Preview

E-Banking Security Issues – Is There a Solution in Biometrics?

Best Essays
Open Document
Open Document
4647 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E-Banking Security Issues – Is There a Solution in Biometrics?
Journal of Internet Banking and Commerce
An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, August 2011, vol. 16, no.2 (http://www.arraydev.com/commerce/jibc/)

E-Banking Security Issues – Is There A Solution in Biometrics?

Amtul Fatima Scholar, Jawaharlal University of Technological studies, A.P., India Postal Address: Tallakunta, Chandrayangutta x-road, Hyderabad -500 005,A.P., India Email: brackishsea@gmail.com

ABSTRACT The providers of Internet banking services must be more responsive towards security requirements. While there is no doubt that Internet banking transaction should have layered protection against security threats, the providers should approach security considerations as part of their service offerings. Biometric based authentication and identification systems are the new solutions to address the issues of security and privacy. Using biometrics for identification restrict individuals from access to physical spaces and electronic services An effective authentication method should have customer acceptance, reliable performance, scalability to accommodate growth, and interoperability with existing systems and future plans. In this study, the security threats in Internet banking, its solutions in biometrics and its acceptance in the consumer market are studied using descriptive and exploratory research. The methods of descriptive research are used to obtain information concerning the major security issues in e-Banking. The research had been completed on the basis of secondary data (online databases, scientific journals, surveys, news). Keywords: Biometrics, e-banking, electronic banking, e-security, secure transactions, security threats, Identity thefts © Amtul Fatima, 2011

JIBC August 2011, Vol. 16, No.2 INTRODUCTION

-2–

Banking organisations have been delivering services to consumers and businesses remotely for years. Electronic funds transfer, including small



References: 1. Electronic Banking Risk Management Issues for Bank Supervisors; Electronic Banking Group White Paper; Oct 2000; Retrieved from http://www.bis.org/publ/bcbs76.pdf (Accessed on Dec 2010) 2. Sharma, K.; Singh, AJ, Biometric Security in the E World. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering. Nemati, 2010; pp 289-337. 3. Authentication in an Internet Banking Environment; Federal Financial Institutions Examination Council (FFIEC); Retrieved from http://www.ffiec.gov/ffiecinfobase/resources/retail/ffiauthentication_guidance.pdf (Accessed on Dec 2010) 4. Jain A, Hong L, Pankanti S; Biometrics: Promising frontiers for emerging identification market; Feb 2000; Retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=?doi=10.1.1.10.5497 (Accessed on Dec 2010) 5. Yang Y.J.; The Security of Electronic Banking. Proc. Nat. I International Systems Security Conference. National Computer Security Center. 1997; pp. 41-52. 6. Fire Alarm Company Burned by e-Banking Fraud; Retrieved from http://krebsonsecurity.com/2010/04/fire-alarm-company-burned-by-e-bankingfraud/ (Accessed on Dec 2010) 7. Arrests made over Internet banking fraud; Internet Business News, Aug 2000; Retrieved from http://www.allbusiness.com/finance/615165-1.html (Accessed on Dec 2010) 8. Internet World Stats - Usage and Population Statistics; Retrieved from http://www.internetworldstats.com/stats3.htm (Accessed on Dec 2010) 9. APWG ; Retrieved from http://www.antiphishing.org/ (Accessed on Dec 2010) 10. Vrancianu M.; Popa LA; Considerations Regarding the Security and Protection of E-Banking Services Consumers’ Interests; The Amfiteatru Economic Journal. Jun 2010; 12(28): pp388-403 11. Jamil ZU; Cyberlaw towards a new philosophy of Regulation; Retrieved from http://jamilandjamil.com/wp-content/uploads/2010/11/cyberlaw_supreme_cou rt_v10edit.pdf (accessed on Dec 2010) 12. Dias D, McKee K; Protecting Branchless Banking Consumers: Policy Objectives and Regulatory Options; CGAP Focus Notes; Sep 2010 Retrieved from http://www.cgap.org/gm/document-1.9.47443/FN_64_Rev.pdf Accessed on Dec 2010 13. Legal Framework for Electronic Banking; Retrieved from http://www.rbi.org.in/Scripts/PublicationReportDetails.aspx?UrlPage=&ID=28 (Accessed on Dec 2010) 14. Candid Wüeest; Threats to Online Banking; White Paper: Symantec Security Response; Retrieved from http://www.symantec.com/avcenter/reference/threats.to.online.banking.pdf (Accessed on Dec 2010) JIBC August 2011, Vol. 16, No.2    -9– 15. Zin ANM, Yunos Z; How To Make Online Banking Secure; The Star InTech; April 2005. Retrieved from http://www.crimeresearch.org/analytics/online_banking/ (accessed on Jan 2011) 16. Bielski L.; Striving to Create a Safe Haven Online: ID Theft, Worms, Bugs, and Virtual Eavesdropping Banks Cope with Escalating Threat; ABA Banking Journal, May 2003; 95 17. Khan B.; Khan MK.; Alghathbar KS, Biometrics and identity management for homeland security applications in Saudi Arabia; African Journal of Business Management, Nov 2010, Vol. 4(15): pp. 3296-3306. 18. Whelan S.; Biometrics Technology; CGAP IT Innovation Series; Retrieved from http://www.ruralfinance.org/cds_upload/1126265263594_Biometrics_technology .pdf (Accessed on Dec 2010) 19. Ratha NK, Chikkerur S, Connell JH, Bolle RM; Generating Cancelable Fingerprint Templates, IEEE Transaction on Pattern, Analysis and Machine Intelligence, Apr 2007; 29(4), pp. 561-572. 20. Liu S.; Silverman M.; A practical guide to biometric security technology, IT Professional, Jan/Feb 2001; 3(1), pp 27 – 32 21. Spence B.; Biometrics In Physical Access Control Issues, Status and Trends; Retrieved from http://www.edsales.com.au/pdfs/biom_PhysicalAccess%20Control.pdf (Accessed on Jan 2010) 22. Alter S.; The work system method for understanding information systems and information system research Communications of the Association for Information Systems (Volume 9, 2002) 90-104

