IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 1    
Website: http://www.ijser.org
scirp IJSER >> IJSER Volume 1, Issue 1, October 2010
Online Banking: Information Security vs. Hackers Research Paper
Full Text(PDF, 3000)  PP.  
Paul Jeffery Marshall, University of Houston
online banking, security, information security,hacking, hackers
In this paper I will discuss four scenarios regarding cyber crimes specifically directed at financial institutions and give specific examples. Also, I will discuss the malicious Zeus and URLzone bank malware Trojans that is currently causing security issues and threats to some financial institutions. Expected results from study and research is to bring awareness of increased activity of cyber-attacks directed at financial institutions, call for a global alliance against cyber-pirates, and point out that financial institution's have a responsibility to protect and secure information as custodians of their customer's sensitive/legacy data online.
1. Abel, W. (2009, March-July). Agents, Trojans and tags: The next generation of investigators. International Review of Law, Computers & Technology. Vol. 23 Issue 1/2, p99-108, 10p. Retrieved June 13, 2010, from http://search.ebscohost.com.ruby2.uhv.edu/login.as px?direct=true&db=bth&AN=37362626&site=bsilive&scope=site.

2. Abdulla M.F. and Ravikumar C.P. (2004). A selfchecking signature scheme for checking backdoor security attacks in internet. Journal of High Speed Networks; 2004, Vol. 13 Issue 4, p309-317, 9p. Retrieved June 13, 2010, from http://search.ebscohost.com.ruby2.uhv.edu/login.as px?direct=true&db=bth&AN=15285862&site=bsilive&scope=site.

3. Bankrate.com. (2010, May 15). Could Online Hackers Steal Your Cash. Retrieved June 05, 2010, from http://finance.yahoo.com/bankingbudgetingk/article/109549/could-online-hackerssteal-your-cash?mod=bb-checking_savings.

4. Carlson, C. FierceCIO. (2010, June, 11). Lessons from AT&T/iPad user email address link. Retrieved Jun 2010, from http://www.fiercecio.com/story/lessonst-ipad-user-email-address-leak/2010-06- 11?utm_medium=nl&utm_source=internal

5. Carrier, Brian D. (2006, February). Risk of LIVE DIGITAL FORENSIC ANALYSIS. Vol. 49 Issue 2, p56-61, 5p, 3 Diagrams. July 2008, Issue 268, p10-11, 2p. Retrieved June 13, 2010, from http://search.ebscohost.com.ruby2.uhv.edu/login.as px?direct=true&db=bth&AN=19568335&site=bsilive&scope=site.

6. H.R. 4061—111 th Congress: Cybersecurity Enhancement Act of 2010. (2009). InGovTrack.us (database of federal legislation). Retrieved June 7, 2010, from http://www.govtrack.us/congress/bill.xpd?bill=h111 -4061.

7. Krebs, T. (2009, July 02). PC Invader Cost Ky. County $415,000. Retrieved June 6, 2010, from http://voices.washingtonpost.com/securityfix/2009/0 7/an_odyssey_of_fraud_part_ii.html.

8. Mills, E. (2009, September 29). Banking Trojan steal money from under your nose. cnet news. Retrieved June 13, 2010 from http://news.cnet.com/8301- 27080_3-10363836-245.html.

9. McMillan, Robert. (2009, September 29). New Trojan Gives Criminals Full-service Bank Theft. PC World; Sep 2009. Retrieved June 6, 2010 from http://www.pcworld.com/businesscenter/article/172 859/new_trojan_gives_criminals_fullservice_bank_t heft.html.

10. Robertson, J. (2010, June 10). AT&T security hole exposes iPad users’ e-mails. Associated Press. www.washingtonexaminer.com. Retrieved June 13, 2010, from http://www.washingtonexaminer.com/local/ap/attsecurity-hole-exposes-ipad-users-e-mails- 96016679.html.

11. OECD Observer. (2008, July). Security and the Internet. Issue 268, p10-11, 2p. Retrieved June 13, 2010, from http://search.ebscohost.com.ruby2.uhv.edu/login.as px?direct=true&db=bth&AN=34045693&site=bsilive&scope=site.
Untitled Page