SWIFT ATTACK VIA PHISHING AGAINST MIS OF MOBILE BANKING SECURITY
Year 2019,
Volume: 4 Issue: 2, 24 - 48, 29.05.2019
Ahmet Efe
,
Doğa Atakan
Ümmihan Gönül Altun
Abstract
As technology is developed on the world, crime types continue to develop with it; recent research shows that even corporate banks can face weaknesses in the face of cyber-attacks. We have investigated the most severe attacks that the banking systems have been facing and tried to sketch out major measurements against hackers who are using phishing attacks to hack swift system. Web based managing accounts still includes numerous sorts of dangers. Phishing attacks can be particularly harming to banks and clients who do not play it safe against this sort of security hazard. Since phishing programmers utilize a few refined strategies, going from tricky attacks to DNS attacks, banks must refresh their safety efforts consistently.
References
- Razak LT. (2016). “The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services: An Extension of TAM" Mohammed A. Al-Sharaf,“Ruzaini
- A. Arsha," Emad Abu-Shanab and “Nabil Elayah" Faculty of Computer Systems and Software Engineering, UMP. Journal of Engineering and Applied Sciences, 100, 545-552.
- Jolly V. (2016). “The Influence of Internet Banking on the Efficiency and Cost Savings for Banks’ Customers”. International Journal of Social Sciences and Management, 3, 163-170
- Salami Fraud by M. E. Kabay, (2006). “Computer Information Systems”, PhD, CISSPAssociate Professor, Norwich University, Northfield VT
- Konoth RK, van der Veen V, Bos H. (2016). “How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication”. In Proceedings of the 20th International Conference on Financial Cryptography and Data Security.
- Vaciago G, Ramalho DS. (2016). “Online searches and online surveillance: the use of trojans and other types of malware as means of obtaining evidence in criminal proceedings”. Digital Evidence & Elec. Signature L. Rev., 13, 88.
- Balk R, Yap BK, Loh C, Wong HD. (2009). To trust or not to trust: the consumer's dilemma with e-banking. Journal of Internet Business, 6,1-27.
- Leukfeldt ER, Kleemans ER, Stol WP. (2016). Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks. British Journal of Criminology, 9.
- Chiu CL, Chiu JL, Mansumitrchai S. (2016). Privacy, security, infrastructure and cost issues in internet banking in the Philippines: initial trust formation. International Journal of Financial Services Management, 8, 240-271.
- Arachchilage NAG, Love S, Beznosov K. (2016). Phishing threat avoidance behaviour: An empirical investigation. Computers in Human Behavior, 60, 185-197.
- Ekawade S, Mule S, Patkar U. (2016).” Phishing Attacks and Its Preventions”. Imperial Journal of Interdisciplinary Research, 2.
- M. Alnatheer and K. Nelson, "A Proposed Framework for Understanding Information Security Culture and Practices in the Saudi Context,” in 7th Australian Information Security Management Conference, 2009, no. December, pp. 1-3.
- K. D. Mitnick and W. L. Simon, “The Art of Deception: Controlling the human element of security”. Wiley Publishing Inc, 2002
- Swanink R, Poll E, Schwabe P(2016). “Persistent effects of manin-the-middle attacks”, 23-32.
- Eze CU, Yih CG, Ling NT, Gan G. (2008). “Phishing: a growing challenge for Internet banking providers in Malaysia”. Communications of the IBIMA, 5, 133-142.
- Damodaram R. (2016). “Study on phishing attacks and antiphishing tols”. International Research Journal of Engineering and Technology, 3.
- Mishra R. (2016). “Review: Phishing Attack Types & Preventive Measures”. Imperial Journal of Interdisciplinary Research, 2.
- Chaudhry JA, Chaudhry SA, Rittenhouse RG. (2016). “Phishing Attacks and Defenses”. International Journal of Security and Its Applications, 10, 247-256.
- S. Defuel, (2003), "Information Security Culture -From Analysis to Change,” South African Compute. J., vol. 21, pp. 46-52, 2003.
- A.R. Flo, A. Josang, (2009). “Consequences of BOTNETs Spreading to Mobile Devices”, 14th Nordic Conference on Secure IT Systems, Oslo
- Iclarified, (2016), “İnternet: Worldwide Smartphone Growth Goes Flat in Q1 2016”, Apple Market Share Drops to 15.3%, http://www.iclarified.com/54990/worldwide-smartphone-growthgoes-flat-in-q1-2016-apple-market-share-drops-to-153-chart , 17.02.2017.
