Proceedings of the 18th International Conference on Security and Cryptography 2021
DOI: 10.5220/0010466600002998
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues of Electronic and Mobile Banking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Therefore, in this research, banking entities are urged to take preventive measures in this regard, in order to avoid negative impacts in the future. The study [20] indicates that banking security systems must be designed very carefully, considering many different factors in the process, not only internal to the banking infrastructure but also external systems (such as the procedures of the telecom operator).…”
Section: About the Research Questionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, in this research, banking entities are urged to take preventive measures in this regard, in order to avoid negative impacts in the future. The study [20] indicates that banking security systems must be designed very carefully, considering many different factors in the process, not only internal to the banking infrastructure but also external systems (such as the procedures of the telecom operator).…”
Section: About the Research Questionsmentioning
confidence: 99%
“…The study [20] indicates that banking security systems need to be designed very carefully, considering many different factors in the process, not only within the banking infrastructure but also outside of it. In addition, this study mentions more aspects related to how to improve banking security, among them that biometrics could be very useful to reconcile security and ergonomics; It also exposes other strategies that could help to significantly increase the level of security, such as introducing software and hardware tokens and using biometric channels.…”
Section: About the Research Questionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Burning issues and solutions like reliable password patterns, proper system software maintenance, secure network selection, biometrics solutions, sandbox mechanism against forceful transactions, two-factor authentication, two-level implementation of security: for non-operational and operational activities, vulnerabilities of SMS codes, phishing based social engineering attacks and preventions are discussed in detail. Numerous authentication mechanisms, legislative improvements, and protection against unauthorized access and theft of data are proposed [11]. Bosamia et al proposed a threat model with all its integral parts discussed in depth considering possible threats on principle components of mobile applica-tions specific to E-wallets.…”
Section: E-wallets and Mobile Payment Systemmentioning
confidence: 99%