Journal of Internet Banking and Commerce
An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, August 2011, vol. 16, no.2 (http://www.arraydev.com/commerce/jibc/)
E-Banking Security Issues – Is There A Solution in Biometrics?
Amtul Fatima Scholar, Jawaharlal University of Technological studies, A.P., India Postal Address: Tallakunta, Chandrayangutta x-road, Hyderabad -500 005,A.P., India Email: firstname.lastname@example.org
ABSTRACT The providers of Internet banking services must be more responsive towards security requirements. While there is no doubt that Internet banking transaction should have layered protection against security threats, the providers should approach security considerations as part of their service offerings. Biometric based authentication and identification systems are the new solutions to address the issues of security and privacy. Using biometrics for identification restrict individuals from access to physical spaces and electronic services An effective authentication method should have customer acceptance, reliable performance, scalability to accommodate growth, and interoperability with existing systems and future plans. In this study, the security threats in Internet banking, its solutions in biometrics and its acceptance in the consumer market are studied using descriptive and exploratory research. The methods of descriptive research are used to obtain information concerning the major security issues in e-Banking. The research had been completed on the basis of secondary data (online databases, scientific journals, surveys, news). Keywords: Biometrics, e-banking, electronic banking, e-security, secure transactions, security threats, Identity thefts © Amtul Fatima, 2011
JIBC August 2011, Vol. 16, No.2 INTRODUCTION
Banking organisations have been delivering services to consumers and businesses remotely for years. Electronic funds transfer, including small payments and corporate cash management systems, as well as publicly accessible machines for currency withdrawal and retail account management are global fixtures. However, delivering financial services over public networks such as the Internet is bringing about a fundamental shift in the financial services industry. According to Heikki et al. (2002), the transformation from the traditional banking towards e-banking has been a ‘leap’ change. The increase in information access terminals along with the growing use of information sensitive applications such as e-commerce, e-learning, ebanking and e-healthcare have generated a real requirement of reliable, easy to use, and generally acceptable control methods for confidential and vital information. On the other hand, the necessity for privacy must be balanced with security requirements for the advantage of the general public. Payment systems are undergoing radical changes stirred largely by technical advancement such as distributed network technology, real-time processing and online consumers’ inclination to use e-banking interfaces making the study of biometrics even more important in this new E-World. Financial institutions offering Internet-based products and services to their customers should use effective methods to authenticate the identity of customers using those products and services. An accurate automatic personal identification is critical to a wide range of application domains. Traditional personal identification methods (e.g., passwords, PIN) suffer from a number of drawbacks and are unable to satisfy the security requirement of our highly inter-connected information society. Biometrics refers to automatic identification of an individual based on her physiological or behavioral traits. While biometrics is not an identification panacea, it is beginning to provide very powerful tools for the problems requiring positive identification. e-BANKING – THE PRESENT SCENARIO: In August of 1995, Citibank had...
References: 1. Electronic Banking Risk Management Issues for Bank Supervisors; Electronic
Banking Group White Paper; Oct 2000; Retrieved from http://www.bis.org/publ/bcbs76.pdf (Accessed on Dec 2010) 2. Sharma, K.; Singh, AJ, Biometric Security in the E World. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering. Nemati, 2010; pp 289-337. 3. Authentication in an Internet Banking Environment; Federal Financial Institutions Examination Council (FFIEC); Retrieved from http://www.ffiec.gov/ffiecinfobase/resources/retail/ffiauthentication_guidance.pdf (Accessed on Dec 2010) 4. Jain A, Hong L, Pankanti S; Biometrics: Promising frontiers for emerging identification market; Feb 2000; Retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=?doi=10.1.1.10.5497 (Accessed on Dec 2010) 5. Yang Y.J.; The Security of Electronic Banking. Proc. Nat. I International Systems Security Conference. National Computer Security Center. 1997; pp. 41-52. 6. Fire Alarm Company Burned by e-Banking Fraud; Retrieved from http://krebsonsecurity.com/2010/04/fire-alarm-company-burned-by-e-bankingfraud/ (Accessed on Dec 2010) 7. Arrests made over Internet banking fraud; Internet Business News, Aug 2000; Retrieved from http://www.allbusiness.com/finance/615165-1.html (Accessed on Dec 2010) 8. Internet World Stats - Usage and Population Statistics; Retrieved from http://www.internetworldstats.com/stats3.htm (Accessed on Dec 2010) 9. APWG ; Retrieved from http://www.antiphishing.org/ (Accessed on Dec 2010) 10. Vrancianu M.; Popa LA; Considerations Regarding the Security and Protection of E-Banking Services Consumers’ Interests; The Amfiteatru Economic Journal. Jun 2010; 12(28): pp388-403 11. Jamil ZU; Cyberlaw towards a new philosophy of Regulation; Retrieved from http://jamilandjamil.com/wp-content/uploads/2010/11/cyberlaw_supreme_cou rt_v10edit.pdf (accessed on Dec 2010) 12. Dias D, McKee K; Protecting Branchless Banking Consumers: Policy Objectives and Regulatory Options; CGAP Focus Notes; Sep 2010 Retrieved from http://www.cgap.org/gm/document-1.9.47443/FN_64_Rev.pdf Accessed on Dec 2010 13. Legal Framework for Electronic Banking; Retrieved from http://www.rbi.org.in/Scripts/PublicationReportDetails.aspx?UrlPage=&ID=28 (Accessed on Dec 2010) 14. Candid Wüeest; Threats to Online Banking; White Paper: Symantec Security Response; Retrieved from http://www.symantec.com/avcenter/reference/threats.to.online.banking.pdf (Accessed on Dec 2010)
JIBC August 2011, Vol. 16, No.2
15. Zin ANM, Yunos Z; How To Make Online Banking Secure; The Star InTech;
April 2005. Retrieved from http://www.crimeresearch.org/analytics/online_banking/ (accessed on Jan 2011) 16. Bielski L.; Striving to Create a Safe Haven Online: ID Theft, Worms, Bugs, and Virtual Eavesdropping Banks Cope with Escalating Threat; ABA Banking Journal, May 2003; 95 17. Khan B.; Khan MK.; Alghathbar KS, Biometrics and identity management for homeland security applications in Saudi Arabia; African Journal of Business Management, Nov 2010, Vol. 4(15): pp. 3296-3306. 18. Whelan S.; Biometrics Technology; CGAP IT Innovation Series; Retrieved from http://www.ruralfinance.org/cds_upload/1126265263594_Biometrics_technology .pdf (Accessed on Dec 2010) 19. Ratha NK, Chikkerur S, Connell JH, Bolle RM; Generating Cancelable Fingerprint Templates, IEEE Transaction on Pattern, Analysis and Machine Intelligence, Apr 2007; 29(4), pp. 561-572. 20. Liu S.; Silverman M.; A practical guide to biometric security technology, IT Professional, Jan/Feb 2001; 3(1), pp 27 – 32 21. Spence B.; Biometrics In Physical Access Control Issues, Status and Trends; Retrieved from http://www.edsales.com.au/pdfs/biom_PhysicalAccess%20Control.pdf (Accessed on Jan 2010) 22. Alter S.; The work system method for understanding information systems and information system research Communications of the Association for Information Systems (Volume 9, 2002) 90-104
Please join StudyMode to read the full document