SlideShare a Scribd company logo
1 of 52
E-Banking & Security Concern
Syed Akhtar-uz-zaman (IFIC-010)
• What is E-Banking ??
• Evaluation of E-Banking
• Threats and preventive measures of
 ATM
 Mobile Banking
 Online Banking
Presentation Outline
• on-line, real time banking
E-Banking
• the automated delivery of banking products and
services directly to customers through electronic,
interactive communication channels.
• Traditional banking business assumes:
– Customer desk at bank’s building
– Office hours from 10.00 am to 6.00 pm
Traditional banking
• Solving time constraint
Evaluation of E-Banking
• Solving place constraint
• Virtual banking(everything is
possible)
• “brick and mortar” institution
(has a building and personal service representatives)
• “brick and click” institution
(physical structure + Internet bank services)
• “virtual bank”
(no public building – exists only online)
Banking Option
Internet Approach:
Users directly log on to their bank website and
complete all their work online.
Approaches E-banking
Dial-in Approach:
Requires users to have a separate finance
software, so that they can do all the process offline
and connect to the bank just for transactions.
E- Banking devices
 Automated teller machines (ATMs)
 Cellular and smart phones
 Personal computers (PCs)
Automated teller machines (ATMs)
A machine that automatically provides cash and
performs other banking services on insertion of a
special card by the account holder.
Functions of ATM
24-hour access to cash
View Account Balances & Mini-statements
Order a Cheque Book / Account Statement
Transfer Funds between accounts
Refill your Prepaid card
Pay your utility bills
Deposit cash or cheques
Structure of ATM
Card reader
Keypad
Speaker
Display screen
Receipt printer
Cash dispenser
ATM Threaths
Attacks against ATMs may be classified as:
ATM physical attacks
ATM fraud
Functions of ATM
Safety Tips To Follow
While Using an ATM
Safety against physical attacks
Debit card security
Check your surroundings
Limit your transaction time
PIN number security
Stay alert
Notify loss of card
ATM Skimming
The act of using a skimmer to illegally collect data from the
magnetic stripe of a credit, debit or ATM card. This information is
copied onto another blank card's magnetic stripe
The skimmer is an electronic device that scans a credit/debit card
and stores the information contained in the magnetic stripe
PIN capturing
PIN capturing refers to a method of strategically attaching
cameras and various other imaging devices to ATMs in
order to fraudulently capture the ATM user’s PIN
ATM skimming process
Mitigating risk
Mitigating risk-S1
Shield Your PIN
Use your other hand to shield your fingers while you type in your PIN. Experts say taking this one
simple step could practically eliminate ATM skimming. This is because if the hidden camera can’t
capture your PIN, the mag stripe data captured by the skimmer is useless to the thief.
Mitigating risk-S2
Examine an ATM carefully before inserting your card. While skimmers may be hard for the untrained
eye to spot, they actually become pretty obvious if you’re on the lookout for them. They usually
consist of an extra piece of plastic that sits atop the slot where you insert your ATM card. They’re
usually attached to the ATM using two-sided tape, so if it looks suspicious, jiggle it a little — if it’s
loose, it might be a skimmer.
Check the ATM
Mitigating risk-S3
Avoid Low Traffic Areas
Don’t use ATMs in secluded, low-traffic areas. It takes a few minutes for thieves to install skimmers, so
they usually choose ATMs in more secluded areas with less foot traffic so they’re less likely to be seen.
If possible, try to only use ATMs in high-traffic areas like grocery stores, the mall or outside the bank
itself.
EMV Chip Card Technology
"EMV® is a global standard for credit and debit payment cards based on
chip card technology”. The standard covers the processing of credit and
debit card payments using a card that contains a microprocessor chip.
Mobile Banking
Mobile banking or m-banking is a term used for
performing banking activities on mobile phones and
tablets.
The earliest mobile banking services were offered
over SMS.
The future of banking
