270 likes | 285 Views
Explore the evolving threats and attacks in eBanking, including phishing, vishing, and cybercrime techniques. Learn about security controls like SSL, digital signatures, and multi-factor authentication for safeguarding online transactions. Discover the risks in mobile banking and strategies to mitigate SMS spoofing, SIM cloning, and fake applications. Delve into the security aspects of mobile banking, M-commerce, and EMV cards to understand the protection mechanisms against card frauds and ATM skimming. Uncover the challenges and solutions in securing online and offline banking transactions.
E N D
and Security AjitRegmi
Threats and Attacks- Internet Banking Stealing Credentials Phishing Vishing Clickjacking Crimeware. Any others?
Man in the Browser Attack Malware inside customer’s Web Browser
Security-Controls • Secured Socket Layer (SSL) • Protocol to secure data transmission over public network • Make use of Public and private key. • Digital certificate is installed in server – signed by CA. • Uses two methods to secure data • Authenticate the website • Encrypt the data transmitted.
SSL Is the website secured? Address bar: https instead of http
Basic Identification and Authentication • A simple user ID and password-based authentication scheme, and provides the following: • To identify which user is accessing the server • To limit users to accessing specific pages (identified as Universal Resource Locators, URLs
Identification and Authentication • Identification : UserID , AccNo etc. • Authentication: 3 Factors • Something a person knows (Knowledge) • PIN, Password, Secret Question? • Least expensive to implement • Can be stolen and use in unauthorized access. • Something a persons has (ownership) • Key, swipe card, badge, access card etc. • Items can be lost or stolen
Identification and Authentication • Authentication: 3Factors • Something a persons is (Characteristics) • Biometrics ( finger print, retinal scan etc.) • Expensive to implement. • Strong Authentication • Two factor authentication – requires two out of above three. • 2FA for User Authentication or Transaction authentication?
Mobile Banking • What you can do? • Query, Fund Transfer, Request • SMS Based • PIN + Mobile Number • Application based (Mobile Application OR SIM Based Application) • SMS or GPRS? • PIN + Application+ Mobile Number • WAP-Web Based • PIN + Mobile Number
SMS Banking Security Problem in GSM Operator Leased line GSM Operator Application Server Bank SMS Gateway GSM Network GSM Operator SMS DB Bank SMS DB Bank Host
Threats and Attacks- Mobile Banking • SMS Spoofing • SIM Cloning • Message Eavesdropping • Worms – Harvest Phone no and other information • Fake Applications Do you use android , iPhone or blackberry market?
Security in Mobile Banking M-Commerce ? End to end SMS encryption Digital Signature ??? Web based banking
EMV Card Online Mode PIN and card verified online Digitally Signed Card Offline Mode For small transaction PIN verified in card itself Yes Card Attack Europay, Mastercard and Visa CHIP based but still has magnetic stripe for backward compatibility Data is encrypted Virtually impossible to make counterfeit Card
Magnetic Stripe Card • No Encryption of data • Storage is very limited (79 alphanumeric plus 40 numeric characters total!) • Cards can be easily read and re-recorded, leading to easy counterfeiting . • CVV1, Expiry Date, Card Number etc. CVV2
Threats and Attacks- ATM and Cards Collecting Credentials • Skimming • POS Skimming • ATM Skimming • Dummy ATMs • Ghost ATMS • SMS Attack – Smishing • Raim Raid
Telephone Banking Voice Biometrics Adaptive Authentication • Services: • IVR vs. Manual • Query, Fund Transfer? • Credentials • Phone banking Password, Debit card number, • Date of birth, address, account number etc. • Stealingcredentials.