Online Security Framework for e-Banking Services: A Review

Abstract

The emergence of Internet banking has allowed banks to offer their customers relatively convenient and flexible banking, also known as e-banking. These services now come in a wide range, including but not limited to conducting fund transfers, managing and checking account, and bill payments. Despite benefits that banks are offering to their customers through online services, e-banking has also raised many security issues. Computer hackers have developed a variety of elusive methods for stealing Internet bankers’ money. Although there are many advantages of online banking, security issues often discourage customers from using it, as many customers have found that the use of online banking could leave their financial assets at risk. The primary services that customers use via the Internet are transferring money across accounts, paying bills, checking account balances, and sending and receiving confidential information between banks and fellow customers. The rise in cyber-attacks has caused a decline in the use of online banking and has negatively affected consumer confidence in the ability of financial institutions to protect them. Consumers are questioning the safety of their money and information and are looking up to banks to fix the problem. Therefore this paper reviewed online security framework for e-Banking services.

Country : Nigeria

1 Dr.Oye N D2 Sarjiyus O

  1. Department of Computer Science, MAUTECH, Yola, Nigeria
  2. Department of Computer Science, ADSU, Mubi, Nigeria

IRJIET, Volume 3, Issue 2, February 2019 pp. 6-21

References

  1. Abdulwahed, M. S. K., &Yaquob, S. Y. A. (2006).  Factors influencing the adoption of Internet banking in oman, A Descriptive Case Study Analysis, International Journal of Financial Services Management, 1 (2/3), 155 – 172.
  2. Adesuyi, F., Adepoju, S., & David, R. (2013), A Survey of ATM Security Implementation within the Nigerian Banking Environment, Journal of Internet Banking and Commerce, 18(1), 01-16.
  3. Alnsour, M.S., & Al-Hyari, K. (2011), “Internet banking and Jordanian corporate customers: Issues of security and trust”, Journal of Internet Banking and Commerce, 16(1), 1.
  4. Alsayed, A. O. &Balgrami, A. (2017), E-banking Security: Internet Hacking, Phishing Attacks, Analysis and Prevention of Fraudulent Activities, International Journal of Emerging Technology and Advanced Engineering, 1(7), 109-112.
  5. Alshehri, S., Radziszowski, S., & Raj, R. K. (2011), “Designing a Secure Cloud-Based EHR System using Ciphertext-Policy Attribute-Based Encryption, ACM Digital Library, IJCS.
  6. Amtul, F. (2011), “E-Banking security issues - is there a solution in biometrics?”, Journal of Internet Banking and Commerce, 16( 2), 1.
  7. Anderson, R. J. &Schneier, B. (2005), Economics of information security, IEEE Security and Privacy, 3(1), 12-13.
  8. Anderson, R. J. (2001), Security Engineering: A Guide to Building Dependable Distributed Systems. (2nd Ed), Wiley: New York.
  9. Arachchilage NAG, Love, S., Beznosov, K., (2016), Phishing threat avoidance behaviour: An empirical investigation. Computers in Human Behavior, 60, 185-197.
  10. Arora, M., Sharma, K. K., & Chauhan, S. (2016), Cyber Crime Combating Using Key Log Detector tool.
  11. Arya, B., & Chandrasekaran, K. (2016), A client-side anti-pharming (CSAP) approach. In Circuit, Power and Computing Technologies (ICCPCT), 2016 International Conference on IEEE, 1-6.
  12. Beranek, L. Jiri, K.(2013), The Use of Contextual Information to Detection of Fraud on Online Auctions, Journal of Internet Banking and Commerce, 18(3), 1-17.
  13. Chaudhry, J. A., Chaudhry, S. A., & Rittenhouse, R. G. (2016), Phishing Attacks and Defenses, International Journal of Security and Its Applications, 10, 247-256.
  14. Cheng, T. C. E., Lam, D. Y. C., & Yeung, A. C. L. (2006), Adoption of Internet banking: An empirical study in Hong Kong, Journal of Decision Support Systems. 42(3), 1558-1572.
  15. Chiu, C.L., Chiu, J.L., & Mansumitrchai, S. (2016), Privacy, security, infrastructure and cost issues in internet banking in the Philippines: initial trust formation, International Journal of Financial Services Management, 8, 240-271.
  16. Dalton, G., Mills, R., Colombi, J., & Raines, R. (2006), "Analyzing Attack Trees using Generalized Stochastic Petri Nets," 2006 IEEE Information Assurance Workshop, 2006, 116-123.
  17. Damodaram, R. (2016), Study on phishing attacks and antiphishing tools, International Research Journal of Engineering and Technology, 3.
  18. Devadiga, D., Jain H., Kothari, H., &Sankhe, S. (2017), E-Banking Security Using Cryptography, Steganography and Data Mining, International Journal of Computer Applications, 164(9), 26-28.
  19. Dmitrienko, A., Liebchen, C., Rossow, C., &Sadeghi, A.-R. (2014), “Security analysis of mobile two-factor authentication schemes”, Intel® Technology Journal, 18(24), 138-161.
  20. Emigh, A. (2005), Online identity theft: phishing technology, chokepoints and counter measures, ITTC Report on Online Identity Theft Technology and Counter measures, 1-58.
  21. Eze, C. U., Yih, C.G., Ling, N. T., Gan, G. G. G. (2008), Phishing: a growing challenge for Internet banking providers in Malaysia, Communications of the IBIMA, 5, 133-142.
  22. French, A. (2012), “A case study on E-Banking security – When security becomes too sophisticated for the user to access their information”, Journal of Internet Banking and Commerce, 17(2), 1-14.
  23. Gonzalez, M. E. (2008), An alternative approach in service Quality: An e-banking case study, Quality Management, 15, 41-48.
