Online Banking Security Measures and Data Protection pdf pdf

  

Online Banking Security

Measures and Data Protection Shadi A. Aljawarneh Jordan University of Science and Technology, Jordan A volume in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series

  Published in the United States of America by

  IGI Global Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@igi-global.com Web site: http://www.igi-global.com

  Copyright © 2017 by IGI Global. All rights reserved. No part of this publication may be

reproduced, stored or distributed in any form or by any means, electronic or mechanical, including

photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the

names of the products or companies does not indicate a claim of ownership by IGI Global of the

trademark or registered trademark.

  Library of Congress Cataloging-in-Publication Data Names: Aljawarneh, Shadi, editor. Title: Online banking security measures and data protection / Shadi A. Aljawarneh, editor. Description: Hershey, PA : Information Science Reference, 2017. | Includes bibliographical references and index. Identifiers: LCCN 2016028381| ISBN 9781522508649 (hardcover) | ISBN 9781522508656 (ebook) Subjects: LCSH: Internet banking--Security measures. | Electronic funds transfers--Security measures. | Data protection. | Computer networks--Security measures. | Computer security. Classification: LCC HG1708.7 .O55 2017 | DDC 332.1/7028558--dc23 LC record available at https://lccn.loc.gov/2016028381

This book is published in the IGI Global book series Advances in Information Security, Privacy,

and Ethics (AISPE) (ISSN: 1948-9730; eISSN: 1948-9749) British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book is new, previously-unpublished material. The views expressed in

this book are those of the authors, but not necessarily of the publisher.

  Advances in Information Security, Privacy, and Ethics (AISPE)

  Book Series

  ISSN: 1948-9730 EISSN: 1948-9749 Mission

  As digital technologies become more pervasive in everyday life and the Internet is utilized in ever increasing ways by both private and public entities, concern over digital threats becomes more prevalent.

  The Advances in Information Security, Privacy, & Ethics (AISPE) Book Se- provides cutting-edge research on the protection and misuse of information and

  ries

  technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentica- tion, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students.

  Coverage

  IGI Global is currently accepting

  Network Security Services •

  manuscripts for publication within this

  Cookies •

  series. To submit a proposal for a volume in

  • Tracking Cookies this series, please contact our Acquisition

  Editors at Acquisitions@igi-global.com or

  Security Classifications • visit: http://www.igi-global.com/publish/.

  • Electronic Mail Security • Internet Governance Computer ethics • Access Control • Global Privacy Concerns • Information Security Standards •

  The Advances in Information Security, Privacy, and Ethics (AISPE) Book Series (ISSN 1948-9730) is

published by IGI Global, 701 E. Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This

series is composed of titles available for purchase individually; each title is edited to be contextually exclusive

from any other title within the series. For pricing and ordering information please visit http://www.igi-global.

com/book-series/advances-information-security-privacy-ethics/37157. Postmaster: Send all address changes to

above address. Copyright © 2017 IGI Global. All rights, including translation in other languages reserved by the

publisher. No part of this series may be reproduced or used in any form or by any means – graphics, electronic,

or mechanical, including photocopying, recording, taping, or information and retrieval systems – without written

permission from the publisher, except for non commercial, educational use, including classroom teaching purposes.

The views expressed in this series are those of the authors, but not necessarily of IGI Global.

  

Titles in this Series

For a list of additional titles in this series, please visit: www.igi-global.com

  

Developing Next-Generation Countermeasures for Homeland Security Threat Prevention

Maurice Dawson (University of Missouri-St. Louis, USA) Dakshina Ranjan Kisku (National

Institute of Technology, India) Phalguni Gupta (National Institute of Technical Teachers’

Training & Research, India) Jamuna Kanta Sing (Jadavpur University, India) and Weifeng

Li (Tsinghua University, China)

Information Science Reference • copyright 2017 • 428pp • H/C (ISBN: 9781522507031)

  • US $210.00 (our price)

