Professional Documents
Culture Documents
Abstract
Traditional banking system has been supplanted by internet banking system due to
enormously growing IT in todays world. Online banking which is same as internet
banking or e-banking has not only helped increasing the banks productivity but also
has made transactions easy for customer. Internet is being used as the delivery channel
for customers to conduct their online account banking transactions such as paying bills,
viewing checking and savings account balances, tranferring funds and many more.
Using internet as delivery channel, internet banking has provided its banking customers
a huge advantage of not having to visit banks personally to carry out their account
activities. The security and privacy of customers confidential information is the biggest
concern which the banking industry is facing even today.
keep ensuring that data has not been the message is received and compared to
tampered with. Data that is being original hash values which were
captured must be accurate. Error calculated earlier. If the hash values are
checking must be done on regular basis different then the message has lost its
[3]. This is important because without integrity. Though the primary goal of
this functionality one could easily come digital signature is to provide non-
across a situation where an online repudiation and authentication, it still
banking user wants to pay his utility bill protects against the loss of integrity [8].
but he is unable to pay since the bank
records currently doesnt reflect his 3. Availability:
previous deposits [3]. Data integrity is Availability ensures that data remains
closely related to confidentiality, but the accessible to online banking customers
challenge here is that instead of 24*7 [3]. It is required for the servers to
protecting the message from only being stay available all the time. Since the data
accessed, integrity ensures preventing an needs to be accessible by online
intruder from altering a message that is customers whenever they require access,
in transit between the sender and therefore the system administrator
receiver [3]. should ensure systems high availability.
Integrity can be compromised in a The aim of high available systems is to
number of ways: remain available at all times, highly
preventing service disruptions due to
1. Software Deletion. system upgrades, software and hardware
failures and power outages. In the fast
2. Software Modification. paced world of todays internet banking,
banks without this would find that if its
3. Software Theft [3].
customers are unable to get to their
2.1 Protection against loss of money then the bank would lose their
integrity: customers. DOS attacks are very
common today. The primary aim of
Hashing is a common way of ensuring DDOS attack is to ensure that the users
integrity [8]. Hash is a number and the are unable to access the website they are
hashing algorithm calculates a hash privileged to access. Such downtime will
value for a file or for string of data. Hash turn out to be very expensive [3].
values remain the same as long as the
data remains unchanged. MD5 and SHA- 3.1. Protection against loss of
1 are the 2 primary hashing algorithms. availability:
The detection systems check the
Organizations use primary methods like
information on regular basis. If the hash
values are the same then the data is not fault tolerant systems, redundant servers
and backups inorder to protect against
altered and if the hash values are
loss of availability [8]. Fault tolerant
modified then the data has lost integrity
and is considered suspect [8]. Digital systems are those systems which can
develop a fault, yet tolerate it and still
signatures can be used to send
continue to operate. This is
messages. Hash values are calculated
before the message is being sent and accomplished using redundant systems
such as redundant servers or drives.
hash is sent along with the message. The
Backup ensures that the customers vital
hash values are calculated again when
sensitive information is backed up and
4
VOLUME :03 Issue 05 Paper id-IJIERM-III-V-1465 , Octobrer 2016
INTERNATIONAL JOURNAL OF INNOVATION IN ENGINEERING RESEARCH & MANAGEMENT ISSN :2348-4918
References [8]Available:http://www.pearsonitcertific
ation.com/articles/article.aspx?p=17086
[1] Internet Banking (E- 68.
Banking) Available:
http://www.worldjute.com/ebank.html. [9]Available:https://www.clickssl.net/blo
g/types-of-internet-security-threats-and-
[2] Morufu Olalere, Victor O. Waziri, Idris preventions.
Ismaila, Olawale S. Adebayo and Ololade
O,Assessment of Information Security [10]Available:https://www.linkedin.com/
Awareness among Online Banking pulse/types-internet-security-threats-its-
Costumers in Nigeria, International prevention-mr-ooppss.
Journal of Advanced Research in
Computer Science and Software
Engineering ,Volume 4, Issue 6, June
2014, ISSN: 2277 128X.
[5]FreedomBankAvailable:http://www.fre
edombankva.com/pdf/Microsoft%20Wor
d%20%20Advance%20Online%20FAQ.pd
f
7
VOLUME :03 Issue 05 Paper id-IJIERM-III-V-1465 , Octobrer 2016