ADVANTAGES OF M-BANKING
Benefits for Banks
Large customer coverage
Reducing the costs of operations
Promoting their services and products internationally
Benefits for Small to Medium Businesses
To run its operations more effectively
Lower cost than traditional financial management mechanisms
Benefits for Customers
Convenience
Cost
Speed
Competitiveness
Communication
Environmental
ACCESS METHODS
Text messaging
Mobile app
Vulnerability of mobile apps
Prime targets for attackers
Data
Identity
Availability
Types Of Mobile Frauds
Cyber Attacks and Malware
Top mobile attack methods are:
Social engineering threats
Malvertising
Repacked, malicious apps on third party app stores
The most common threats
7 mobile banking security tips
Online banking
Online banking is the performance of banking activities via the
Internet. Online banking is also known as "Internet banking" or
"Web banking." A good online bank will offer customers just
about every service traditionally available through a local branch
May 1995: Wells Fargo – the first bank in the world offer
customer access to their accounts over the internet.
The Benefits of Virtual Banking
Online banking has plenty of perks. These include:
Convenience
Services
Ease of monitoring
Transfer services
Available account balance & information at the touch of a
button
Advantage of virtual banking
Electronic funds transfer
Bill payments and wire transfers
Loan application and repayments
Deposit cash or cheques
downloading bank statements
viewing images of paid checques
Online Banking FRAUD
Phishing
Pharming
Social Engineering
Malware
Phishing
Electronic means of acquiring customers’ sensitive
information by disguising as a very trustworthy entity.
Phishing
Fake e-mail or fake websites sent to customers, as if it’s
from their banks that lead customer to a fake website.
Pharming
Pharming is a type of fraud that involves diverting the client Internet
connection to a counterfeit website, so that even when the user enters
the correct address into his browser, it ends up on the forged site
Social Engineering
Social Engineering is a
non-technical method
of intrusion hackers
use that relies heavily
on human interaction
and often involves
tricking people into
breaking normal
security procedures.
Malware
A Malware is a set of instructions that run on your
computer and make your system do something that an
attacker wants it to do
The Malware family
Computer Viruses
Trojan Horses
Internet Worms
Scareware
Adware
Ransomware
Keyloggers
How malware works
Banking fraud prevention tips
Malware Protection
Multi-factor Authentication
Personal Firewalls
Spike Activity Identification
KeCrypt tool
Malware Protection
Implement powerful an antivirus and an antimalware
software with on-access / real-time scanner checking
legitimacy of files.
Anti-malware programs
They provide real-time protection against
the installation of malware software
Scans all incoming network data for
malware and blocks any threat it comes
across - can be used solely for
detection and removal of installed
malware software.
Multi-factor Authentication
Supports another level of authorization in addition to the
initial login requirement, usually involving real-time
generation of a code.
Personal Firewalls
This program monitors all outgoing and incoming information between your device
and the internet and only familiar authorized connections are allowed.
A personal firewall will usually protect only the computer on which it is installed.
Spike Activity Identification
Trend analysis helps in this process, when an un-usual activity
occurs in an account, either a high amount or different location
or frequency
Accounts associated with a lot of high-risk behavior should be
on top list of banks investigation.
Encryption
Involves encoding
messages or information
in such a way that only
authorized parties can
read it when decoded.
The common encryption
standard adopted by
most browsers is called
Secure Socket Layer (SSL)
Is E-Banking Really Necessary?
H2: Savings interest rate, online banking, closing hour, waiting time, security
and confidentiality are the major parameters for selecting their bank.
E-Banking Security Tips to Protect Your Money

