1、1本科毕业论文外文翻译外文文献原文ONLINEBANKINGSECURITYMATERIALSOURCEPROJECTREPORTFORINFORMATIONSECURITYCOURSE,LINKOPINGSUNIVERSITETET,SWEDENAUTHORFAHEEMRAMZANTEHMANPERVAIZABSTRACTINTHISPAPERWEHAVESTUDIEDAVARIETYOFAUTHENTICATIONSOLUTIONSTHATONLINEBANKSOFFERTHEIRCUSTOMERSWEHAVEANALYZEDANDCOMPAREDTHEDIFFERENTSOLUTIONS
2、FROMBOTHSECURITYANDUSABILITYPERSPECTIVEWEHAVEALSOPERFORMEDARISKANALYSISBASEDONTHEPRESENTEDAUTHENTICATIONSOLUTIONS1INTRODUCTIONONLINEBANKINGISBEINGACCEPTEDANDGAININGTRUSTOFMANYCUSTOMERSWITHTHEPASSAGEOFTIMEPAYBILLSWHILETRAVELING,TRANSFERFUNDSINOTHERACCOUNTS,VIEWINGMORTGAGEBALANCEETCARESOMEOFTHEADVANTA
3、GESOFTHEONLINEBANKINGONEOFTHEREASONSOFTHEINCREASINGUSEOFTHEONLINEBANKINGSYSTEMISITSAVAILABILITYTHEREEXISTSMANYTECHNIQUESFORAUTHENTICATIONINONLINEBANKINGBUTTHEREISASTRONGNEEDTOINCREASETHESECURITYANDUSABILITYOFTHESETECHNIQUESSECURITYISIMPORTANTINTHESENSETHATCUSTOMERSWILLBECOMEFREEFROMTHREATSLIKEFRAUDU
4、LENTLYLOSSOFMONEYSECURITYISIMPORTANTNOTONLYFORBANKINGORGANIZATIONSBUTALSOFORTHEIRCLIENTSMORESECURETHEONLINEBANKINGAUTHENTICATION,MORESATISFIEDWILLBETHEIRCUSTOMERS,ANDTHEIRREVENUEWILLALSOINCREASEUSABILITYISALSOANIMPORTANTPERSPECTIVEINONLINEBANKINGAUTHENTICATIONWITHUSABILITYWEMEANHOWMUCHUSABLEISTHEONL
5、INEBANKINGAUTHENTICATIONSYSTEMFORTHEIRCUSTOMERSINTHISREPORTWEWILLSTUDYVARIETYOFAUTHENTICATIONSOLUTIONS,BOTHFROMSECURITYANDUSABILITYPERSPECTIVE11METHODOLOGYINTHISSECTIONWEHAVEDISCUSSEDHOWWEHAVEARRANGEDTHEDATAFORTHEREPORTFROM2DIFFERENTSOURCES,OURWORKINGSTRATEGYINAGROUP,ANDALSOTHEQUESTIONS/PROBLEMSADDR
6、ESSEDINTHEREPORTRELATEDTOOURTOPIC111DATACOLLECTIONTOACCOMPLISHOUROBJECTIVEWEHAVESTUDIEDDIFFERENTONLINEBANKINGAUTHENTICATIONSOLUTIONSBYTAKINGREFERENCESFROMTHECOURSELITERATUREANDRESEARCHPAPERSWEHAVEANALYZEDANDCOMPAREDTHESECURITYOFONLINEBANKINGSOLUTIONSFROMBOTHSECURITYANDUSABILITYPERSPECTIVE112GROUPWOR
7、KINGWEHAVEADOPTEDVERYSYSTEMATICANDPROFESSIONALAPPROACHFORATTAININGOURGOALFORTHISPROJECTROLESANDRESPONSIBILITIESHAVEBEENASSIGNEDTOBOTHGROUPMEMBERSFROMTHEBEGINNINGOFTHEPROJECTINTERNALGROUPMEETINGSHAVEHELDTWICEAWEEKTOGETTHEOVERVIEWOFTHEWORKANDTOEVALUATETHATEACHGROUPMEMBERISGOINGINTHERIGHTDIRECTION113QU
