SlideShare uma empresa Scribd logo
1 de 52
E-Banking & Security Concern
Syed Akhtar-uz-zaman (IFIC-010)
• What is E-Banking ??
• Evaluation of E-Banking
• Threats and preventive measures of
 ATM
 Mobile Banking
 Online Banking
Presentation Outline
• on-line, real time banking
E-Banking
• the automated delivery of banking products and
services directly to customers through electronic,
interactive communication channels.
• Traditional banking business assumes:
– Customer desk at bank’s building
– Office hours from 10.00 am to 6.00 pm
Traditional banking
• Solving time constraint
Evaluation of E-Banking
• Solving place constraint
• Virtual banking(everything is
possible)
• “brick and mortar” institution
(has a building and personal service representatives)
• “brick and click” institution
(physical structure + Internet bank services)
• “virtual bank”
(no public building – exists only online)
Banking Option
Internet Approach:
Users directly log on to their bank website and
complete all their work online.
Approaches E-banking
Dial-in Approach:
Requires users to have a separate finance
software, so that they can do all the process offline
and connect to the bank just for transactions.
E- Banking devices
 Automated teller machines (ATMs)
 Cellular and smart phones
 Personal computers (PCs)
Automated teller machines (ATMs)
A machine that automatically provides cash and
performs other banking services on insertion of a
special card by the account holder.
Functions of ATM
24-hour access to cash
View Account Balances & Mini-statements
Order a Cheque Book / Account Statement
Transfer Funds between accounts
Refill your Prepaid card
Pay your utility bills
Deposit cash or cheques
Structure of ATM
Card reader
Keypad
Speaker
Display screen
Receipt printer
Cash dispenser
ATM Threaths
Attacks against ATMs may be classified as:
ATM physical attacks
ATM fraud
Functions of ATM
Safety Tips To Follow
While Using an ATM
Safety against physical attacks
Debit card security
Check your surroundings
Limit your transaction time
PIN number security
Stay alert
Notify loss of card
ATM Skimming
The act of using a skimmer to illegally collect data from the
magnetic stripe of a credit, debit or ATM card. This information is
copied onto another blank card's magnetic stripe
The skimmer is an electronic device that scans a credit/debit card
and stores the information contained in the magnetic stripe
PIN capturing
PIN capturing refers to a method of strategically attaching
cameras and various other imaging devices to ATMs in
order to fraudulently capture the ATM user’s PIN
ATM skimming process
Mitigating risk
Mitigating risk-S1
Shield Your PIN
Use your other hand to shield your fingers while you type in your PIN. Experts say taking this one
simple step could practically eliminate ATM skimming. This is because if the hidden camera can’t
capture your PIN, the mag stripe data captured by the skimmer is useless to the thief.
Mitigating risk-S2
Examine an ATM carefully before inserting your card. While skimmers may be hard for the untrained
eye to spot, they actually become pretty obvious if you’re on the lookout for them. They usually
consist of an extra piece of plastic that sits atop the slot where you insert your ATM card. They’re
usually attached to the ATM using two-sided tape, so if it looks suspicious, jiggle it a little — if it’s
loose, it might be a skimmer.
Check the ATM
Mitigating risk-S3
Avoid Low Traffic Areas
Don’t use ATMs in secluded, low-traffic areas. It takes a few minutes for thieves to install skimmers, so
they usually choose ATMs in more secluded areas with less foot traffic so they’re less likely to be seen.
If possible, try to only use ATMs in high-traffic areas like grocery stores, the mall or outside the bank
itself.
EMV Chip Card Technology
"EMV® is a global standard for credit and debit payment cards based on
chip card technology”. The standard covers the processing of credit and
debit card payments using a card that contains a microprocessor chip.
Mobile Banking
Mobile banking or m-banking is a term used for
performing banking activities on mobile phones and
tablets.
The earliest mobile banking services were offered
over SMS.
The future of banking
ADVANTAGES OF M-BANKING
Benefits for Banks
Large customer coverage
Reducing the costs of operations
Promoting their services and products internationally
Benefits for Small to Medium Businesses
To run its operations more effectively
Lower cost than traditional financial management mechanisms
Benefits for Customers
Convenience
Cost
Speed
Competitiveness
Communication
Environmental
ACCESS METHODS
Text messaging
Mobile app
Vulnerability of mobile apps
Prime targets for attackers
Data
Identity
Availability
Types Of Mobile Frauds
Cyber Attacks and Malware
Top mobile attack methods are:
Social engineering threats
Malvertising
Repacked, malicious apps on third party app stores
The most common threats
7 mobile banking security tips
Online banking
Online banking is the performance of banking activities via the
Internet. Online banking is also known as "Internet banking" or
"Web banking." A good online bank will offer customers just
about every service traditionally available through a local branch
May 1995: Wells Fargo – the first bank in the world offer
customer access to their accounts over the internet.
The Benefits of Virtual Banking
Online banking has plenty of perks. These include:
Convenience
Services
Ease of monitoring
Transfer services
Available account balance & information at the touch of a
button
Advantage of virtual banking
Electronic funds transfer
Bill payments and wire transfers
Loan application and repayments
Deposit cash or cheques
downloading bank statements
viewing images of paid checques
Online Banking FRAUD
Phishing
Pharming
Social Engineering
Malware
Phishing
Electronic means of acquiring customers’ sensitive
information by disguising as a very trustworthy entity.
Phishing
Fake e-mail or fake websites sent to customers, as if it’s
from their banks that lead customer to a fake website.
Pharming
Pharming is a type of fraud that involves diverting the client Internet
connection to a counterfeit website, so that even when the user enters
the correct address into his browser, it ends up on the forged site
Social Engineering
Social Engineering is a
non-technical method
of intrusion hackers
use that relies heavily
on human interaction
and often involves
tricking people into
breaking normal
security procedures.
Malware
A Malware is a set of instructions that run on your
computer and make your system do something that an
attacker wants it to do
The Malware family
Computer Viruses
Trojan Horses
Internet Worms
Scareware
Adware
Ransomware
Keyloggers
How malware works
Banking fraud prevention tips
Malware Protection
Multi-factor Authentication
Personal Firewalls
Spike Activity Identification
KeCrypt tool
Malware Protection
Implement powerful an antivirus and an antimalware
software with on-access / real-time scanner checking
legitimacy of files.
Anti-malware programs
They provide real-time protection against
the installation of malware software
Scans all incoming network data for
malware and blocks any threat it comes
across - can be used solely for
detection and removal of installed
malware software.
Multi-factor Authentication
Supports another level of authorization in addition to the
initial login requirement, usually involving real-time
generation of a code.
Personal Firewalls
This program monitors all outgoing and incoming information between your device
and the internet and only familiar authorized connections are allowed.
A personal firewall will usually protect only the computer on which it is installed.
Spike Activity Identification
Trend analysis helps in this process, when an un-usual activity
occurs in an account, either a high amount or different location
or frequency
Accounts associated with a lot of high-risk behavior should be
on top list of banks investigation.
Encryption
Involves encoding
messages or information
in such a way that only
authorized parties can
read it when decoded.
The common encryption
standard adopted by
most browsers is called
Secure Socket Layer (SSL)
Is E-Banking Really Necessary?
H2: Savings interest rate, online banking, closing hour, waiting time, security
and confidentiality are the major parameters for selecting their bank.
E banking & security concern

