scholarly journals Multilevel Authentication System for Stemming Crime in Online Banking

10.28945/3971 ◽  
2018 ◽  

[This Proceedings paper was revised and published in the 2018 issue of the Interdisciplinary Journal of Information, Knowledge, and Management, Volume 13] The wide use of online banking and technological advancement has attracted the interest of malicious and criminal users with more sophisticated form of attacks. Therefore, banks need to adapt their security systems to effectively stem threats posed by imposters and hackers, and also provide higher security standards that assure customers of a secured environment to perform their financial transactions. This has brought about the use of authentication techniques that include the mutual secure socket layer authentication embedded with some specific features. This approach was made towards providing a more reliable and complete solution for implementing user multi-level authentication in a banking environment

10.28945/4063 ◽  
2018 ◽  
Vol 13 ◽  
pp. 079-094
Author(s):  
Boniface K Alese ◽  
Aderonke Favour-Bethy Thompson ◽  
Olufunso Dayo Alowolodu ◽  
Blessing Emmanuel Oladele

Aim/Purpose: The wide use of online banking and technological advancement has attracted the interest of malicious and criminal users with a more sophisticated form of attacks. Background: Therefore, banks need to adapt their security systems to effectively stem threats posed by imposters and hackers and to also provide higher security standards that assure customers of a secured environment to perform their financial transactions. Methodology : The use of authentication techniques that include the mutual secure socket layer authentication embedded with some specific features. Contribution: An approach was made through this paper towards providing a more reliable and complete solution for implementing multi-level user authentication in a banking environment. Findings: The use of soft token as the final stage of authentication provides ease of management with no additional hardware requirement. Recommendations for Practitioners : This work is an approach made towards providing a more reliable and complete solution for implementing multi-level user authentication in a banking environment to stem cybercrime. Recommendation for Researchers: With this approach, a reliable system of authentication is being suggested to stem the growing rate of hacking activities in the information technology sector. Impact on Society :This work if adopted will give the entire populace confidence in carrying out online banking without fear of any compromise. Future Research: This work can be adopted to model a real-life scenario.


2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


2018 ◽  
Author(s):  
International Journal of Fiqh and Usul al-Fiqh Studies

One of the Sharīʿah’s requirements in conducting transactions is realising the Maqāṣid al-Sharīʿah. The Modern online banking system is very common to everyone, so it is considered as al-ʿUrf or al-ʿādah (common practice or custom) under the Sharīʿah. However, its practice is surrounded with security concerns, ease of use, and trust and cost implications that need observance of some Sharīʿah rulings. This qualitative analytic study uses the framework for the Maqāṣid al-Sharīʿah to explicate the ideal practice of online banking in service delivery to realize the Maqāṣid al-Sharīʿah. While Islam places more attention on the essential needs, online banking should as well be intended to provide essential services to customers and remove hardship in financial transactions. Banks should hence desist from causing any harm through the charging of hidden fees, causing more confusion to their clients, and even devising deceptive means that lead to the charging of ribā. Instead, banks should use online services to introduce means that promote the realization of the Maqāṣid al-Sharīʿah. This paper stresses the importance of financial technology in realising the Maqāṣid al-Sharīʿah.


Accounting ◽  
2021 ◽  
pp. 747-754 ◽  
Author(s):  
Frihardina Marsintauli ◽  
Eka Novianti ◽  
Roni Patar Situmorang ◽  
Fransiska Diana Fadjar Djoniputri

The use of an online accounting system is considered to be a major innovation in accounting in the application of the stages of the company's accounting cycle. The purpose of this study is to evaluate cloud-based accounting systems in terms of compliance with accounting standards, security systems using the Parkerian Hexad theory and the functions of each part of Accurate Online. The form of this research is qualitative and quantitative. The data collection method was carried out by distributing questionnaires and interviews to Accurate Online users. The sample of this research was obtained as many as 113 samples. The results of this study indicate that Accurate Online has passed all levels of technological readiness, and is on a scale of 9 in technological readiness, which has become a trusted cloud-based accounting information system that has proven to be successful in operating the technology, as well as in providing the benefits of ease of management. corporate financial transactions.