  Security Solutions for Hyperconnectivity and the Internet of Things

Maurice Dawson (University of Missouri-St. Louis, USA) Mohamed Eltayeb (Colorado

Technical University, USA) and Marwan Omar (Saint Leo University, USA)

Information Science Reference • copyright 2017 • 347pp • H/C (ISBN: 9781522507413)

  • US $215.00 (our price)

  Managing Security Issues and the Hidden Dangers of Wearable Technologies

Andrew Marrington (Zayed University, UAE) Don Kerr (University of the Sunshine Coast,

Australia) and John Gammack (Zayed University, UAE)

Information Science Reference • copyright 2017 • 345pp • H/C (ISBN: 9781522510161)

  • US $200.00 (our price)

  Security Management in Mobile Cloud Computing Kashif Munir (University of Hafr Al-Batin, Saudi Arabia)

Information Science Reference • copyright 2017 • 248pp • H/C (ISBN: 9781522506027)

  • US $150.00 (our price)

  Cryptographic Solutions for Secure Online Banking and Commerce

Kannan Balasubramanian (Mepco Schlenk Engineering College, India) K. Mala (Mepco

Schlenk Engineering College, India) and M. Rajakani (Mepco Schlenk Engineering Col-

lege, India)

Information Science Reference • copyright 2016 • 375pp • H/C (ISBN: 9781522502739)

  • US $200.00 (our price)

  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Brij Gupta (National Institute of Technology Kurukshetra, India) Dharma P. Agrawal (Uni-

versity of Cincinnati, USA) and Shingo Yamaguchi (Yamaguchi University, Japan)

Information Science Reference • copyright 2016 • 589pp • H/C (ISBN: 9781522501053)

  • US $305.00 (our price)

  

701 E. Chocolate Ave., Hershey, PA 17033

Order online at www.igi-global.com or call 717-533-8845 x100

To place a standing order for titles released in this series,

contact: cust@igi-global.com

  

Mon-Fri 8:00 am - 5:00 pm (est) or fax 24 hours a day 717-533-8661 Associate Editors

  Rajkumar Buyya, University of Melbourne, Australia Anna Goy, Universita’ di Torino, Italy Ryan K. L. Ko, HP Labs Singapore, Singapore Maik A. Lindner, SAP Research, UK Shiyong Lu, Wayne State University, USA Yuzhong Sun, Chinese Academy of Science, China Ray Walshe, Irish Centre for Cloud Computing and Commerce, Ireland

  International Editorial Review Board

  Sanjay P. Ahuja, University of North Florida, USA Junaid Arshad, University of Leeds, UK Juan Caceres, Telefónica Investigación y Desarrollo, Spain Jeffrey Chang, London South Bank University, UK Kamal Dahbur, NYIT, Jordan Ravindra Dastikop, SDMCET, India Sam Goundar, Victoria University of Wellington, New Zealand & KYS International

  College, Melaka - Malaysia

  Sofyan Hayajneh, Isra University, Jordan Sayed Amir Hoseini, Iran Telecommunication Research Center, Iran Gregory Katsaros, National Technical University of Athens, Greece Mariam Kiran, University of Sheffield, UK Anirban Kundu, Kuang-Chi Institute of Advanced Technology, China Sarat Maharana, MVJ College of Engineering, Bangalore, India Manisha Malhorta, Maharishi Markandeshwar University, India Saurabh Mukherjee, Banasthali University, India Giovanna Petrone, Università degli Studi di Torino, Italy

  Nikolaos P. Preve, National Technical University of Athens, Greece Vanessa Ratten, Deakin University, Australia Jin Shao, Peking University, China Bassam Shargab, Isra University, Jordan Luis Miguel Vaquero Gonzalez, HP, Spain Chao Wang, Oak Ridge National Laboratory, USA Jiaan Zeng, Indiana University Bloomington, USA Yongqiang Zou, Tencent Corporation, China

  Table of Contents ; ;

  

Preface ..............................................................................................................xviii

; ;

Acknowledgment ............................................................................................xxvii

;

  Chapter 1 ; ;

  Online Banking and Finance .................................................................................. 1 ; ;

