Question

In: Accounting

Gather information regarding the Internet banking objectives of the bank, the strategy used to achieve the...

Gather information regarding the Internet banking objectives of the bank, the strategy used to achieve the objectives and the way that the bank is using Internet technology in the relationships with its customers?

Solutions

Expert Solution

Internet banking has become a mainstream and even a primary electronic delivery channel for a large number of banks. Their customers regularly log into the banks’ websites to access their accounts to conduct a wide range of banking transactions for personal and business purposes. However, the popularity and world-wide accessibility of internet banking have attracted a growing list of internet hacking threats and exploits.

Customer protection is of paramount importance in internet banking.The bank must ensure that a customer is properly identified and authenticated before access to sensitive customer information or online banking functions is permitted. Sensitive customer information includes customer personal particulars or account details that could be used to identify a customer.

In past years, internet security threats were usually of a passive nature involving mainly eavesdropping and password guessing. In recent years, direct attacks on banking systems and customer PINs have become increasingly widespread. Through targeted attacks such as phishing, fake websites,spamming, viruses, worms, trojan horses, trapdoors, keylogging, spyware and middleman infiltration, customer PINs are under constant threats from various types of systems vulnerabilities, security flaws, exploits and scams.

The essence of two-factor authentication technology is the availability of a wide range of security tools, devices, techniques and procedures to counter the cyber threats and attacks described above. As an integral part of the two-factor authentication architecture,banks should also implement appropriate measures to minimise exposure to a middleman attack which is more commonly known as a man-in-the-middle attack (MITMA).

Distributing software via the internet is becoming increasingly popular.However, in the context of internet banking, downloading and running software codes, plug-ins, applets, ActiveX programs and other executable files from anonymous or unverifiable sources is possibly one of the riskiest actions a

customer could do on his personal computer. The threats and risks associated with downloading are significant if the customer could not be reasonably sure that the software is genuine and that it has not been tampered with even if it were from a legitimate source in the first instance. Many incidents have occurred where internet users have been deceived by hackers into downloading trojans,backdoors, viruses and other errant so ftware which cause malicious damage and harmful consequences.

Banks should not distribute software to their customers via the internet or through a web-based system unless they can provide adequate security and safeguards for the customers.This would imply that customers can verify the provenance and integrity of the downloaded software and authenticate the bank's digital signature incorporated in the software using a digital certificate provided by the bank. In return, the bank is also able to check the authenticity and integrity of the software being used by the customers.


Related Solutions

How do marketers use pricing strategy and pricing objectives to achieve their goals? Discuss
How do marketers use pricing strategy and pricing objectives to achieve their goals? Discuss
An action plan is a written strategy used to achieve outlined goals. For the purposes of...
An action plan is a written strategy used to achieve outlined goals. For the purposes of this assignment, the action plan will be created using PowerPoint. State the goal, which should identify what training content will be used and how it will be used. The goal for this action plan is to assist managers with identifying how performance appraisals are used to demonstrate the success of training efforts. Include the strategies for reaching the goal including what the trainee must...
An action plan is a written strategy used to achieve outlined goals. For the purposes of...
An action plan is a written strategy used to achieve outlined goals. For the purposes of this assignment, the action plan will be created using PowerPoint. An action plan includes the components listed below, and you may refer to page 237 in the textbook for additional guidance. State the goal, which should identify what training content will be used and how it will be used. The goal for this action plan is to assist managers with identifying how performance appraisals...
Monetary strategy used by Zimbabwe’s central bank
Monetary strategy used by Zimbabwe’s central bank
What do you know about NAFTA? Use the internet to gather some information about NAFTA and...
What do you know about NAFTA? Use the internet to gather some information about NAFTA and why and when it was started. Do you think NAFTA has been successful in its objectives? Why or why not? Make sure you clearly state the source of your information.
What do you know about NAFTA? Use the internet to gather some information about NAFTA and...
What do you know about NAFTA? Use the internet to gather some information about NAFTA and why and when it was started. Do you think NAFTA has been successful in its objectives? Why or why not? Make sure you clearly state the source of your information.
what objectives a company has to achieve to decrease its costs? plus what's each objective used...
what objectives a company has to achieve to decrease its costs? plus what's each objective used business strategy, action step, and evaluation method? -I want 4 objectives to fulfill the goal of decreasing the company's costs
How and to what extent should information be shared throughout the organization regarding the new strategy?...
How and to what extent should information be shared throughout the organization regarding the new strategy? What and who should be considered when answering this question? How much information to share in order to gain customer buy in?
The following information is available regarding Desjardins Inc.’s bank information for September 2015: 1,The balance on...
The following information is available regarding Desjardins Inc.’s bank information for September 2015: 1,The balance on the September 30, 2015 Bank Statement was $8,316. 2,The company’s cash account showed a balance of $8,706 on September 30. 3,A deposit of $800 made by Desjardins Inc. late on September 30 was not included on the Bank Statement. 4,A comparison between the cancelled cheques returned with the Bank Statement and the company records indicates that the following cheques were still outstanding on September...
How long should a key be used before it is replaced? Search the Internet for information...
How long should a key be used before it is replaced? Search the Internet for information regarding cryptoperiods for hash, symmetric, and asymmetric algorithms. Find at least three sources for each of the algorithms. Write a summary of what you find in regards to the recommended times and figure the average time between all three of your sources. Do you agree with the average time for a hash, symmetric, and asymmetric algorithms? What would you recommend for each? Why? Please...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT