Online Banking: Information Security vs. Hackers Research Paper
|
Full Text(PDF, 3000) PP.
|
|
Author(s) |
Paul Jeffery Marshall, University of Houston |
|
KEYWORDS |
online banking, security, information security,hacking, hackers |
|
ABSTRACT |
In this paper I will discuss four scenarios regarding cyber crimes specifically directed at financial institutions and give specific examples. Also, I will discuss the malicious Zeus and URLzone bank malware Trojans that is currently causing security issues and threats to some financial institutions. Expected results from study and research is to bring awareness of increased activity of cyber-attacks directed at financial institutions, call for a global alliance against cyber-pirates, and point out that financial institution's have a responsibility to protect and secure information as custodians of their customer's sensitive/legacy data online. |
|
References |
|
1. Abel, W. (2009, March-July). Agents, Trojans and
tags: The next generation of investigators. International
Review of Law, Computers & Technology. Vol. 23
Issue 1/2, p99-108, 10p. Retrieved June 13, 2010,
from
http://search.ebscohost.com.ruby2.uhv.edu/login.as
px?direct=true&db=bth&AN=37362626&site=bsilive&scope=site.
2. Abdulla M.F. and Ravikumar C.P. (2004). A selfchecking signature scheme for checking backdoor security
attacks in internet. Journal of High Speed Networks;
2004, Vol. 13 Issue 4, p309-317, 9p. Retrieved June
13, 2010, from
http://search.ebscohost.com.ruby2.uhv.edu/login.as
px?direct=true&db=bth&AN=15285862&site=bsilive&scope=site.
3. Bankrate.com. (2010, May 15). Could Online Hackers
Steal Your Cash. Retrieved June 05, 2010, from
http://finance.yahoo.com/bankingbudgetingk/article/109549/could-online-hackerssteal-your-cash?mod=bb-checking_savings.
4. Carlson, C. FierceCIO. (2010, June, 11). Lessons from
AT&T/iPad user email address link. Retrieved Jun
2010, from http://www.fiercecio.com/story/lessonst-ipad-user-email-address-leak/2010-06-
11?utm_medium=nl&utm_source=internal
5. Carrier, Brian D. (2006, February). Risk of LIVE DIGITAL FORENSIC ANALYSIS. Vol. 49 Issue 2, p56-61,
5p, 3 Diagrams. July 2008, Issue 268, p10-11, 2p. Retrieved June 13, 2010, from
http://search.ebscohost.com.ruby2.uhv.edu/login.as
px?direct=true&db=bth&AN=19568335&site=bsilive&scope=site.
6. H.R. 4061—111 th Congress: Cybersecurity Enhancement Act of 2010. (2009). InGovTrack.us (database of
federal legislation). Retrieved June 7, 2010, from
http://www.govtrack.us/congress/bill.xpd?bill=h111
-4061.
7. Krebs, T. (2009, July 02). PC Invader Cost Ky. County
$415,000. Retrieved June 6, 2010, from
http://voices.washingtonpost.com/securityfix/2009/0
7/an_odyssey_of_fraud_part_ii.html.
8. Mills, E. (2009, September 29). Banking Trojan steal
money from under your nose. cnet news. Retrieved
June 13, 2010 from http://news.cnet.com/8301-
27080_3-10363836-245.html.
9. McMillan, Robert. (2009, September 29). New Trojan
Gives Criminals Full-service Bank Theft. PC World;
Sep 2009. Retrieved June 6, 2010 from
http://www.pcworld.com/businesscenter/article/172
859/new_trojan_gives_criminals_fullservice_bank_t
heft.html.
10. Robertson, J. (2010, June 10). AT&T security hole exposes iPad users’ e-mails. Associated Press.
www.washingtonexaminer.com. Retrieved June 13,
2010, from
http://www.washingtonexaminer.com/local/ap/attsecurity-hole-exposes-ipad-users-e-mails-
96016679.html.
11. OECD Observer. (2008, July). Security and the Internet. Issue 268, p10-11, 2p. Retrieved June 13, 2010,
from
http://search.ebscohost.com.ruby2.uhv.edu/login.as
px?direct=true&db=bth&AN=34045693&site=bsilive&scope=site.
|
|
|