  Marta Vidal , Complutense University of Madrid, Spain

; ;

Javier Vidal-García , University of Valladolid, Spain ;

  Chapter 2 Internet Banking Usage Level of Bankers: A Research on Sampling of ; ;

  Turkey .................................................................................................................. 27 ; ;

  Ahu Coşkun Özer , Marmara University, Turkey ; ; Hayrünisa Gürel , Marmara University, Turkey ;

  Chapter 3 ; ;

  Internet Banking and Financial Customer Preferences in Turkey ....................... 40 ; ;

  İsmail Yıldırım , Hitit University, Turkey ;

  Chapter 4 Expectation and Perception of Internet Banking Service Quality of Select ; ;

  Indian Private and Public Sector Banks: A Comparative Case Study ................. 58 ; ;

  Nilanjan Ray , Netaji Mahavidyalaya, India ;

  Chapter 5 ; ;

  Towards Fully De-Materialized Check Management .......................................... 69 ; ;

  Fulvio Frati , Università degli Studi di Milano, Italy ; Ernesto Damiani , Information Security Research Center, Khalifa ; University, UAE ;

Claudio Santacesaria , Research & Development Department, Rototype

; S.p.A., Italy

  ;

  Chapter 6 Emerging Challenges, Security Issues, and Technologies in Online Banking ; ;

  Systems ................................................................................................................ 90 ;

  Shadi A Aljawarneh , Jordan University of Science and Technology, ; Jordan ;

  Chapter 7 The Influences of Privacy, Security, and Legal Concerns on Online Banking ; ;

  Adoption: A Conceptual Framework ................................................................. 113 ; ;

  

Khalid Alkhatib , Jordan University of Science and Technology, Jordan

; ; Ahmad Alaiad , Jordan University of Science and Technology, Jordan ;

  Chapter 8 ; ;

  Analysis of Data Validation Techniques for Online Banking Services ............. 127 ;

  Shadi A Aljawarneh , Jordan University of Science and Technology, ; Jordan ;

  Chapter 9 Anytime Anywhere Any-Amount Anybody to Anybody Real-Time Payment ; ;

  (5A-RTP): With High Level Banking Security ................................................. 140 ; ;

  Ranjit Biswas , Jamia Hamdard University, India ;

  Chapter 10 An Algorithm for Securing Hybrid Cloud Outsourced Data in the Banking ; ;

  Sector ................................................................................................................. 157 ; ;

  Abdullah Alhaj , The University of Jordan, Jordan ; Shadi A Aljawarneh , Jordan University of Science and Technology, ; Jordan ;

  Chapter 11 Prevention, Detection, and Recovery of CSRF Attack in Online Banking ; ;

  System ................................................................................................................ 172 ; ;

  Nitin Nagar , DAVV, India ; ; Ugrasen Suman , SCSIT, India ;

  Chapter 12 ; ;

  Ransomware: A Rising Threat of new age Digital Extortion ............................ 189 ; ;

  Akashdeep Bhardwaj , UPES Dehradun, India

  ;

  Chapter 13 ; ;

  Insider Threat in Banking Systems .................................................................... 222 ; ;

  Qussai Yaseen , Jordan University of Science and Technology, Jordan ;

  Chapter 14 Achieving Security to Overcome Attacks and Vulnerabilities in Mobile ; ;

  Banking Security ................................................................................................ 237 ; ;

  Balamurugan Balusamy , VIT University, India ; ; Malathi Velu , VIT University, India ; ; Saranya Nandagopal , VIT University, India ; ; Shirley Jothi Mano , VIT University, India ;

  Chapter 15 ; ;

  Credit Card Fraud: Behind the Scenes ............................................................... 263 ; ;

  Dan DeFilippi , Independent Researcher, USA ; ; Katina Michael , University of Wollongong, Australia ; ;

Compilation of References .............................................................................. 283

; ;

About the Contributors ................................................................................... 303

; ;

Index .................................................................................................................. 309

  Detailed Table of Contents ; ;

  

Preface ..............................................................................................................xviii

; ;