- Masum E., Samet R, (2018) “Mobil BOTNET ile DDoS Saldırısı” Bilişim Teknolojileri Dergisi, CİLT: 11, SAYI: 2, DOI: 10.17671/gazibtd.306612
MOBİL BANKA YBS GÜVENLİĞİNE KARŞI SWIFT OLTALAMA SALDIRILARI
Year 2019,
Volume: 4 Issue: 2, 24 - 48, 29.05.2019
Ahmet Efe
,
Doğa Atakan
Ümmihan Gönül Altun
Abstract
Dünyada teknoloji geliştikçe, suç türleri de artmaya devam etmektedir. Son araştırmalar, kurumsal bankaların bile siber saldırıların karşısında zayıf kalabildiklerini göstermektedir. Bankacılık sistemlerinin karşılaştığı en ciddi saldırıları araştırılarak “phishing” saldırılarını kullanan bilgisayar korsanlarının ne tür zararlar verebilecekleri ve bunlara karşı nasıl önlem alınabileceği çalışmamızda inceleme konusu edilmiştir. Web tabanlı hesaplar ve mobil uygulamalar çok sayıda tehlike içermeye devam etmektedir. Kimlik avı saldırıları, bu tür bir güvenlik tehlikesine karşı güvende olmayan banka ve müşterilere zarar verebilmektedir. Kimlik avı programcıları, zorlu saldırılardan DNS saldırılarına giden birkaç rafine stratejiden yararlandıklarından, bankaların güvenlik çabalarını sürekli olarak yenilemeleri ve gelişen saldırı vektörlerine uygun yeni önlemler araştırmaları gerekmektedir.
References
- Razak LT. (2016). “The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services: An Extension of TAM" Mohammed A. Al-Sharaf,“Ruzaini
- A. Arsha," Emad Abu-Shanab and “Nabil Elayah" Faculty of Computer Systems and Software Engineering, UMP. Journal of Engineering and Applied Sciences, 100, 545-552.
- Jolly V. (2016). “The Influence of Internet Banking on the Efficiency and Cost Savings for Banks’ Customers”. International Journal of Social Sciences and Management, 3, 163-170
- Salami Fraud by M. E. Kabay, (2006). “Computer Information Systems”, PhD, CISSPAssociate Professor, Norwich University, Northfield VT
- Konoth RK, van der Veen V, Bos H. (2016). “How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication”. In Proceedings of the 20th International Conference on Financial Cryptography and Data Security.
- Vaciago G, Ramalho DS. (2016). “Online searches and online surveillance: the use of trojans and other types of malware as means of obtaining evidence in criminal proceedings”. Digital Evidence & Elec. Signature L. Rev., 13, 88.
- Balk R, Yap BK, Loh C, Wong HD. (2009). To trust or not to trust: the consumer's dilemma with e-banking. Journal of Internet Business, 6,1-27.
- Leukfeldt ER, Kleemans ER, Stol WP. (2016). Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks. British Journal of Criminology, 9.
- Chiu CL, Chiu JL, Mansumitrchai S. (2016). Privacy, security, infrastructure and cost issues in internet banking in the Philippines: initial trust formation. International Journal of Financial Services Management, 8, 240-271.
- Arachchilage NAG, Love S, Beznosov K. (2016). Phishing threat avoidance behaviour: An empirical investigation. Computers in Human Behavior, 60, 185-197.
- Ekawade S, Mule S, Patkar U. (2016).” Phishing Attacks and Its Preventions”. Imperial Journal of Interdisciplinary Research, 2.
- M. Alnatheer and K. Nelson, "A Proposed Framework for Understanding Information Security Culture and Practices in the Saudi Context,” in 7th Australian Information Security Management Conference, 2009, no. December, pp. 1-3.
- K. D. Mitnick and W. L. Simon, “The Art of Deception: Controlling the human element of security”. Wiley Publishing Inc, 2002
- Swanink R, Poll E, Schwabe P(2016). “Persistent effects of manin-the-middle attacks”, 23-32.
- Eze CU, Yih CG, Ling NT, Gan G. (2008). “Phishing: a growing challenge for Internet banking providers in Malaysia”. Communications of the IBIMA, 5, 133-142.
- Damodaram R. (2016). “Study on phishing attacks and antiphishing tols”. International Research Journal of Engineering and Technology, 3.
- Mishra R. (2016). “Review: Phishing Attack Types & Preventive Measures”. Imperial Journal of Interdisciplinary Research, 2.
- Chaudhry JA, Chaudhry SA, Rittenhouse RG. (2016). “Phishing Attacks and Defenses”. International Journal of Security and Its Applications, 10, 247-256.
- S. Defuel, (2003), "Information Security Culture -From Analysis to Change,” South African Compute. J., vol. 21, pp. 46-52, 2003.
- A.R. Flo, A. Josang, (2009). “Consequences of BOTNETs Spreading to Mobile Devices”, 14th Nordic Conference on Secure IT Systems, Oslo
- Iclarified, (2016), “İnternet: Worldwide Smartphone Growth Goes Flat in Q1 2016”, Apple Market Share Drops to 15.3%, http://www.iclarified.com/54990/worldwide-smartphone-growthgoes-flat-in-q1-2016-apple-market-share-drops-to-153-chart , 17.02.2017.
- Masum E., Samet R, (2018) “Mobil BOTNET ile DDoS Saldırısı” Bilişim Teknolojileri Dergisi, CİLT: 11, SAYI: 2, DOI: 10.17671/gazibtd.306612