Security Issues on Banking Systems
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
Bank is one of the example of institute that using Information Technology (IT) in its daily task to fulfill the organization’s and customers’ need. Business transaction, money transfer, ATM, credit card, and loan are some tasks that were done every day. Customers’ personal information stored by the bank is also considered as private and should not be disclose to anybody with no authorization. Only legal staff and legal bank’s customer can operate any of the tasks. Thus, bank has its own system to ensure their transaction works the way it is and prevent any activity that could cause lost to the organization and its clients or customers. Whether like it or not, some irresponsible people are always exist to challenge the robustness of a banking system. Even an amateur that claimed themselves as a hacker could transfer a sum of money from other account to his or her account without noticed. Bank account hacking has caused millions dollar losses around the globe. How this could happen? Was there any obvious weaknesses in the banking system that make it easily expose to treat? This article would discuss about the intrusion of banking system. It is important to realize how the security aspects in a banking system can influence such illegal activities which are then lead to a great lost to the financial institution. Some recommendations would be included in this article to help to reduce or prevent the intrusion in the future.
Authors and Affiliations
Mohd Khairul Affendy Ahmad , Rayvieana Vera Rosalim , Leau Yu Beng , Tan Soo Fun
Performance Analysis Of Guaranteed Packet Transfer In Coverage Area And Less Coverage Area For MANET
The main challenge in mobile adhoc network is guaranteed transfer of packet within coverage area and less coverage area. The hierarchical clustering is used to increase coverage area to reduce the packet loss in MANET.Th...
A NOVEL APPROACH FOR RETRIEVING AN IMAGE USING CBIR
In this paper we mainly focussed on how to retreive the images from large database. Generally in huge databases we will have large number of images with the same name. when we want to retrieve the image by giving a name,...
Detection of Abnormal Masses in Mammogram Images
Masses in the breast can be located in digital mammogram images by computationally analysing various feature statistics from the image. Any algorithm used to analyse digital mammogram images can be both time-consuming an...
Four Walsh Transform Sectors Feature Vectors for Image Retrieval from Image Databases
The work of this paper presents the new idea of using Walsh transform to generate the feature vector for content based image retrieval. The complex Walsh transform is conceived by multiplying Sal functions...
AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION
Automatic image retargeting is used for large image.That are to be fit in small size display devices. Without any loss of information.our proposed methods one is saliency based mesh parameterization method is used to re...