Acknowledgment ............................................................................................xxvii

;

  Chapter 1 ; ;

  Online Banking and Finance .................................................................................. 1 ; ;

  Marta Vidal , Complutense University of Madrid, Spain

; ;

Javier Vidal-García , University of Valladolid, Spain

  In recent years, online banking has become an alternative channel for most traditional entities. The increase in the number of users and rapid expansion has resulted in a successful strategy among financial institutions. This chapter discusses the use of technology in the finance industry and the various factors associated with it, as well as introducing the reader to the basic characteristics of online financial services. We review the current literature identifying the relevant research questions for our ; purpose. ;

  Chapter 2 Internet Banking Usage Level of Bankers: A Research on Sampling of ; ;

  Turkey .................................................................................................................. 27 ; ;

  Ahu Coşkun Özer , Marmara University, Turkey ; ; Hayrünisa Gürel , Marmara University, Turkey

  Banks provide service not only through branches in the countries but also offers banking services to customers over the internet. However, customers concern using internet banking because of the various troubles and adversities that may occur on the web and because of their habits. The using of internet banking is still not reached the desired level due to various reasons such as security, troubles on web and habits of customers. In this research, bankers using rate of internet banking and bankers approach on internet banking are determined. According to the survey results in Turkey, almost all of the bankers use internet banking but using of mobile applications does not appear to fully spread. Even though the using of internet banking is very common among the bankers, some of the participants said that they encountered some problems while using internet banking. Solutions of systemic deficiencies, password security problems and other security problems will increase the using of ; internet banking. ;

  Chapter 3 ; ;

  Internet Banking and Financial Customer Preferences in Turkey ....................... 40 ; ;

  İsmail Yıldırım , Hitit University, Turkey

  The first online banking service was introduced in Turkey by İş Bank in 1998. However, the number of internet users has been increasing rapidly in Turkey, the number of online banking users did not increase with a similar pace. Although banks are taking measures for the security of online banking transactions, many financial consumers are still concerned about the security of these transactions therefore preferring not to use online banking. This study reveals the development of internet banking in Turkey and consumer percentages. Previous research on the factors affecting the usage of e-banking are also addressed in this study. It was found that the majority of these studies focus on the correlation between the security concerns which result ; in avoiding to use internet banking. ;

  Chapter 4 Expectation and Perception of Internet Banking Service Quality of Select ; ;

  Indian Private and Public Sector Banks: A Comparative Case Study ................. 58 ; ;

  Nilanjan Ray , Netaji Mahavidyalaya, India

  This research paper mainly deals with expectation and perception of service quality of select Indian Banks i.e. SBI and HDFC on the customer satisfaction. The research survey was based on IS-QUAL dimensions (Ray & Ghosh,2014) a diagnostic model developed in 2014, which measures service quality and internet service quality in terms of customer expectations and perceptions of banking services. This present research tends to evaluate the overall idea of expected and perceived services of the two banks. This study is a cross-sectional survey that employed the use of pre- structured questionnaire to collect primary data from a sample of 120 respondents through personal contact, field survey and email. Collected data have been analyzed through SPSS 21 software by different statistical tools like Reliability test for judgment ; of internal consistency of collected data and paired t- test. ;

  Chapter 5 ; ;

  Towards Fully De-Materialized Check Management .......................................... 69 ; ;

  Fulvio Frati , Università degli Studi di Milano, Italy ; Ernesto Damiani , Information Security Research Center, Khalifa ; University, UAE ;

Claudio Santacesaria , Research & Development Department, Rototype

  ; S.p.A., Italy

  Banks worldwide are putting a big effort into de-materializing their processes, in order to streamline the processes and thus reducing overall costs. In this chapter, the authors describe how the de-materialization can be a big opportunity for banks, describing the European context. Furthermore, the de-materialization of check handling is taken as example, proposing a review of existing technologies and describing the advantages that a real framework can give to the users and to the ; bank systems. ;

  Chapter 6 Emerging Challenges, Security Issues, and Technologies in Online Banking ; ;