Author(s):  
Mike Gregory ◽  
Cynthia Roberts

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was initially enacted as an administrative simplification to standardize electronic transmission of common administrative and financial transactions. The program also calls for implementation specifications regarding privacy and security standards to protect the confidentiality and integrity of individually identifiable health information or protected health information. The Affordable Care Act further expanded many of the protective provisions set forth by HIPAA. Since its implementation, healthcare organizations around the nation have invested billions of dollars and have cycled through numerous program attempts aimed at meeting these standards. This chapter reviews the process taken by one organization to review the privacy policy in place utilizing a maturity model, identify deficiencies, and lead change in order to heighten the maturity of the system. The authors conclude with reflection related to effectiveness of the process as well as implications for practice.


Author(s):  
A. D. Smith

Even before September 11, 2001, security and privacy was a concern to nearly 80% of the current and potential Internet users around the globe, according to survey released by the Information Technology Association of America (ITAA) (Poulsen, 2000). The survey, commissioned by the American Express Company, randomly polled 11,410 people in 10 countries, and found that nearly half of the respondents enjoyed some form of Internet access. As might be expected, most of the world’s Internet users utilize Internet for e-mail, browsing, and entertainment. However, fewer than 28% do some shopping online, and 24% use the Internet for banking and financial transactions. But when Internet users and non-users of many countries were asked if they agree with the statement, “I am or would be concerned about security and privacy issues when purchasing or making financial transactions online,” 79% agreed. Prior to the tragedy of September 11, 2001, U.S. citizens also expressed legitimate concerns toward the issues of privacy and security, with an 85% showing. The poll released by the Information Technology Association of America also illustrated that approximately 80% have doubts about the U.S. government’s ability to maintain computer security and privacy. Hence, protecting operating systems is a major strategic concern if the success of e-government as a whole is to reach its potential. Although most of these issues are typically not discussed in relationship with e-government, the need for trusted computing systems within e-business and computing systems can be made as an effective argument that all these issues affect e-government systems as well. Secure computing systems issues in terms of e-government are just as important.  The scope of this article is to present a description of one the most generally known security certifications; namely, the trusted computer system evaluation (TCSEC) and its commercial implementation procedure in the commercial product evaluation process and discuss the influence of this evaluation/certification on the incidence of hacker attacks on e-business. As evident by the abundance of marketing literature of different operating systems for e-business that frequently refers to its security strength ranked against popular security certifications, it is very common to rank commercially available operating systems against TCSEC evaluation and/or certification criteria. This article will also explore where the many operating systems stands on this particular evaluation. In essence, given the vulnerabilities exposed after September 11, 2001, strategic security managers should be deeply concerned that the e-business platform they are responsible for contains the highest security standards to prevent any type of potentially harmful hacker attacks. Managers need to have a working knowledge of TCSEC security evaluation/certifications to become better informed when choosing the e-security platform for e-government/e-business. Essentially, the selection of a particular operating system for e-government/e-business have as much to do with factors ranging from existing skills, existing infrastructure, and economic reasons all the way up to political and strategic reasons. In dealing strategically with modern e-business environments, one of the most important factors that management must consider when choosing an operating system for their e-business platform is the security strength to resist computer hacker attacks on the operating system. If, for example, during different hacker attacks, one of the major aspects of these attacks is a certain operating system, as opposed to other systems, then this is a clear message to management to build in proper safeguards in the proposed operating system (Smith & Rupp, 2002a, 2002b). Certainly some of the reasons for frequent hacker attacks may probabilistic in terms and not random events, since Linux and Windows operating systems are more frequently used for e-commerce than other systems. So, it is not surprising that there are practically few reports of successful hacker attacks against operating systems that run e-business platforms (Smith, 2005; Smith & Lias, 2005; Smith & Offodile, 2002). 


Author(s):  
S. Jurgene ◽  
◽  
O.B. Longe

This study is aimed at designing a One-Time Password (OTP) for ATM/POS. The emergence of the Internet Banking leads to the Introduction of Plastic payment cards that provide a suitable and secure medium which people conduct a variety of financial transactions. But with this exciting innovation, it has also led to crime opportunities called “PLASTIC FRAUDS”. Notwithstanding, this crime must be controlled and that is why the banks must adopt a preventive and proactive method to fight the crimes. This calls for a One-Time Password (OTP) for ATM/POS. In this paper, we reviuewed Related Literaure and set the agenda for the research. Abstract- One-Time Password (OTP), ATM/POS, Security, Online Banking, Protection


2008 ◽  
pp. 3728-3738
Author(s):  
Alan D. Smith

Even before September 11, 2001, security and privacy was a concern to nearly 80% of the current and potential Internet users around the globe, according to survey released by the Information Technology Association of America (ITAA) (Poulsen, 2000). The survey, commissioned by the American Express Company, randomly polled 11,410 people in 10 countries, and found that nearly half of the respondents enjoyed some form of Internet access. As might be expected, most of the world’s Internet users utilize Internet for e-mail, browsing, and entertainment. However, fewer than 28% do some shopping online, and 24% use the Internet for banking and financial transactions. But when Internet users and non-users of many countries were asked if they agree with the statement, “I am or would be concerned about security and privacy issues when purchasing or making financial transactions online,” 79% agreed. Prior to the tragedy of September 11, 2001, U.S. citizens also expressed legitimate concerns toward the issues of privacy and security, with an 85% showing. The poll released by the Information Technology Association of America also illustrated that approximately 80% have doubts about the U.S. government’s ability to maintain computer security and privacy. Hence, protecting operating systems is a major strategic concern if the success of e-government as a whole is to reach its potential. Although most of these issues are typically not discussed in relationship with e-government, the need for trusted computing systems within e-business and computing systems can be made as an effective argument that all these issues affect e-government systems as well. Secure computing systems issues in terms of e-government are just as important.  The scope of this article is to present a description of one the most generally known security certifications; namely, the trusted computer system evaluation (TCSEC) and its commercial implementation procedure in the commercial product evaluation process and discuss the influence of this evaluation/certification on the incidence of hacker attacks on e-business. As evident by the abundance of marketing literature of different operating systems for e-business that frequently refers to its security strength ranked against popular security certifications, it is very common to rank commercially available operating systems against TCSEC evaluation and/or certification criteria. This article will also explore where the many operating systems stands on this particular evaluation. In essence, given the vulnerabilities exposed after September 11, 2001, strategic security managers should be deeply concerned that the e-business platform they are responsible for contains the highest security standards to prevent any type of potentially harmful hacker attacks. Managers need to have a working knowledge of TCSEC security evaluation/certifications to become better informed when choosing the e-security platform for e-government/e-business. Essentially, the selection of a particular operating system for e-government/e-business have as much to do with factors ranging from existing skills, existing infrastructure, and economic reasons all the way up to political and strategic reasons. In dealing strategically with modern e-business environments, one of the most important factors that management must consider when choosing an operating system for their e-business platform is the security strength to resist computer hacker attacks on the operating system. If, for example, during different hacker attacks, one of the major aspects of these attacks is a certain operating system, as opposed to other systems, then this is a clear message to management to build in proper safeguards in the proposed operating system (Smith & Rupp, 2002a, 2002b). Certainly some of the reasons for frequent hacker attacks may probabilistic in terms and not random events, since Linux and Windows operating systems are more frequently used for e-commerce than other systems. So, it is not surprising that there are practically few reports of successful hacker attacks against operating systems that run e-business platforms (Smith, 2005; Smith & Lias, 2005; Smith & Offodile, 2002). 


Author(s):  
Mike Gregory ◽  
Cynthia Roberts

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was initially enacted as an administrative simplification to standardize electronic transmission of common administrative and financial transactions. The program also calls for implementation specifications regarding privacy and security standards to protect the confidentiality and integrity of individually identifiable health information or protected health information. The Affordable Care Act further expanded many of the protective provisions set forth by HIPAA. Since its implementation, healthcare organizations around the nation have invested billions of dollars and have cycled through numerous program attempts aimed at meeting these standards. This chapter reviews the process taken by one organization to review the privacy policy in place utilizing a maturity model, identify deficiencies, and lead change in order to heighten the maturity of the system. The authors conclude with reflection related to effectiveness of the process as well as implications for practice.


Sign in / Sign up

Export Citation Format

Share Document