More Related Content

What's hot

E banking, internet banking and all services
E banking, internet banking and all servicesE banking, internet banking and all services
E banking, internet banking and all servicesJomy Mathew
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentationxabi951
 
Internet Banking
Internet BankingInternet Banking
Internet Bankingsnehateddy
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College ProjectSheril Daniel
 
E banking p pt sst nwc
E banking p pt sst nwcE banking p pt sst nwc
E banking p pt sst nwcsiya pillai
 
E- Banking Research Report
E- Banking Research Report E- Banking Research Report
E- Banking Research Report Anurag Singh
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment systempankhadi
 
Online banking ppt
Online banking pptOnline banking ppt
Online banking pptVishnu V S
 
Frauds & Scams in Banks
Frauds & Scams in BanksFrauds & Scams in Banks
Frauds & Scams in BanksAkshay Virkar
 
Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION   Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION jaldumanohar manohar
 
NR traditional banking vs e-banking.pptx
NR traditional banking vs e-banking.pptxNR traditional banking vs e-banking.pptx
NR traditional banking vs e-banking.pptxRameshkumar Nagaraj
 
CURRENT TREND IN INTERNET BANKING (SUBJECT -ENGINEERING ECONOMICS AND MANAG...
CURRENT TREND  IN INTERNET BANKING (SUBJECT -ENGINEERING  ECONOMICS AND MANAG...CURRENT TREND  IN INTERNET BANKING (SUBJECT -ENGINEERING  ECONOMICS AND MANAG...
CURRENT TREND IN INTERNET BANKING (SUBJECT -ENGINEERING ECONOMICS AND MANAG...Vraj Patel
 

What's hot (20)

E banking, internet banking and all services
E banking, internet banking and all servicesE banking, internet banking and all services
E banking, internet banking and all services
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Electronic banking presentation
Electronic banking presentationElectronic banking presentation
Electronic banking presentation
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Internet banking - College Project
Internet banking - College ProjectInternet banking - College Project
Internet banking - College Project
 
E banking
E bankingE banking
E banking
 
online banking
online bankingonline banking
online banking
 
Internet banking
Internet bankingInternet banking
Internet banking
 
E banking p pt sst nwc
E banking p pt sst nwcE banking p pt sst nwc
E banking p pt sst nwc
 
E- Banking Research Report
E- Banking Research Report E- Banking Research Report
E- Banking Research Report
 
E banking
E bankingE banking
E banking
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
E Banking
E BankingE Banking
E Banking
 
Online banking ppt
Online banking pptOnline banking ppt
Online banking ppt
 
Frauds & Scams in Banks
Frauds & Scams in BanksFrauds & Scams in Banks
Frauds & Scams in Banks
 
Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION   Internet banking PPT PRESENTATION
Internet banking PPT PRESENTATION
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
 
NR traditional banking vs e-banking.pptx
NR traditional banking vs e-banking.pptxNR traditional banking vs e-banking.pptx
NR traditional banking vs e-banking.pptx
 
CURRENT TREND IN INTERNET BANKING (SUBJECT -ENGINEERING ECONOMICS AND MANAG...
CURRENT TREND  IN INTERNET BANKING (SUBJECT -ENGINEERING  ECONOMICS AND MANAG...CURRENT TREND  IN INTERNET BANKING (SUBJECT -ENGINEERING  ECONOMICS AND MANAG...
CURRENT TREND IN INTERNET BANKING (SUBJECT -ENGINEERING ECONOMICS AND MANAG...
 

Similar to E-Banking Security Tips to Protect Your Money

Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Rajuchethu6391
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking sathyananda prabhu
 
Mobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceMobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceKumarrebal
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
E banking-10092118-phpapp02
E banking-10092118-phpapp02E banking-10092118-phpapp02
E banking-10092118-phpapp02saritabajaj54
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud DatasheetMani Rai
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Fusion Informatics
 
E banking-130826111407-phpapp01
E banking-130826111407-phpapp01E banking-130826111407-phpapp01
E banking-130826111407-phpapp01haris ali
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALASaikiran Panjala
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSafeDeposit
 
E-Banking (1).pptx
E-Banking (1).pptxE-Banking (1).pptx
E-Banking (1).pptxAbhay306393
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 

Similar to E-Banking Security Tips to Protect Your Money (20)