  Systems ................................................................................................................ 90 ;

  Shadi A Aljawarneh , Jordan University of Science and Technology, ; Jordan

  Online banking security is a critical issue over request-response model. But the traditional protection mechanisms are not sufficient to secure the online banking systems that hold information about clients, and banks. The infrastructure of networks, routers, domain name servers, and switches that glue these online banking systems together could be fail, and as a result, online banking systems will no longer be able to communicate accurately or reliably. A number of critical questions arise, such as what exactly the infrastructure is, what threats it must be secured against, and how protection can be provided on a cost-effective basis. But underlying all these questions is how to define secure online banking systems. In this chapter, emerging challenges, security issues and technologies in Online Banking Systems will be ; analyzed and discussed systematically. ;

  Chapter 7 The Influences of Privacy, Security, and Legal Concerns on Online Banking ; ;

  Adoption: A Conceptual Framework ................................................................. 113 ; ;

  

Khalid Alkhatib , Jordan University of Science and Technology, Jordan

; ; Ahmad Alaiad , Jordan University of Science and Technology, Jordan

  Business globalization and the rising new technology enforced traditional banking to head towards online banking services, which facilitates customers to obtain access to their accounts from their business sites and personal computers to online banking services. The objective of this chapter is to construct a framework of adoption of online banking and represent the major influences of privacy, security, and legal concerns on online banking adoption. Furthermore, the chapter reveals the main challenges in the development of online banking system. The adoption of online banking can decrease the operating expenses and offer good and rapid services to their customers. The framework factors have been classified as facilitators and barriers of adoption of online banking. Performance expectancy, effort expectancy and social influence have been classified as facilitators whereas security concerns, privacy concerns and legal concerns have been classified as barriers. The results revealed various significant suggestions for online banking service providers, ; designers and developers. ;

  Chapter 8 ; ;

  Analysis of Data Validation Techniques for Online Banking Services ............. 127 ;

  Shadi A Aljawarneh , Jordan University of Science and Technology, ; Jordan

  The insufficient preparation for the information and communication technologies revolution led to few offering online transaction platforms, information security features, and credit facilities. One of the security concerns is a lack of data validation. Data that is not validated or not properly validated is the main issue for serious security vulnerabilities affecting online banking applications. In this chapter, the influences of security issues on world banks will be discussed. A number of data validation methods will be also reviewed to date to provide a systematic summary to banking environment. Based on the advantages and disadvantages of each method, the IT developer will decide which is best suited to develop the systematic online banking application. From this analysis, a global view of the current and future tendencies of data validation will be obtained and therefore provision of possible recommendations ; for solving the security and privacy issues for the online banking services. ;

  Chapter 9 Anytime Anywhere Any-Amount Anybody to Anybody Real-Time Payment ; ;

  (5A-RTP): With High Level Banking Security ................................................. 140 ; ;

  Ranjit Biswas , Jamia Hamdard University, India

  This chapter introduces about a Proposal to any bank of any country for fast but secured transfer of money anytime anywhere any-amount by anybody to anybody on the spot with confirmation from the payee on the spot. The work here is on a new method of real time payment system, which is highly secured and fast, and 100% technology-based without any paper format or paper work of the bank. This breaking scheme is entitled as “5A-RTP scheme” where ‘5A’ stands for Anytime Anywhere Any-amount Anybody to Anybody and ‘RTP’ stands for Real-Time Payment. There is no paper-work at all. It is completely secured, realization of payment (debit + credit) happens immediately very fast, without any man-hour or manpower of the bank. It is claimed that 5A-RTP scheme, if incorporated in all the banks in any country, will give the country a huge momentum of customers’ satisfaction, huge momentum in country’s growth and economic progress. The revolutionary breakthrough in 5A-RTP scheme is that it dominates each of the existing banking instruments and facilities like Cheque, Pay-order, Draft, ATM machine, Credit Card, Debit Card, Internet Banking, Mobile Banking, Traveller’s Cheque, etc. The 5A-RTP scheme may even slowly cause a natural death of the existing Cheque and Draft facilities from the country because of its huge application potential, in particular in vast countries like ; China, India, Brazil, USA, UK, etc. ;

