT.pptx
 
example.pdf
example.pdfexample.pdf
example.pdf
 
example.pdf
example.pdfexample.pdf
example.pdf
 
tag
tagtag
tag
 
tag
tagtag
tag
 
example.pdf
example.pdfexample.pdf
example.pdf
 
LAtest Doc
LAtest DocLAtest Doc
LAtest Doc
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 
newdocument.txt
newdocument.txtnewdocument.txt
newdocument.txt
 
Sample.ppt
Sample.pptSample.ppt
Sample.ppt
 
not from widget
not from widgetnot from widget
not from widget
 
Document.docx.docx
Document.docx.docxDocument.docx.docx
Document.docx.docx
 
content list check
content list checkcontent list check
content list check
 
PDF2.pdf
PDF2.pdfPDF2.pdf
PDF2.pdf
 
1934015245 Software TestingA.pdf
1934015245 Software TestingA.pdf1934015245 Software TestingA.pdf
1934015245 Software TestingA.pdf
 
Presentation1.PPTX
Presentation1.PPTXPresentation1.PPTX
Presentation1.PPTX
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

NetworkSecurity.ppt

  • 2. 2 Network SecurityNetwork Security Introduction Introduction Attacks on authentication Online channel Attack taxonomy Attack taxonomy Offline credential objectives Short time pwd Conclusion Abstract Certificate based solution
  • 3. 3 PRESENTATIONPRESENTATION OBJECTIVESOBJECTIVES  Understand network security services  Be aware of vulnerabilities and threats  Realize why network security is necessary  Highly attractive solution for valuable and secure future.
  • 4. 4 The authors present two challenge response Internet banking authentication solutions  one based on short-time passwords  and one on certificates attacks on authentication transaction-signing option ABSTRACTABSTRACT
  • 5. 5 INTRODUCTIONINTRODUCTION  The Internet is an integral part of our daily lives, and the proportion of people who expect to be able to manage their bank accounts anywhere, anytime is constantly growing This article describes current Authentication threats and two proposed solutions as well as how these solutions can be extended in the face of more complex future attacks
  • 6. 6 ATTACKS ON AUTHENTICATION  Internet banking systems must authenticate users before granting them access to particular services.  successful authentication eventually enables users to access their private information. We can classify all Internet banking authentication methods according to their resistance to two types of common attacks  offline credential-stealing attacks online channel-breaking attacks
  • 7. Offline credential-stealing attacks  Security precautions can help users protect themselves from malicious software.  For example-- installing and maintaining a firewall and up-to date antivirus software, regularly applying operating system and browser patches 7
  • 8. Online channel-breaking attack  The intruder noticeably intercepts messages between the client PC and the banking server by masquerading as the server to the client and vice versa  Online channel-breaking attacks don’t necessarily compromise the user’s credentials but the session’s credentials and therefore typically require the user-initiated banking session to work properly. 8
  • 9. AN ATTACK TAXONOMY Taxonomy of Internet banking authentication methods. Methods are classified according to their resistance against offline credential-stealing and online channel-breaking attacks. 9
  • 10. SHORT-TIME PASSWORD SOLUTION  It uses symmetric cryptography in combination with a hardware security module . User authentication works as follows: 1. The user connects to the Internet banking 2. The user claims his or her identity by entering an account number in the bank’s login form 3. The user opens his or her smart card by entering the corresponding PIN in the reader before entering the given challenge. 4. The user manually copies the shown response to the bank’s login form to be checked by the bank’s authentication server. 10
  • 11. The Need for Web Security 11
  • 12. CERTIFICATE-BASED SOLUTION User authentication works as follows.  First, the user establishes an SSL/TLS channel between the user PC and the bank’s Web server by setting up an SSL/TLS session without client authentication. Once the card is available, its certificates become visible in the Web browser. 12
  • 13. 13 Conclusion Internet banking has turned into an arms race between financial institutions and public network attackers. Both solutions offer high security against common attacks. However, changing legislation and the eventually spread of e-IDs among customers makes this solution a highly attractive and valuable alternative for the future.

Notas do Editor

  1. This sub-section addresses why Internet security is a problem and how it came to be that we are depending on an infrastructure with fundamental vulnerabilities. updated 2000-08-07
  2. Confidentiality Integrity Authentication Ensures that the origin of a message is correctly identified, with an assurance that the identity is not false Nonrepudiation Neither the sender nor the receiver of a message is able to deny the transmission Access Control Availability