Internet Banking by Chethan Raju
Internet Banking by Chethan RajuInternet Banking by Chethan Raju
Internet Banking by Chethan Raju
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
 
Mobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceMobile banking issues in banking and insurance
Mobile banking issues in banking and insurance
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
E banking-10092118-phpapp02
E banking-10092118-phpapp02E banking-10092118-phpapp02
E banking-10092118-phpapp02
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
E banking-130826111407-phpapp01
E banking-130826111407-phpapp01E banking-130826111407-phpapp01
E banking-130826111407-phpapp01
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
E-Banking (1).pptx
E-Banking (1).pptxE-Banking (1).pptx
E-Banking (1).pptx
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
D0351022026
D0351022026D0351022026
D0351022026
 
E banking
E   bankingE   banking
E banking
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

E-Banking Security Tips to Protect Your Money

  • 1. E-Banking & Security Concern Syed Akhtar-uz-zaman (IFIC-010)
  • 2. • What is E-Banking ?? • Evaluation of E-Banking • Threats and preventive measures of  ATM  Mobile Banking  Online Banking Presentation Outline
  • 3. • on-line, real time banking E-Banking • the automated delivery of banking products and services directly to customers through electronic, interactive communication channels.
  • 4. • Traditional banking business assumes: – Customer desk at bank’s building – Office hours from 10.00 am to 6.00 pm Traditional banking
  • 5. • Solving time constraint Evaluation of E-Banking • Solving place constraint • Virtual banking(everything is possible)
  • 6. • “brick and mortar” institution (has a building and personal service representatives) • “brick and click” institution (physical structure + Internet bank services) • “virtual bank” (no public building – exists only online) Banking Option
  • 7. Internet Approach: Users directly log on to their bank website and complete all their work online. Approaches E-banking Dial-in Approach: Requires users to have a separate finance software, so that they can do all the process offline and connect to the bank just for transactions.
  • 8. E- Banking devices  Automated teller machines (ATMs)  Cellular and smart phones  Personal computers (PCs)
  • 9. Automated teller machines (ATMs) A machine that automatically provides cash and performs other banking services on insertion of a special card by the account holder.
  • 10. Functions of ATM 24-hour access to cash View Account Balances & Mini-statements Order a Cheque Book / Account Statement Transfer Funds between accounts Refill your Prepaid card Pay your utility bills Deposit cash or cheques
  • 11. Structure of ATM Card reader Keypad Speaker Display screen Receipt printer Cash dispenser
  • 12. ATM Threaths Attacks against ATMs may be classified as: ATM physical attacks ATM fraud
  • 13. Functions of ATM Safety Tips To Follow While Using an ATM
  • 14. Safety against physical attacks Debit card security Check your surroundings Limit your transaction time PIN number security Stay alert Notify loss of card
  • 15. ATM Skimming The act of using a skimmer to illegally collect data from the magnetic stripe of a credit, debit or ATM card. This information is copied onto another blank card's magnetic stripe The skimmer is an electronic device that scans a credit/debit card and stores the information contained in the magnetic stripe
  • 16. PIN capturing PIN capturing refers to a method of strategically attaching cameras and various other imaging devices to ATMs in order to fraudulently capture the ATM user’s PIN
  • 19. Mitigating risk-S1 Shield Your PIN Use your other hand to shield your fingers while you type in your PIN. Experts say taking this one simple step could practically eliminate ATM skimming. This is because if the hidden camera can’t capture your PIN, the mag stripe data captured by the skimmer is useless to the thief.
  • 20. Mitigating risk-S2 Examine an ATM carefully before inserting your card. While skimmers may be hard for the untrained eye to spot, they actually become pretty obvious if you’re on the lookout for them. They usually consist of an extra piece of plastic that sits atop the slot where you insert your ATM card. They’re usually attached to the ATM using two-sided tape, so if it looks suspicious, jiggle it a little — if it’s loose, it might be a skimmer. Check the ATM