You May Also Find These Documents Helpful

  • Better Essays

    First World Bank Savings and Loan (FWBSL) needs to consider the increased revenue and cost that will be present if they decide to offer secure services to their clients. With them expecting to have over $100,000,000 a year for online credit cards and loan applications together with other banking services, they are also expected to provide this service while paying close attention to the three security priorities which are: confidentiality, integrity, and availability. Customers expect FWBSL to be diligent when it comes to protecting their accounts and Nonpublic Personal Information. If something were to go wrong they could lose credibility with their current and potential…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Biometric systems are technologies that can scan physiological, chemical or behavioral characteristics of a subject for the sake of verifying or in other words authenticating their identity. It is the latest weapon in the fight against computer crime and identity theft. These technologies work with the help of sampling distinctive biological features, such as tracing patterns of blood vessels in the retina, voice recognition or fingerprinting. Later biological features are extracted and then converted into mathematical codes which are then stored as a biometric template. In order to confirm the identity of the user, they will be required to interact with the system scanner which will process the users identitywith the help of an iris or fingerprint scan. This sample is then compared with the template for a positive match and therefore, access is either granted or denied accordingly.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Huopio, Simo 1998; Biometric Identification, Network Security 1998: Biometric Identification; Helsinki University of Technology; http://www.tml.tkk.fi/Opinnot/Tik-110.501/1998/papers/12biometric retrieved 07/15/06…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become possible thanks to the advancements in pattern recognition technology.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    As the foregoing review suggests, the use of biometric technologies poses a host of interrelated policy questions, some of which are of general applicability to all biometric systems and others of which are technology- or use-specific. Among the questions one might ask are: Can the biometric system be narrowly tailored to its task? Who will oversee the program? What alternatives are there to biometric technologies? What information will be stored and in what form? To what facility/location will the biometric give…

    • 668 Words
    • 3 Pages
    Good Essays
  • Best Essays

    The evolution of technology over the past few years has been part of a phenomenal experience in our everyday lives. Today, more and more people rely on getting things done faster and quicker, with the help of technology. Take banking for instance, the traditional way was having to go to the bank for even the smallest transactions like sending money, checking your balance and so on. Then came the era of Automatic Teller Machines (ATMs), which can be used to carry out simple banking transactions. From then on, Internet banking was introduced in the early 1980s, and by the year 2000, around 13.7% of households had signed up for online banking accounts, just in America (Ann Lomena, Joy Ried, Dec 2000).…

    • 1636 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    The implementation of a successful e-banking strategy is far from being straight forward, as there are numerous inherent difficulties/barriers. The Internet as a channel for services delivery is fundamentally different from other channels such as branch networks or telephone banking. Therefore, it brings up its own unique challenges that require innovative solutions. Thus, a logical step for the management of banking related organizations may be to fully understand the organizational barriers inherent in e-banking.…

    • 3239 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    E-banking has become a common trend here in our country. It has made life easier for the life of Batswana, they can easily access their checking’s, savings credit card, mortgage and loan accounts with just a few clicks, anytime anywhere. They can transfer funds, pay bills and view transaction history just with a few clicks. They do not have to leave their home to do their banking. They can access their accounts in a matter of seconds. They can receive monthly statements electronically instead of by mail and save a lot of paper work in the process. They can view their statements in order of date and are likely to find the information you are looking for quicker than flipping through pages of older paper statements. Their many fundamental benefits e-banking has brought to Batswana but unfortunately, technology is never 100 percent reliable. Online banking can compromise your security and privacy. Hackers can obtain your account number or Social Security number and make unauthorized transactions on your behalf. Someone may get your security details if you didn't close the browser window or if the password memorization feature is enabled for your bank's website.…

    • 1719 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Palm Vein Technology

    • 256 Words
    • 2 Pages

    a challenge. To help deal with this growing problem, Fujitsu has developed a unique biometric security technology that puts access in the palm of your hand and no one else's.. In all these applications, the key to securing your assets and data will be in the palm of your hand. The new technology has many potential applications such as an ultra secure system for ATMs and banking transactions, server log in system, an authorization system for front doors, schools, hospital wards, storage areas, and high security areas in airports, and even facilitating library lending, doing away with the age-old library card…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mia, Rahman and Uddin, (2007), E-banking: Evolution, Status and Prospects, the Cost and Management, Vol.35, No.1, January-February 2007, PP. 36-48.…

    • 5887 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    E- Banking

    • 8080 Words
    • 33 Pages

    e-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic, interactive communication channels. E-banking includes the systems that enable financial institution customers, individuals or businesses, to access accounts, transact business, or obtain information on financial products and services through a public or private network, including the Internet. Customers access e-banking services using an intelligent electronic device, such as a personal computer (PC), personal digital assistant (PDA), automated teller machine (ATM), kiosk, or Touch Tone telephone. While the risks and controls are similar for the various e-banking access channels, this booklet focuses specifically on Internet-based services due to the Internet’s widely accessible public network. Accordingly, this booklet begins with a discussion of the two primary types of Internet websites: informational and transactional.…

    • 8080 Words
    • 33 Pages
    Good Essays