Mais conteúdo relacionado

Mais procurados

Electronic Payment Systems Shortened
Electronic Payment Systems ShortenedElectronic Payment Systems Shortened
Electronic Payment Systems Shortened
Ritesh Verma
 

Mais procurados (20)

Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
E business security
E business securityE business security
E business security
 
Debit And Credit Cards
Debit And Credit CardsDebit And Credit Cards
Debit And Credit Cards
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Mobile banking project
Mobile banking projectMobile banking project
Mobile banking project
 
Electronic Banking
Electronic BankingElectronic Banking
Electronic Banking
 
Electronic Payment Systems Shortened
Electronic Payment Systems ShortenedElectronic Payment Systems Shortened
Electronic Payment Systems Shortened
 
ELECTRONIC FUND TRANSFER
ELECTRONIC FUND TRANSFERELECTRONIC FUND TRANSFER
ELECTRONIC FUND TRANSFER
 
Impact of technology on banking operations
Impact of technology on banking operationsImpact of technology on banking operations
Impact of technology on banking operations
 
Payment fraud
Payment fraudPayment fraud
Payment fraud
 
Electronic Fund Transfer (EFT)
Electronic Fund Transfer (EFT)Electronic Fund Transfer (EFT)
Electronic Fund Transfer (EFT)
 
Unit v e-banking
Unit v e-bankingUnit v e-banking
Unit v e-banking
 
e payment system ppt
e payment system ppte payment system ppt
e payment system ppt
 
Introduction to retail banking
Introduction to retail bankingIntroduction to retail banking
Introduction to retail banking
 
Digital Banking
Digital BankingDigital Banking
Digital Banking
 
Digital banking and its benefits
Digital banking and its benefitsDigital banking and its benefits
Digital banking and its benefits
 
e-banking
e-bankinge-banking
e-banking
 
Core banking
Core bankingCore banking
Core banking
 
electronic payment system
electronic payment system electronic payment system
electronic payment system
 

Destaque (6)

E Banking
E BankingE Banking
E Banking
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentation
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
E banking
E bankingE banking
E banking
 
Banking ppt
Banking pptBanking ppt
Banking ppt
 

Semelhante a E banking & security concern

Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
Hai Nguyen
 
E banking-10092118-phpapp02
E banking-10092118-phpapp02E banking-10092118-phpapp02
E banking-10092118-phpapp02
saritabajaj54
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
Mani Rai
 

Semelhante a E banking & security concern (20)

Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
 
Mobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceMobile banking issues in banking and insurance
Mobile banking issues in banking and insurance
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
E banking-10092118-phpapp02
E banking-10092118-phpapp02E banking-10092118-phpapp02
E banking-10092118-phpapp02
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
E banking-130826111407-phpapp01
E banking-130826111407-phpapp01E banking-130826111407-phpapp01
E banking-130826111407-phpapp01
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
E-Banking (1).pptx
E-Banking (1).pptxE-Banking (1).pptx
E-Banking (1).pptx
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
D0351022026
D0351022026D0351022026
D0351022026
 
E banking
E bankingE banking
E banking
 

Último

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Último (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 

E banking & security concern

  • 1. E-Banking & Security Concern Syed Akhtar-uz-zaman (IFIC-010)
  • 2. • What is E-Banking ?? • Evaluation of E-Banking • Threats and preventive measures of  ATM  Mobile Banking  Online Banking Presentation Outline
  • 3. • on-line, real time banking E-Banking • the automated delivery of banking products and services directly to customers through electronic, interactive communication channels.
  • 4. • Traditional banking business assumes: – Customer desk at bank’s building – Office hours from 10.00 am to 6.00 pm Traditional banking
  • 5. • Solving time constraint Evaluation of E-Banking • Solving place constraint • Virtual banking(everything is possible)
  • 6. • “brick and mortar” institution (has a building and personal service representatives) • “brick and click” institution (physical structure + Internet bank services) • “virtual bank” (no public building – exists only online) Banking Option
  • 7. Internet Approach: Users directly log on to their bank website and complete all their work online. Approaches E-banking Dial-in Approach: Requires users to have a separate finance software, so that they can do all the process offline and connect to the bank just for transactions.
  • 8. E- Banking devices  Automated teller machines (ATMs)  Cellular and smart phones  Personal computers (PCs)
  • 9. Automated teller machines (ATMs) A machine that automatically provides cash and performs other banking services on insertion of a special card by the account holder.
  • 10. Functions of ATM 24-hour access to cash View Account Balances & Mini-statements Order a Cheque Book / Account Statement Transfer Funds between accounts Refill your Prepaid card Pay your utility bills Deposit cash or cheques
  • 11. Structure of ATM Card reader Keypad Speaker Display screen Receipt printer Cash dispenser
  • 12. ATM Threaths Attacks against ATMs may be classified as: ATM physical attacks ATM fraud
  • 13. Functions of ATM Safety Tips To Follow While Using an ATM
  • 14. Safety against physical attacks Debit card security Check your surroundings Limit your transaction time PIN number security Stay alert Notify loss of card
  • 15. ATM Skimming The act of using a skimmer to illegally collect data from the magnetic stripe of a credit, debit or ATM card. This information is copied onto another blank card's magnetic stripe The skimmer is an electronic device that scans a credit/debit card and stores the information contained in the magnetic stripe
  • 16. PIN capturing PIN capturing refers to a method of strategically attaching cameras and various other imaging devices to ATMs in order to fraudulently capture the ATM user’s PIN
  • 19. Mitigating risk-S1 Shield Your PIN Use your other hand to shield your fingers while you type in your PIN. Experts say taking this one simple step could practically eliminate ATM skimming. This is because if the hidden camera can’t capture your PIN, the mag stripe data captured by the skimmer is useless to the thief.
  • 20. Mitigating risk-S2 Examine an ATM carefully before inserting your card. While skimmers may be hard for the untrained eye to spot, they actually become pretty obvious if you’re on the lookout for them. They usually consist of an extra piece of plastic that sits atop the slot where you insert your ATM card. They’re usually attached to the ATM using two-sided tape, so if it looks suspicious, jiggle it a little — if it’s loose, it might be a skimmer. Check the ATM
  • 21. Mitigating risk-S3 Avoid Low Traffic Areas Don’t use ATMs in secluded, low-traffic areas. It takes a few minutes for thieves to install skimmers, so they usually choose ATMs in more secluded areas with less foot traffic so they’re less likely to be seen. If possible, try to only use ATMs in high-traffic areas like grocery stores, the mall or outside the bank itself.
  • 22. EMV Chip Card Technology "EMV® is a global standard for credit and debit payment cards based on chip card technology”. The standard covers the processing of credit and debit card payments using a card that contains a microprocessor chip.
  • 23. Mobile Banking Mobile banking or m-banking is a term used for performing banking activities on mobile phones and tablets. The earliest mobile banking services were offered over SMS.
  • 24. The future of banking
  • 25. ADVANTAGES OF M-BANKING Benefits for Banks Large customer coverage Reducing the costs of operations Promoting their services and products internationally Benefits for Small to Medium Businesses To run its operations more effectively Lower cost than traditional financial management mechanisms Benefits for Customers Convenience Cost Speed Competitiveness Communication Environmental
  • 27.
  • 29. Prime targets for attackers Data Identity Availability
  • 30. Types Of Mobile Frauds
  • 31. Cyber Attacks and Malware Top mobile attack methods are: Social engineering threats Malvertising Repacked, malicious apps on third party app stores
  • 32. The most common threats
  • 33. 7 mobile banking security tips
  • 34. Online banking Online banking is the performance of banking activities via the Internet. Online banking is also known as "Internet banking" or "Web banking." A good online bank will offer customers just about every service traditionally available through a local branch May 1995: Wells Fargo – the first bank in the world offer customer access to their accounts over the internet.
  • 35. The Benefits of Virtual Banking Online banking has plenty of perks. These include: Convenience Services Ease of monitoring Transfer services Available account balance & information at the touch of a button
  • 36. Advantage of virtual banking Electronic funds transfer Bill payments and wire transfers Loan application and repayments Deposit cash or cheques downloading bank statements viewing images of paid checques
  • 38. Phishing Electronic means of acquiring customers’ sensitive information by disguising as a very trustworthy entity.
  • 39. Phishing Fake e-mail or fake websites sent to customers, as if it’s from their banks that lead customer to a fake website.
  • 40. Pharming Pharming is a type of fraud that involves diverting the client Internet connection to a counterfeit website, so that even when the user enters the correct address into his browser, it ends up on the forged site
  • 41. Social Engineering Social Engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
  • 42. Malware A Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do The Malware family Computer Viruses Trojan Horses Internet Worms Scareware Adware Ransomware Keyloggers
  • 44. Banking fraud prevention tips Malware Protection Multi-factor Authentication Personal Firewalls Spike Activity Identification KeCrypt tool
  • 45. Malware Protection Implement powerful an antivirus and an antimalware software with on-access / real-time scanner checking legitimacy of files.
  • 46. Anti-malware programs They provide real-time protection against the installation of malware software Scans all incoming network data for malware and blocks any threat it comes across - can be used solely for detection and removal of installed malware software.
  • 47. Multi-factor Authentication Supports another level of authorization in addition to the initial login requirement, usually involving real-time generation of a code.
  • 48. Personal Firewalls This program monitors all outgoing and incoming information between your device and the internet and only familiar authorized connections are allowed. A personal firewall will usually protect only the computer on which it is installed.
  • 49. Spike Activity Identification Trend analysis helps in this process, when an un-usual activity occurs in an account, either a high amount or different location or frequency Accounts associated with a lot of high-risk behavior should be on top list of banks investigation.
  • 50. Encryption Involves encoding messages or information in such a way that only authorized parties can read it when decoded. The common encryption standard adopted by most browsers is called Secure Socket Layer (SSL)
  • 51. Is E-Banking Really Necessary? H2: Savings interest rate, online banking, closing hour, waiting time, security and confidentiality are the major parameters for selecting their bank.