  Chapter 10 An Algorithm for Securing Hybrid Cloud Outsourced Data in the Banking ; ;

  Sector ................................................................................................................. 157 ; ;

  Abdullah Alhaj , The University of Jordan, Jordan ; Shadi A Aljawarneh , Jordan University of Science and Technology, ; Jordan

  The Cloud has become a significant topic in the banking computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the banking data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication banking networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this chapter the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service for the banking sector. Their developed SDTM enhanced with Malicious Packets ; Detection System (MPDS) which is a set of technologies and solutions. ;

  Chapter 11 Prevention, Detection, and Recovery of CSRF Attack in Online Banking ; ;

  System ................................................................................................................ 172 ; ;

  Nitin Nagar , DAVV, India ; ; Ugrasen Suman , SCSIT, India Online banking system has created an enormous impact on IT, Individuals, and networking worlds. Online banking systems and its exclusive architecture have numerous features and advantages over traditional banking system. However, these new uniqueness create new vulnerabilities and attacks on an online banking system. Cross-site scripting request forgery or XSS attack is among the top vulnerabilities, according to recent studies. This exposure occurs, when a user uses the input from an online banking application without properly looking into them which allows an attacker to execute malicious scripts into the application. Current approaches use to mitigate this problem, especially on effective detection of XSS vulnerabilities in the application or prevention of real-time XSS attacks. To address this problem, the survey of different vulnerability attacks on online banking system performed and also presents a concept for the prevention, detection, removal and recovery of ; XSS vulnerabilities to secure the banking application. ;

  Chapter 12 ; ;

  Ransomware: A Rising Threat of new age Digital Extortion ............................ 189 ; ;

  Akashdeep Bhardwaj , UPES Dehradun, India

  Compared to the last five to six years, the massive scale by which innocent users are being subjected to a new age threat in form of digital extortion has never been seen before. With the rise of Internet, use of personal computers and devices has mushroomed to immense scale, with cyber criminals subjecting innocent users to extortion using malware. The primary victim to be hit the most has been online banking, impacting the security and reputation of banking and financial transactions along with social interactions. Online security revolves around three critical aspects

  • – starting with the use of digital data and files, next with the use of computer systems and finally the internet as an unsecure medium. This is where Ransomware has become one of the most malicious form of malware for digital extortion threats to ; home and corporate user alike. ;

  Chapter 13 ; ;

  Insider Threat in Banking Systems .................................................................... 222 ; ;

  Qussai Yaseen , Jordan University of Science and Technology, Jordan

  Insider threat poses huge loss to organizations since malicious insiders have enough knowledge to attack high sensitive information. Moreover, preventing and detecting insider attacks is a hard job because malicious insiders follow legal paths to launch attacks. This threat leads all kinds of attacks in banking systems in the amount of loss it causes. Insider threat in banking systems poses huge harm to banks due to the importance and attractiveness of assets that banks have. This chapter discusses insider threat problem in banking sector, and introduces important surveys and case studies that show the severeness of this threat in this sector. Moreover, the chapter demonstrates some policies, technologies and tools that may prevent and detect ; insider threat in banking systems. ;

  Chapter 14 Achieving Security to Overcome Attacks and Vulnerabilities in Mobile ; ;

  Banking Security ................................................................................................ 237 ; ;

  Balamurugan Balusamy , VIT University, India ; ; Malathi Velu , VIT University, India ; ; Saranya Nandagopal , VIT University, India ; ; Shirley Jothi Mano , VIT University, India

  Mobile Banking is a means of connectivity between bank and its customers. It would be impractical to expect customers to regularly visit banks or connect to a web site for regular upgrade of their mobile banking application. Mobile Banking is a provision and availability of both banking and financial services with the help of mobile telecommunication devices as an Application. It would be expected that the mobile application itself check the upgrades and updates and download necessary patches. Mobile banking has brought the advantage to have an alternate to debit and credit card usage. Mobile banking has the below three inter-related concepts: Mobile accounting, Mobile brokerage, Mobile financial information services. Mobile banking services are Account information provision, Monetary Transaction, Investment facilitation, Support and Content services. The threats involved in Mobile Banking are categorized as, Threats against end user and end user device, Threats against communication network, Threats against remote banking service. The impact of ; various threats is discussed below. ;

