Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.

Slides:



Advertisements
Similar presentations
Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Advertisements

HTTPS Hypertext Transfer Protocol Secure Marcela López Hurtado.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
ON LINE BANKING ON LINE BANKING b You have the option of doing virtually all of your banking without leaving home 24 hours a day. b OB transforms your.
“Electronic Payment System”
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
1 Web Developer Foundations: Using XHTML Chapter 12 Key Concepts.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Securing Information Systems
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
3.3 Internet Services. Overview Demonstrate knowledge and understanding of the following internet services and describe the advantages and disadvantages.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 10B Doing Business in the Online World.
Being Ecommerce Sophon Thanasrivilai #100485
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Internet Security for Small & Medium Business Week 6
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
WIRELESS CONNECTIONS & E-COMMERCE. Presentation Credits “Introduction to Computers” by Peter Norton “Using Information Technology” by V. Rajaraman.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 9B Doing Business in the Online World.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
TAKE CHARGE OF YOUR FINANCES Submitted by- Ankita Pabale WRO ONLINE BANKING.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Electronic Banking & Security Electronic Banking & Security.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Securing Information Systems
Securing Information Systems
Setting and Upload Products
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Doing Business in the Online World
Virtual Private Networks (VPN)
How to Check if a site's connection is secure ?
McGraw-Hill Technology Education
12 E-Commerce Overview.
Internet.
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

Online Banking Security Magdalena Padyasek

Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks  Cyber-terrorism  Internet banking

Internet Banking  Paper-free transactions  Account balances, transfers, bill payment, statements  Fast and convenient

One-way Security  Secure Socket Layer (SSL)  Safeguarding Online Purchases  Feel secure  Encrypts data between the client and the server by making a direct connection  Client sends an encrypted key to the server  Server decrypts and returns to the client

SSL lock  Click the icon, or double-click (varies by browser), and examine the security information displayed about the web site.

Two-Way Security  Public Key Infrastructure (PKI)  Insures privacy for both online company and online bank customer  Enables users to securely exchange data and money through public network

Public Key Infrastructure  Encrypts and decrypts  Tamper detection  Authentification  Nonrepudation

Online banking  Digital signatures – ensures identity  Firewall – shield between the internal systems and the Internet  Virtual Private Network – allows authorized outside users to access company data

News…  Microsoft file 117 phishing lawsuits  Anti-Phishing Act of 2005

Conclusion  Security precautions  Understand security risk  Internet crimes are growing at an alarming rate “Consumers actually need to be responsible…they won’t leave their doors open when they leave the house.” - Lydia Parnes (director of the FTC’s Bureau of Consumer Protection)

Works Cited     security-faq.html     news