  24. Gupta, P. K. (2008), Internet banking in India: Consumer concern and bank strategies, Global Journal of Business Research, 2(1), 43-51.
  25. Jolly, V. (2016), The Influence of Internet Banking on the Efficiency and Cost Savings for Banks’ Customers, International Journal of Social Sciences and Management, 3, 163-170.
  26. Kasemsan, M. L., & Hunngam, N. (2011), Internet banking security guideline model for banking in Thailand. Communications of the IBIMA, 23(6), 1-13.
  27. Kim, C., Mirusmonov. M., & Lee, I. (2010), “An empirical examination of factors influencing the intention to use mobile payment”, Computers in Human Behavior, 26(3), 310-322.
  28. Krol, K., Cristofaro, E. D., &Sasse, A.(2014), “They brought in the horrible key ring thing!” Analyzing the usability of two-factor authentification in UK online banking”, Cornell University Library, arXiv:1501.04434, unpublished.
  29. Kuppuswamy, P. (2011), “Enrichment of security through cryptographic public key algorithm based on block cipher”, ISSN : 0976-5166, (2)3.
  30. Lasheng, Y., & Placide, M. (2009), Three-tier security model for e-business, Proceedings of the Second Symposium International Computer Science and Computational Technology (ISCSCT), 114-119.
  31. Lee, J.H., Lim, W.G., & Lim, J. I.(2013), “A study of the security of Internet banking and financial private information in South Korea”, Mathematical and Computer Modeling, 58(1-2), 117-131.
  32. Lee, M., (2009), “Factors influencing the adoption of Internet banking: An integration of TAM and TPB with perceived risk and perceived benefit”, Electronic Commerce Research and Applications, 8(3), 130-141.
  33. Leukfeldt, E. R., Kleemans, E. R., &Stol W. P. (2016), Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks, British Journal of Criminology, 9.
  34. Maholtra, P., & Singh, B. (2007), Determinants of Internet banking adoption by banks in India, Journal of Emerald Internet Research, 17(3), 323-339.
  35. Martino, A. S., & Perramon, X. (2008), Defending e-Banking Services: An Antiphishing Approach Services, IEEE Congress on Services, 1, 251-254.
  36. McGuinness, R. (2010), Hackers’ cash raid on 3,000 accounts. Metro.
  37. Mishra, R. (2016), Review: Phishing Attack Types & Preventive Measures, Imperial Journal of Interdisciplinary Research, 2.
  38. Mohammed, S. K., Siba, S. M., &Sreek, U. (2009), Service quality evaluation in Internet banking: An empirical study in India, International Journal of Indian Culture and Business Management, 2(1), 27-31.
  39. Musaev, E. &Yousoof, M. (2015), A Review on Internet Banking Security and Privacy Issues in Oman. ICII 7th International Conference on Information Technology.
  40. Peotta, Holtz, B., & David, D. (2011), A formal classification of internet banking attacks and vulnerabilities. International Journal of Computer Science & Information Technology, 3(1), 186-197.
  41. Peotta, L. & Holtz, M. D. (2011), “A formal classification of Internet banking attacks and vulnerabilities”, International Journal of Computer Science & Information Technology (IJCSIT), (3)1.
  42. Razak, L.T. (2016), The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services: An Extension of TAM" Mohammed A. Al-Sharaf,“Ruzaini A. Arsha," Emad Abu-Shanab and “Nabil Elayah" Faculty of Computer Systems and Software Engineering, UMP. Journal of Engineering and Applied Sciences, 100, 545-552.
  43. Safeena, R. (2010), Customer perspectives on E-business value: case study on Internet banking, Journal of Internet Banking and Commerce, 15, 1-17.
  44. Saleh, Z. (2011), “Improving security of online banking using RFID”, Academy of Banking Studies Journal, 10(2), 1-8.
  45. Sanayei, A., & Noroozi, A. (2009), Security of Internet banking services and its linkage with users trust: A case study of percian of Iran and CIMB Bank of Malaysia, International Conference on Computer and Electrical Engineering (ICIME).
  46. Sarjiyus, O.  & Asua, W. (2018), Security and Trust for Online Banking Services in Real World, International Journal of Engineering Research and Allied Science, 3(6), 1-4.
  47. Sharma, S. (2016), A detail comparative study on e-banking VS traditional banking, International Journal of Advanced Research, 2, 302-307.
  48. Srivastava, S. S., & Gupta, N. (2011), “A Novel Approach to Security using Extended Playfair Cipher”, International Journal of Computer Applications, (0975 – 8887), (20)6.
  49. Thawte, The value of authentication. Retrieved on September, http://www.thawte.com, 2009.
  50. Tripathi, A. K., & Tripathi, M. (2012), “A framework of distributed database management systems in the modern enterprise and the uncertainties removal”, (2) 4, ISSN: 2277.
  51. Une, M., & Kanda, M. (2011), “Issues on Cryptographic Algorithms”.
  52. Vaciago, G., & Ramalho, D. S. (2016), Online searches and online surveillance: the use of trojans and other types of malware as means of obtaining evidence in criminal proceedings, Digital Evidence & Elec. Signature L. Rev., 13, 88.
  53. Viega, J., Mcgraw, G. (2002), Building Secure Software. Addison Wesley, New York, NY 74-75.
  54. Wada  F., Olumide, L.,  & Paul, D. (2012), Action Speaks louder than words – understanding Cyber Criminal behavior using criminological theories, Journal of Internet Banking and Commerce, 17(1), 01-12.
  55. Wueest, C. (2006), Threats to Online Banking, Symantec Security Response Dublin.
  56. Yoon, H. S., & Occena, L.(2014), “Impats of customers’ perceptions on internet  banking use with a smart phone”, Journal of Computer Information Systems, 54(3),1-9.