Question

In: Accounting

Develop a map specific to bank's client needs , addressing all the issues and elements that...

Develop a map specific to bank's client needs , addressing all the issues and elements that are important for the increased security of the bank's online service , Keeping in mind for the banking requirements, stakeholders and security. ?????

Go through the cyber physical system ...

Solutions

Expert Solution

Strong Password or Pass Phrase Support - A common practice in online banking systems is to require passwords that meet certain criteria:

  • Minimum length requirement (usually eight characters)
  • Use upper and lower case letters
  • Must include a number or special character

Banks should be encouraging customers to use long pass phrases, such as "Turkey and stuFFing at 4599 Pet$ Road." Pass phrases like this are difficult to guess or crack using brute force password attacks.

2 - Risk-Based Authentication - Many online banking systems today employ risk-based authentication (RBA) to prevent unauthorized access to customer accounts. A common RBA method uses a combination of challenge questions and security images. A weakness in many systems is the use of questions that hackers can easily answer with a minimal amount of research on Facebook, Geni.com or similar social sites

.The purpose of using a security image in online banking systems is to help a customer identify phishing sites. In theory a phishing site would not be able to show the correct security image for a specific user and therefore the user would not enter his credentials into the phishing site. One vulnerability of these systems is image harvest attacks.

When the collection of available images is small, hackers can successfully harvest the images and execute a phishing scam. A common method of using a security image in an RBA process. If the user does not recognize the image, she should not enter her password.

Multi-factor Authentication -One method of multi-factor authentication is RSA's SecurID keyfob system. SecurID uses small, electronic keyfobs that use an algorithm to generate a random pass code every 60 seconds. A user must enter this pass code in order to log into any system that the SecurID protects. a mobile phone or even landline telephone. Services like Authly will easily plug into an existing online banking system to generate one-time-use pass codes that are sent to a customer's mobile phone. To logon to online banking, the customer enters her username and password like normal, and then immediately she receives an eight character pass code on her phone via text message that she enters into the site to complete her login.

Real-time Out-of-Band Transaction Alerts - banks and credit unions can easily provide customers with tools to monitor their accounts for unusual activity and thus give customers more control and responsibility in protecting their assets. Using services like Authly, or even simple email, a bank can allow a customer to configure notification rules on her accounts. Real-time email or SMS text notification can help customers halt fraudulent transactions quickly

these four types of security mechanisms in place, banks and credit unions can better arm customers with the tools they need to protect their assets.


Related Solutions

Draft a written memo to the client addressing the following research issues: Merrill Lynch contacts you...
Draft a written memo to the client addressing the following research issues: Merrill Lynch contacts you for guidance on this issue. Should the revenue be reported in 2017 or 2018 for financial statement reporting purposes? Why? Please site the specific guidance you followed in response to your research question. The primary issue you should research is whether an accrual basis securities firm has gross income under sec. 451(a) on the trading date or the next year on the settlement date...
In detail, describe the structural and sequence elements that are common to all tRNA molecules, addressing...
In detail, describe the structural and sequence elements that are common to all tRNA molecules, addressing the function of each of the elements. What forces stabilize the tRNAs' structural features? Outline the steps of the ribosome cycle. At what stage do the ribosomal subunits bind to each other? To mRNA? What causes them to dissociate when protein synthesis is complete? Please be thorough.
A company-specific map that names its primary and secondary stakeholders, identifies key issues, and examines relationships...
A company-specific map that names its primary and secondary stakeholders, identifies key issues, and examines relationships and networks between the organization and stakeholders is called a _________. Select one: A. reputation management B. stakeholder map C. social audit D. legitimacy
. What logistical issues are specific to working with students with special needs and how should...
. What logistical issues are specific to working with students with special needs and how should a group leader attend to them? What logistical issues are specific to working with students of diverse backgrounds and how should a group leader attend to them? How are these issues different? Discuss each issue thoroughly, then tell what differences are necessary for a counselor to consider.  What differences in skills might the counselor need to work with each group?
Define, discuss and develop information security policy with all its elements.
Define, discuss and develop information security policy with all its elements.
Implement financial control procedures, develop new procedures and systems in response to management and client needs,...
Implement financial control procedures, develop new procedures and systems in response to management and client needs, monitor and control the cash flow of the organization. What are the possible critical success factors of above duties?
During this course, you will learn to develop all the essential elements of a Business Plan,...
During this course, you will learn to develop all the essential elements of a Business Plan, it can either be an existing company on the NASDAQ exchange which is the "American stock exchange, which is located at One Liberty Plaza in New York City known as the New York Stock Exchange" or "a company that you would like to start one day". Some of your plans will be hypothetical, as access to certain information in the company is restricted, but...
Describe and expain in detail all of the specific nutrient needs during Pregnancy to include energy,...
Describe and expain in detail all of the specific nutrient needs during Pregnancy to include energy, energy nutrients, viamins and minerals. Be spesific.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT