E - BANKING - PowerPoint PPT Presentation

1 / 28
About This Presentation
Title:

E - BANKING

Description:

Over the past decade, the financial services ... The convenience that the system ... This might result in lesser convenience, but keeps attackers at bay. ... – PowerPoint PPT presentation

Number of Views:14159
Avg rating:3.0/5.0
Slides: 29
Provided by: pvpo
Category:
Tags: banking

less

Transcript and Presenter's Notes

Title: E - BANKING


1
E - BANKING
  • By
  • Pritam Potnis
  • Mahesh Narayan

2
Why E-Banking
  • Over the past decade, the financial services
    industry has been experiencing dramatic changes
    from consolidation, the maturation of focused
    competitors, the erosion of boundary-defining
    regulatory constraints brought about by
    technology. With the emergence of ATMs and
    telephone voice response, the Internet offers a
    new banking distribution channel.
  • Cost benefits aside, two key market forces are
    driving banks to provide on-line services
  • Push - competing for deposits forces banks
    on-line
  • Pull - customers are becoming more
    sophisticated, have more options and are
    demanding more services
  • But the main issue that bothers everyone is
    security. By overcoming the security concerns of
    hesitant customers and retaining existing
    customers banks can maximize the number of
    customers utilizing its lowest cost channel and
    effectively raise the overall market share.

3
(No Transcript)
4
How Do I GO About Building an E-Banking Website?
  • Building a finance portal is a complex project,
    involving a variety of activities from web design
    to enabling online banking transactions to
    content management.

5
How Do I GO About Building an E-Banking Website?
  • Generally identified are the following four
    components
  • 1)   The User Interface
  • Navigation refers to the websites ease-of-use.
  • Performance of the website is a
    technology-driven issue, ensuring that even a
    customer with a low-speed Internet connection can
    get information/conduct a transaction in a
    reasonable amount of time.
  • 2)   Contents Services
  • Contents Services comprises the information
    (stock quotes or market information),
    interactions (chat or calculation tools) and
    transactions (banking or brokerage) the customer
    can obtain or conduct on the website.
  • 3) Backend/Transaction
  • Interface for connecting the bank's legacy
    systems to handle online transactions
  • Integration of the online products services
    with the banks existing
  • business processes.
  • 4) Enabling Functions.
  • Include partner management, marketing, and
    quality assurance.

6
OK I BUILT THE WEBSITE BUT HOW DO I MAKE IT
SECURE?
  • The industry has identified many categories that
    are
  • potentially dangerous or risky for E-Banking
    websites
  • Physical Attempts to Gain Control
  • Electronic Attempts to Gain Control
  • Execution of Arbitrary Code
  • Spoofing
  • Eavesdropping
  • Denial of Service
  • Exploitation of User by Site
  • Exploitation of Data Subjects

7
Serious Damages Caused due to Security Breaches
in the System
Bank One Online puts Customer Account Information
at Risk
  • Bank one provides users with a method to retrieve
    account
  • information via a standard web interface. While
    the customer is
  • presented a secure and encrypted page, the
    mechanics of the rest
  • of the system are implemented in such a manner
    that they make
  • easy the most typical attacks. The convenience
    that the system
  • provides the user is that it enables the user to
    store his account
  • number, which is usually a credit card or debit
    card number of the
  • account holder, on the local disk. By failing to
    de-select the option
  • Save Access ID on this computer for future
    logins, the user
  • allows the system to write account number
    information to cookie
  • files. In future transactions, this number is
    picked up from the file.
  • However, this presents a great deal of insecurity
    to the user
  • because the cookie is stored as a flat file.

8
Bank One Online puts Customer Account Information
at Risk (Solution)
  •  
  • All userOption cookies must be destroyed,
    either by the client, or by the server when the
    client revisits.
  • User authentication should be more robust. This
    means longer PIN numbers. This might result in
    lesser convenience, but keeps attackers at bay.
  • Cookies used to store state information should be
    made unusable outside the area of the
    application.
  • Cookies intended to be transmitted only in
    encrypted channels should be marked as secure.

9
Bypassing secure web transactions via DNS
corruption
  • This example talks about some of the problems
    associated
  • with secure socket layers or SSL. While it is
    true that to
  • break a 64-bit encryption it takes two days, and
    that SSL
  • implements a 128-bit encryption, an intruder does
    not have
  • to break the encryption to get your account
    information.
  • Man-in-the-Middle attack 
  • An intruder can replace the IP address of the
    bank with the IP of his
  • evil system in the DNS entry of the name server.
    When you type the
  • URL of the bank, the evil system returns its IP
    address to you and
  • also open a session with the bank at the same
    time. There is a
  • secure connection between user and the evil
    system, and between
  • evil system and the bank. The evil system
    forwards the bank page to
  • the user and the user page to the bank, and all
    the while, copies
  • critical user information to itself.

