SECURITY IN ONLINE BANKING TRANSACTIONS

Mary J. Priyadharisini, J. Nisha Mary

Abstract


Banking sector worldwide are increasingly providing various online and mobile monetary services, offering their customers a more suitable way to lead their banking business while at the same time improving productivity and saving on operating expenses. Online banking accounts are usually targeted by computer-oriented crime. Security issues encounter considerable cause for customers and business firms alike.  As a result, banks require to implement requisite security measures to save themselves and their customer base. This research highlights the significance of security transactions of banks all over the world. Online banking structure are becoming more desirable targets for attacks. Banking institutions must discover how attackers compromise accounts and develop methods to protect them.


Keywords


Online Banking, Online Banking Services, Online banking security.

References


Dean L, and Widrig D. (2012). “Managing Software Requirements: A Use Case Approach”, AddisonWesley, Boston.

Harris L, and Laura JS. (2002). “The ethics of ebanking”, J. Electron. Commer. Res., Vol.3(2), pp.59-66.

Internet Host Count Maintained by the Internet Software Consortium. (2011). Retrieved from: http:// www.isc. org/.

Ivar J. (2012). “Object Oriented Software Engineering”, Addison Wesley. Retrieved form: Designing Web Interfaces: Principles and Patterns for Rich Interactions.

Mu Y. (2003). “E-banking: Status, Trends, Challenges and Policy Implications”, Retrieved from: SSRN: http://ssrn.com/ abstract= 485343 or DOI: 10.2139/ssrn.485343.

Nua Internet Surveys. (2001). “How Many Online?”, Retrieved form: http://www.nua.ie.

Open Web Application Security Project. (2011). “Denial of Service”. Retrieved form: https:// www. owasp. org/ index. php/ Denial_of_Service.

Robert M, Alan D, and Barbara H. (2013). “System Analysis and Design”, 4th Edn, Wiley, Hoboken, NJ.

Schneier B. (2005). “Two-factor authentication: Too little, too late”, Commun. ACM, Vol.48(4), p.136.


Refbacks

  • There are currently no refbacks.


Send mail to ijmss@ijmss.com with questions or comments about this web site. 

International Journal of Management and Social Sciences, All rights reserved.