Details

Authentication and Security Measures in Internet Banking: Employability of Alternate Approaches Enhance the Detection and Adopt Countermeasures to Curb Data Breaches

Gatik Gola

Student, King’s College, Taunton, UK

101-113

Vol: 8, Issue: 2, 2018

Receiving Date: 2018-03-05 Acceptance Date:

2018-05-08

Publication Date:

2018-05-29

Download PDF

Abstract

Cloud computing is a popular theme of research in information systems. It has revolutionized the perspective of distributed computing from existing methods. This process is prone to security threats to the information and data which is currently moved from on-premises to off-premises, even though cloud computing is beneficial. Due to the openness of data, cloud computing has been experiencing security threats that must be overcome for this service to be fully utilized. One such threat is data breach, this is because data is stored in different places across the globe hence difficult for security to be monitored. Therefore, security and privacy of data are the two major concerns of users in the cloud technology. Internet banking applications have become popular within banks and almost each bank has got its own service. The login and signature security depend on the user/static password authentication method to certificates and tokens. Considering the confidentiality of this information, for instance passwords and bank accounts, banks need to identify, evaluate and solve distinct risks to security in regard to cloud computing in their management information security system. This paper sought to establish the available security measures employed in curbing data breaches, their shortcomings and suggest possible solutions. The paper employed a descriptive survey research design; a pre-tested questionnaire was used to collect data from the 46 banks that use internet banking in Kenya. The study found that the banks had employees who were certified in security matters but none was certified in cloud computing security and recommended Staff Training and certification on Cloud Computing Security, cloud computing and resource management

Keywords: Curbing; Cloud computing; Cloud security; internet banking; data breaches

References

  1. Bhadauria, R., &Sanyal, S. (2012). Survey on Security Issues in Cloud Computing Associated Mitigation Techniques. International Journal of Computer Applications, IJCA, 47-66
  2. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Dahal, Sanyal. (2012). Security Architecture for Cloud Computing Platform.
  4. TechTarget's IT Encyclopaedia. (n.d). What is DataBreach?-Definition from Whatls.com. Retrieved fromhttp://searchsecurity.techtarget.com/definition/data-breach
  5. Orion Blog. (2015). Most Common Causes of DataBreaches. Retrieved March 17, 2016 from. Retrievedfrom http://www.oriontech.com/most-common-causes-of-data-breaches/
  6. Suresh, S., Huang, H., & Kim, H. J. (2015). Scheduling in compute cloud with multiple data banks using divisible load paradigm. Aerospace and ElectronicSystems, IEEE Transactions on, 1288-1296.
  7. Islam, M., Islam, K., & Beg, N. (2015). Paradigm shift towards cloud computing for Banking sector. 2015International Conference on Computer and Information Engineering (ICCIE), (pp. 126-129). Rajshahi: IEEE.
  8. Goldsmith, J. (2011, 05 23). Barclays partners with IBMfor private cloud project. Retrieved from CIO:http://www.cio.co.uk/insight/it-strategy/barclays-partners-with-ibm-for-private-cloud-project-3431613/
  9. Finnegan, m. (2015, November 17). Computer WorldUK. Retrieved from How Tesco Bank moved to AWS cloud in eight months: http://www.computerworlduk.com/cloud-computing/how-tesco-bank-has-adopted-aws-cloud-as-business-as-usual-in-eight-months-3629767/
  10. Gordon, W. (2012, June 20). how your passwords are stored on the internet and when your password stregthdoesnt matter.
  11. Kessler, G. C. (2007). Passwords — Stregths and Weaknesses. Internet and Internetworking Security.
  12. Ben Soh, A. J. (2003). A novel Web security evaluation model for a one-time-password system. Web Intelligence,2003. WI 2003. Proceedings. IEEE/WIC International Conference on, (pp. 413-416). Halifax, NS, Canada.
  13. uiyi, L., &Yuegong, Z. (2013). An improved one-time password authentication scheme. CommunicationTechnology (ICCT), 2013 15th IEEE International Conference on (pp. 1-5). Guilin: IEEE.
  14. Lamport, L. (1981). Password Authentication with Insecure Communication', In: Comm. ACM, .Communication and Security, 770-772.
  15. Shang, T., &Gui, L. Y. (2015). Identification and prevention of impersonation attack based on a new flag byte. 2015 4th International Conference on ComputerScience and Network Technology (ICCSNT) (pp. 972-976). Harbin, China: IEEE.
  16. Bond, M. (2012, 09 10). Chip and Skim: cloning EMVcards with the pre-play attack. Retrieved from Light Blue Touch Paper: https://www.lightbluetouchpaper.org/2012/09/10/chip-and-skim-cloning-emv-cards-with-the-pre-play-attack/
  17. Kautsar, S., Akbar, S., &Azizah, F. N. (2014). An application framework for evaluating methods in biometrics systems. Data and Software Engineering(ICODSE), 2014 International Conference (pp. 1-6).Bandung: IEEE.
  18. Maty´aˇs, V., & ˇR´ıha, Z. (n.d). Biometric Authetication, Security and Userbility.
  19. Defence, D. o. (2005). Trusted Computer System Evaluation Criteria.
  20. Nasirinejad, M., &Alireza, A. Y. (2012). SASy Username and Password Management. Proceedings 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012, 242-246.
  21. Raymond. (2014). 5 Virtual Keyboards Tested toDetermine their Effectiveness Against Keyloggers. Retrieved from Raymond cc. Computers Made Easy: https://www.raymond.cc/blog/how-to-beat-keyloggers-to-protect-your-identity/
  22. Cryptzone. Cryptzone. http://www.cryptzone.com, February 2018.
  23. Schmidt, M., Fahl, S., Schwarzkopf, R., &Freisleben, B. (2011). TrustBox : A Security Architecture for Preventing Data Breaches. https://doi.org/10.1109/PDP.2011.44
  24. Kumar, A., Lee, B.G., & Lee, H.(2012). Secure Storage and Access of Data in Cloud Computing, 336-339.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.

alexistogel toto online

bandar alexistogel

alexistogel bandar gacor

alexistogel link

alexistogel online

alexistogel bandar togel

link alternatif alexistogel

alexistogel

alexistogel

alexistogel

alexistogel daftar

alexistogel toto macau

alexistogel bandar macau

alexistogel slot

alexistogel agen slot

situs alexistogel

alexistogel

alexistogel

alexistogel

alexistogel

alexistogel bandar slot

alexistogel

Alexistogel Toto Macau

bandar alexistogel

slot alexistogel

alexistogel bandar togel

alexistogel

alexistogel slot

alexistogel

daftar alexistogel

alexistogel online

rtp alexistogel

alexistogel slot

alexistogel gacor

link alternatif alexistogel

alexistogel login

alexistogel

alexistogel slot dana

agen togel online

bandar togel online

alexistogel rtp

alexistogel slot

alexistogel daftar

slot online dana

situs slot online

alexistogel

bandar togel online

slot online terpercaya

togel slot online

agen slot online gacor

rtp live slot online

bandar slot online

bandar slot online gacor

agen slot online

daftar bandar togel slot

bandar togel online

togel slot hari ini

link alternatif togel slot

rtp slot online gacor

slot online gacor

alexistogel terpercaya

rtp slot gacor

tips slot maxwin

togel slot gacor

prediksi togel

game slot gacor

trik slot online

prediksi togel jitu

daftar togel slot online

slot online gacor

trik slot bonus

prediksi togel

RTP LIVE

Bandar Toto Macau

Situs Slot Gacor

bandarbola855 resmi

bandarbola855 gacor

bandarbola855 slot

link bandarbola855

bandarbola855 rtp

bandarbola855 link

bandarbola855 bandar

bandarbola855

bandarbola855 slot

bandarbola855 terpercaya

bandarbola855 slot

bandarbola855 daftar

bandarbola855 link

bandarbola855

bandarbola855

bandarbola855

iosbet

iosbet

link iosbet

slot online iosbet

iosbet link login

slot iosbet

iosbet gacor

iosbet

slot iosbet

agen iosbet

bandar iosbet

iosbet

iosbet link

iosbet

iosbet

iosbet

iosbet

liatogel

login liatogel

liatogel totomacau