10
E-BANKING WEBSITES MUST BE CAREFUL OF THE
FOLLOWING CRIMES
  • New Account Creation
  • Account Takeover
  • Use of chat-room information from a public list.
  • Site cloning
  • Hacking and cracking into a merchant database
  • Fraudulent Transactions

11
How Do I Prevent Such Crimes from Taking Place?
  • Develop and publish a privacy policy.
  • Follow the privacy policy. Ensure that your
    employees are trained about the policy.
  • Monitor the privacy policy and your compliance.
    To this extent, appoint a security and privacy
    coordinator for your organization. Make that
    person's contact information known. Research and
    respond to any consumer complaints.
  • Store only data elements that you absolutely need
    to have. Maintaining a database with purchase and
    address information is fine to facilitate
    one-to-one marketing, but maintaining a database
    of payment information is not needed. Once the
    payment is completed, this data should be
    removed.

12
How Do I Prevent Such Crimes from Taking Place?
  • Verify that the payment system you implement
    (even when outsourcing) deletes temporary data
    files with payment records and that the
    outsourcing entity has strict security and
    privacy policies as well.
  • Make certain server log files do not
    inadvertently store customer payment
    information. 
  •     
  • Compartmentalization of access to payment
    systems. All employees dont need to have access
    to databases or payment application software.
  •  
  • Monitor employees who have access to sensitive
    data or payment systems. Perform spot-checks and
    verify that they are working within the scope of
    their jobs.
  •  

13
How Do I Prevent Such Crimes from Taking Place?
  • Immediately report any security breach or loss
    of computer systems to police.
  • Only ask customers for information that is
    absolutely necessary to complete the transaction.
  •  
  • Encrypt sensitive data, like credit card
    account data, in databases. Encrypting uses
    cryptographic methods to scramble data so that
    only an authorized application in possession of a
    special key can read the data.
  •  
  •        Manage encryption keys. This includes all
    key management best practices, including
    obsolescence of keys and re-issuance of keys.

14
Role of Privacy and Security Policies
  • Privacy and security policies are important
  • steps in protecting consumers from fraud.
  • Companies should have both privacy and
  • security policies to ensure that there are clear
  • rules to which the company and its employees
  • adhere and that consumers understand the
  • operations of a company with which they
  • choose to do business. Developing a good
  • privacy policy helps a company examine and
  • analyze its own information practices.

15
Some future trends in banking and trading
paradigms
  • Todays banking and trading institutions realize
    that they must
  • graduate from online services to wireless
    services. They are also
  • realizing that inertia in these areas, i.e. a
    resistance to change may
  • result in large amount of losses to these
    institutions. Additionally,
  • wireless banking may become the need of the hour
    of the end
  • customer. Though this entails surmounting of
    many technological
  • impediments, it nevertheless is a potential way
    of things working in
  • future.
  •  
  • Unlike online services, where the end user is
    connected to
  • the Internet through a standard TCP/IP
    connection from a PC, in a
  • wireless connection, there are many more
    challenges. In wireless
  • services, airwaves are the main carriers of
    data, and the physical
  • location is of paramount importance in ensuring
    good quality of
  • data.

16
Likely Vital Statistics in future
  • The Gomez research institute estimates that the
    number of people
  • using internet and wireless services will
    increase from 8 million in
  • 1998 to 40 million in 2003. This presents
    vendors with a
  • tremendous opportunity for growth and business.
  • A research by Jupiter Communications says that
    approximately 140
  • million people in the U.S will be having non-PC
    wireless access by
  • 2003, while there will be 155 million landline
    PC accesses. This
  • means that the non-PC access will grow to 65 of
    the wire line PC
  • access within the next three to four years.
  • According to Forrester research, approximately
    120 million
  • Europeans already use mobile phones, exchanging
    more than two
  • billion wireless text messages each month.
    Forrester predicts that
  • by 2003, nearly one third of the population of
    Europe will be
  • accessing wireless services. 90 percent of the
    50 e-commerce executives interviewed by Forrester
    plan to launch websites that
  • are wireless accessible.

17
Likely Vital Statistics in future
  • A major banking institution claims that having an
    online
  • banking customer base of 3 million, which
    represents more
  • than 20 percent of its customer base, continues
    to sign up
  • approximately 130,000 people for online banking
    ever month.
  • Additionally, 750,000 people signed up for the
    banks
  • electronic billing and payment service, and the
    total dollar
  • value of payments processed grew by 36.
  • GartnerGroup predicts that by 2004, 8 percent of
    new
  • applications for consumer use will permit access
    from mobile
  • clients. GartnerGroup also estimates that more
    than 60 million
  • employees worldwide working outside the
    traditional office
  • setting.