  Chapter 15 ; ;

  Credit Card Fraud: Behind the Scenes ............................................................... 263 ; ;

  Dan DeFilippi , Independent Researcher, USA ; ; Katina Michael , University of Wollongong, Australia

  This chapter provides a single person case study of Mr. Dan DeFilippi who was arrested for credit card fraud by the US Secret Service in December 2004. The chapter delves into the psychology of a cybercriminal and the inner workings of credit card fraud. A background context of credit card fraud is presented to frame the primary interview. A section on the identification of issues and controversies with respect to carding is then given. Finally, recommendations are made by the convicted cybercriminal turned key informant on how to decrease the rising incidence of cybercrime. A major finding is that credit card fraud is all too easy to enact and merchants need to conduct better staff training to catch fraudsters early. With increases in global online purchasing, international carding networks are proliferating, making it difficult for law enforcement agencies to be “policing” unauthorized transactions. Big data may ; well have a role to play in analyzing behaviors that expose cybercrime. ; ;

  Compilation of References ; .............................................................................. 283 ;

About the Contributors ................................................................................... 303

; ;

Index .................................................................................................................. 309

  Preface

Do not worry about your difficulties in Mathematics. I can assure you mine are still

greater. – Albert Einstein

  The corresponding book publication summarizes the recent research papers on online banking security techniques, approaches and technologies and Case studies entitled, “Online Banking Security Measures and Data Protection.” This compre- hensive and timely publication aims to be an essential reference source, building on the available literature in the field of e-banking security while providing for further research opportunities in this dynamic field. It is hoped that this text will provide the resources necessary for policy makers, technology developers and managers to adopt and implement security techniques and technologies in developing banks across the globe.

  This book summarizes some current trends in the online banking security such as online banking security services, data protection techniques, applications and technologies, and explores one key area of growth: Online Banking. To illustrate the role of Applications and Services in the growth of online banking industries, a number of examples focusing on the learning, government, industry and security are used. Recommendations for future areas are presented.

  This book is intended for researchers and practitioners who are interested in is- sues that arise from using technologies of online banking security advancements. In addition, this book is also targeted to anyone who wants to learn more about the online banking security measures and data protection research advancements in design and applications. For example, policy makers, academicians, researchers, advanced-level students, technology developers, bank officers and government officials will find this text useful in furthering their research exposure to pertinent topics in e-banking security and assisting in furthering their own research efforts in this field. Online banking security has become a hot topic in recent years and people at different levels in any organization need to understand online banking in different ways and different perspectives.

BOOK DESCRIPTION, MISSION, AND OBJECTIVES

  Although the e-banking field has been found Information Systems literature since the mid-1990s, there is still a lack of advanced research into banking security adoption and associated organizational issues. In addition, there is a shortage in case studies surveying the real experience of firms and organizations in deploying e-banking security. As e-banking is an IT product for development and evolution, this sort of gap in the advanced research makes some sensitive issues and challenges for bank- ing sector, particularly these that currently develop e-banking security because the weaknesses and actual limitations in subject to this field normally mean difficulties in planning and developing e-banking security measures and controls.

  The use of the Internet as a main distribution channel raises the necessity of se- curing e-banking since it becomes a vital issue to the environment and could make organizations more vulnerable to system attacks and threats. Although there are several techniques and methods to security as a whole whose value is evident – there is an expectation that security can be more efficiently managed if the concentration goes beyond technical-oriented solutions.