  • 21. Mitigating risk-S3 Avoid Low Traffic Areas Don’t use ATMs in secluded, low-traffic areas. It takes a few minutes for thieves to install skimmers, so they usually choose ATMs in more secluded areas with less foot traffic so they’re less likely to be seen. If possible, try to only use ATMs in high-traffic areas like grocery stores, the mall or outside the bank itself.
  • 22. EMV Chip Card Technology "EMV® is a global standard for credit and debit payment cards based on chip card technology”. The standard covers the processing of credit and debit card payments using a card that contains a microprocessor chip.
  • 23. Mobile Banking Mobile banking or m-banking is a term used for performing banking activities on mobile phones and tablets. The earliest mobile banking services were offered over SMS.
  • 24. The future of banking
  • 25. ADVANTAGES OF M-BANKING Benefits for Banks Large customer coverage Reducing the costs of operations Promoting their services and products internationally Benefits for Small to Medium Businesses To run its operations more effectively Lower cost than traditional financial management mechanisms Benefits for Customers Convenience Cost Speed Competitiveness Communication Environmental
  • 27.
  • 29. Prime targets for attackers Data Identity Availability
  • 30. Types Of Mobile Frauds
  • 31. Cyber Attacks and Malware Top mobile attack methods are: Social engineering threats Malvertising Repacked, malicious apps on third party app stores
  • 32. The most common threats
  • 33. 7 mobile banking security tips
  • 34. Online banking Online banking is the performance of banking activities via the Internet. Online banking is also known as "Internet banking" or "Web banking." A good online bank will offer customers just about every service traditionally available through a local branch May 1995: Wells Fargo – the first bank in the world offer customer access to their accounts over the internet.
  • 35. The Benefits of Virtual Banking Online banking has plenty of perks. These include: Convenience Services Ease of monitoring Transfer services Available account balance & information at the touch of a button
  • 36. Advantage of virtual banking Electronic funds transfer Bill payments and wire transfers Loan application and repayments Deposit cash or cheques downloading bank statements viewing images of paid checques
  • 38. Phishing Electronic means of acquiring customers’ sensitive information by disguising as a very trustworthy entity.
  • 39. Phishing Fake e-mail or fake websites sent to customers, as if it’s from their banks that lead customer to a fake website.
  • 40. Pharming Pharming is a type of fraud that involves diverting the client Internet connection to a counterfeit website, so that even when the user enters the correct address into his browser, it ends up on the forged site
  • 41. Social Engineering Social Engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
  • 42. Malware A Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do The Malware family Computer Viruses Trojan Horses Internet Worms Scareware Adware Ransomware Keyloggers
  • 44. Banking fraud prevention tips Malware Protection Multi-factor Authentication Personal Firewalls Spike Activity Identification KeCrypt tool
  • 45. Malware Protection Implement powerful an antivirus and an antimalware software with on-access / real-time scanner checking legitimacy of files.
  • 46. Anti-malware programs They provide real-time protection against the installation of malware software Scans all incoming network data for malware and blocks any threat it comes across - can be used solely for detection and removal of installed malware software.
  • 47. Multi-factor Authentication Supports another level of authorization in addition to the initial login requirement, usually involving real-time generation of a code.
  • 48. Personal Firewalls This program monitors all outgoing and incoming information between your device and the internet and only familiar authorized connections are allowed. A personal firewall will usually protect only the computer on which it is installed.
  • 49. Spike Activity Identification Trend analysis helps in this process, when an un-usual activity occurs in an account, either a high amount or different location or frequency Accounts associated with a lot of high-risk behavior should be on top list of banks investigation.
  • 50. Encryption Involves encoding messages or information in such a way that only authorized parties can read it when decoded. The common encryption standard adopted by most browsers is called Secure Socket Layer (SSL)
  • 51. Is E-Banking Really Necessary? H2: Savings interest rate, online banking, closing hour, waiting time, security and confidentiality are the major parameters for selecting their bank.