SWIFT ATTACK VIA PHISHING AGAINST MIS OF MOBILE BANKING SECURITY
Abstract
As technology is developed on the world, crime types continue to develop with it; recent research shows that even corporate banks can face weaknesses in the face of cyber-attacks. We have investigated the most severe attacks that the banking systems have been facing and tried to sketch out major measurements against hackers who are using phishing attacks to hack swift system. Web based managing accounts still includes numerous sorts of dangers. Phishing attacks can be particularly harming to banks and clients who do not play it safe against this sort of security hazard. Since phishing programmers utilize a few refined strategies, going from tricky attacks to DNS attacks, banks must refresh their safety efforts consistently.
Keywords
References
- Razak LT. (2016). “The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services: An Extension of TAM" Mohammed A. Al-Sharaf,“Ruzaini
- A. Arsha," Emad Abu-Shanab and “Nabil Elayah" Faculty of Computer Systems and Software Engineering, UMP. Journal of Engineering and Applied Sciences, 100, 545-552.
- Jolly V. (2016). “The Influence of Internet Banking on the Efficiency and Cost Savings for Banks’ Customers”. International Journal of Social Sciences and Management, 3, 163-170
- Salami Fraud by M. E. Kabay, (2006). “Computer Information Systems”, PhD, CISSPAssociate Professor, Norwich University, Northfield VT
- Konoth RK, van der Veen V, Bos H. (2016). “How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication”. In Proceedings of the 20th International Conference on Financial Cryptography and Data Security.
- Vaciago G, Ramalho DS. (2016). “Online searches and online surveillance: the use of trojans and other types of malware as means of obtaining evidence in criminal proceedings”. Digital Evidence & Elec. Signature L. Rev., 13, 88.
- Balk R, Yap BK, Loh C, Wong HD. (2009). To trust or not to trust: the consumer's dilemma with e-banking. Journal of Internet Business, 6,1-27.
- Leukfeldt ER, Kleemans ER, Stol WP. (2016). Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks. British Journal of Criminology, 9.
Details
Primary Language
English
Subjects
-
Journal Section
Research Article
Publication Date
May 29, 2019
Submission Date
February 12, 2019
Acceptance Date
May 20, 2019
Published in Issue
Year 2019 Volume: 4 Number: 2