18
Components of a wireless system
  • Handheld Devices
  • Connectivity, Coverage
  • and Gateways
  • Middleware processing
  • engine
  • Transcoding
  • API connection
  • Data System Backend
  • system

19
Components of wireless system
  • Handheld Devices
  • The different kinds of equipment that qualify for
    listing under this category
  • are Thin client devices, palm pilots, workpad,
    two way paging devices like
  • RIM, smart phones and WAP phones. Each of these
    devices uses their own
  • gateway to communicate with application
    servers. Since each device has its
  • own method of formatting and presenting data,
    the challenge for the
  • application server lies in sorting out these
    devices and sending data to
  • each of these devices in a manner compatible to
    their representation.
  • Connectivity, Coverage and Gateways
  • The handheld device accesses a local cell tower
    that is responsible for
  • delivering local geographical coverage in a
    certain region. The coverage is
  • segregated into hexagonal boundaries. The cell
    tower transmits the data to
  • a base station. The base station transmits the
    data to a mobile switching
  • center, which links all the base stations.

20
(No Transcript)
21
Wireless Middleware and Transcoding
  • The wireless application server is the workhorse
    of the whole
  • wireless system. This is the place where
    wireless data is controlled,
  • rules are set for data processing and
    configuration files are
  • executed. The application server ought to be
    open ended, so that it
  • can integrate with other systems. The most
    popular and prevalent
  • method of communicating with the backend systems
    is using XML.
  • Transcoding is the process of formatting data
    using XML, XSL style
  • sheets and DTD files. Formatting information or
    data in this
  • manner enables the user to view the data in a
    universal manner,
  • irrespective of the device used.

22
  • Managing Data
  • At the application server level, the handheld
    device ID and
  • the user ID are stored for verifying logins.
    Once a login
  • request is received, the application server will
    make a trip
  • to the database to verify the authenticity of
    the login. The
  • middleware database prepares and formats the
    data for the
  • device that requests the login. The application
    server will
  • also compare the registered device ID to the
    user ID for
  • additional verification

23
  • Pushing-Pulling Data
  • When the handheld device initiates communication,
    pull
  • technology is employed, where data is pulled from
    the
  • application server to the handheld device. On
    the contrary,
  • when the application serve has a control over
    the handheld
  • device, push technology is employed, in which
    case the
  • application server pushes data to the handheld
    device
  • without waiting for the devices consent

24
  • Security in wireless banking
  • Double key secure authentication is most often
    used for
  • verifying access across different systems. This
    is where the
  • user will authenticate at two levels, the
    application server,
  • and also at the level of the financial system.
    Only when both
  • authentications agree is the user granted
    access. In a
  • double key secure scenario, all data paths
    traveled are
  • verified by using double key secure. Another
    popular
  • method authentication used is the Public-Private
    key
  • authentication

25
Selecting the right vendor
  • A trusted name with an ensured longevity.
  •  
  • The vendor must have tried and tested the product
    in the same or
  • in a related area of application.  
  • The testing and quality assurance of the product
    must be done as
  • early as possible to ensure proper
    functionality. New and evolving
  • systems must be backward compatible with
    existing backend
  • databases.
  •  
  • Management of all entities such as user
    definitions, events,
  • requests, and updates must be tested thoroughly
  •  
  • The vendor must have experienced and adequate
    technical
  • manpower.

26
Selecting the right vendor
  • Contingency planning must be in place
  •  
  • The system must be device and network
    independent. The
  • application should be fully configurable with
    customizable screens
  • using the standard APIs. The application server
    must lend itself to
  • faster development and deployment.
  • There should be development tools to enable you
    to make changes,
  • add services, or deploy applications are
    crucial.

27
Tips to succeed
  • Document all rules and procedures
  •   
  • Starting with high-level conceptual and visual
    design, set up the
  • application network as early as possible.
  •  
  • Run studies on bandwidth required to communicate
    between the
  • backend system and the middleware system and
    the gateways.
  •  
  • List the requirements and functionalities of
    users
  • Perform user analysis
  • Perform technical assessment
  • Hold frequent user group meetings
  •  
  • List business requirements

28
Tips to suceed
  • Define functional requirements
  •  
  • Use standard APIs, like OFX and XML API
  •  
  • Measure performance and process requirements
  •  
  • Develop a delivery plan
  •  
  • Test APIs and architectural designs of the
    applications. Integrate with
  • the data source directly.
  •  
  • Start with a pilot
  •  
  • Fix bugs and fine tune system performance
  •  
  • Implement a full scale rollout
Write a Comment
User Comments (0)
About PowerShow.com