  E-banking can not only offer various benefits to customers in terms of ease and cost of transactions, but it also poses new challenges for banks in supervising their financial systems and in designing and implementing necessary security measures and controls. Therefore, understanding security communication in e-banking issues is important for senior management because it would assist them enhance their approach to e-banking security. This edited book addresses this issue by reporting exploratory case studies about developing and implementing security in e-banking. Particularly, this edited book of advanced research aims to explore how e-banking security measures and controls takes place within the bank, what are the standards and procedures that play an important role to the success of e-banking security and what key lessons come out of their experience which could be generalized.

  This book also looks to discuss and address the difficulties and challenges that banks have faced in implementing security techniques, technologies and applications. The editor will seek chapters that address different aspects of e-banking adoption, ranging from Phishing of Banking Information, Pharming of Banking Websites, Adaptive Authentication in Banking, “Watering Hole” Attacks, Malware-Based Attacks, Zeus Trojan, Mobile Banking Security, Identity Theft, and Related Topics.

  This book focuses on advanced research in the practical applications and the theoretical foundations of online banking security, through presentation of the most up-to-date advances and new directions of research in the field from various scholarly, professional, and practitioner perspectives. An interdisciplinary look at online banking, including engineering and business aspects, such book covers and encourages high-quality research exposition on such topics as virtualization tech- nologies for online banking, online banking security utilities, real case studies on online banking security vulnerabilities as well as data protection techniques, and business perspectives for online banking security.

  The main mission of this book is to be the premier and authoritative source for the most innovative scholarly and professional research and information pertain- ing to aspects of online banking security measures and data protection. Such book presents advancements in the state-of-the-art, standards, and practices of online banking security, in an effort to identify emerging trends that will ultimately define the future of “the Cloud of Online Banking” and “the Gog of Online Banking”. The main topics are discussed through original papers, review papers, technical reports, case studies, and conference reports for reference use by academics and practitioners alike.

  This book is intended to reflect new directions of research and report latest advances. It is a platform for rapid dissemination of high quality research / applica- tion / work-in-progress articles on Online Banking Security solutions for managing challenges and problems within the highlighted scope.

  The objectives of this book are multi-folds, including:

1. Establish a significant channel of communication among Online Banking

  Security researchers, engineers, practitioners and IT policy makers;

  2. Provide a space to publish and share the latest high quality research results in the area of Online Banking Security;

  3. Promote and coordinate international collaboration in the standards of Cloud and Fog Computing of Online Banking to meet the need to broaden the ap- plicability and scope of the current and future research of Online Banking Security.

  Topics to be discussed in this book include the following: Techniques, technologies, and services • Applications •

  • Architecture Standards • Management • Cloud and Fog engineering • Business • Security Vulnerabilities and threats •

WHAT THIS BOOK COVERS

  In this book, we will present the current state of online banking security research advancements on design, and applications. So that we will summarize each advanced research, its influence in the science of online banking security measures and data protections as follows:

  Chapter 1: Online Banking and Finance In recent years, online banking has become an alternative channel for most traditional

  entities. The increase in the number of users and rapid expansion has resulted in a successful strategy among financial institutions. This chapter discusses the use of technology in the finance industry and the various factors associated with it, as well as introducing the reader to the basic characteristics of online financial services. We review the current literature identifying the relevant research questions for our purpose.

  Chapter 2: Internet Banking Usage Level of Bankers: A Research on Sampling of Turkey Banks provide service not only through branches in the countries but also offer

  banking services to customers over the internet. However, customers concern us- ing internet banking because of the various troubles and adversities that may occur on the web and because of their habits. The using of internet banking is still not reached the desired level due to various reasons such as security, troubles on web and habits of customers. In this research, bankers using rate of internet banking and bankers approach on internet banking are determined. According to the survey results in Turkey, almost all of the bankers use internet banking but using of mo- bile applications does not appear to fully spread. Even though the using of internet banking is very common among the bankers, some of the participants said that they encountered some problems while using internet banking. Solutions of systemic deficiencies, password security problems and other security problems will increase the using of internet banking.

  Chapter 3: Internet Banking and Financial Customer Preferences in Turkey The first online banking service was introduced in Turkey by İş Bank in 1998. However, the number of internet users has been increasing rapidly in Turkey, the