8、ESTIONS/PROBLEMSOURREPORTWILLANSWERTHEFOLLOWINGQUESTIONSWHATAREDIFFERENTONLINEBANKINGAUTHENTICATIONTECHNIQUESWHATKINDOFSECURITYISSUESARETHEREWITHONLINEBANKINGAUTHENTICATIONWHATISTHEUSABILITYOFDIFFERENTONLINEAUTHENTICATIONTECHNIQUESWHATARETHERISKSASSOCIATEDWITHDIFFERENTAUTHENTICATIONSOLUTIONSANDTHEIR
9、ASSESSMENT2BACKGROUNDONLINEBANKINGSECURITYISBECOMINGSERIOUSLYIMPORTANTINRECENTYEARSDUETOINCREASINGAMOUNTOFINTERNETUSERSNOWADAYSALMOSTEVERYBANKISOFFERINGONLINEBANKINGSOLUTIONSTOTHEIRCUSTOMERSHIGHERSECURITYSTANDARDSAREREQUIREDASBANKINGACTIVITIESAREBYNATUREMORESENSITIVETHANMOSTOTHERINTERNETACTIVITIESMO
10、STBANKSEMPLOYTWOFACTORAUTHENTICATIONTOINCREASESECURITY,WHICHINVOLVESTWOBASICFACTORSSOMETHINGUSERKNOWS,LIKEPASSWORD,PIN,PASSPHRASEETCSOMETHINGUSERHAS,LIKESMARTCARD,HARDWARETOKENETC21ONLINEBANKINGSECURITYWEBHASBECOMETHEONLYMEDIUMFORANINCREASINGAMOUNTOFBUSINESSANDOTHER3SENSITIVETRANSACTIONSFORONLINEBAN
11、KINGALMOSTALLBROWSERSANDSERVERSDEPLOYSSL/TLSPROTOCOLSTOADDRESSCONCERNSABOUTSECURITYBUT,EVENTHEUSAGEOFSSL/TLSBYBROWSERSSTILLALLOWSWEBSPOOFING,THATIS,MISLEADINGUSERSBYIMPERSONATIONORMISREPRESENTATIONOFIDENTITYOROFCREDENTIALSTHEREAREDIFFERENTTYPESOFRISKSASSOCIATEDWITHONLINEBANKINGSECURITYFORUSERCREDENT
12、IALSHASBECOMEMUCHMOREIMPORTANTTHANANYTHINGINDEED,THEREISANALARMINGINCREASEINTHEAMOUNTOFREALLIFEWEBSPOOFINGATTACKS,USUALLYUSINGSIMPLETECHNIQUESOFTEN,THEATTACKERSFRAUDULENTLYREDIRECTSTHEUSERTOSPOOFEDWEBSITEBYSENDINGHERSPOOFEDEMAILMESSAGESTHATLINKTOTHESPOOFEDWEBSITESTHISISOFTENCALLEDPHISHINGATTACKTHEGO
13、ALOFTHEATTACKERISOFTENTOOBTAINUSERIDS,PASSWORDS/PINS,ANDOTHERPERSONALANDFINANCIALINFORMATIONSOMEOFTHERISKSASSOCIATEDWITHONLINEBANKINGAREASFOLLOWINGWEBSPOOFINGANDPHISHINGATTACKSDNSCACHEPOISONINGPHARMINGMALWARETROJANHORSES,BACKDOORS,ROOTKITS,KEYLOGGERSCREDENTIALSTEALINGATTACKSCHANNELBREAKINGATTACKSNIG
14、ERIAN419ANDOTHERSCAMS22AUTHENTICATIONMETHODSTHEREAREDIFFERENTAUTHENTICATIONMETHODSUSEDFORONLINEBANKINGSECURITYWITHINVOLVEDIFFERENTAUTHENTICATIONFACTORSLIKEPASSWORD,PIN,PASSPHRASEMOSTBANKSCONDUCTTWOFACTORAUTHENTICATIONONEOFWHICHBEINGBASEDONTHEKNOWLEDGEOFSOMEDATAIESOMETHINGTHEUSERKNOWSTHEACTUALIMPLEME
15、NTATIONSMAYVARY,STILLUSERNAMEPASSWORDCOMBINATION,PASSPHRASESORPINNUMBERSARETHEMOSTCOMMONLYAPPLIEDINORDERTOINCREASESECURITY,MOSTBANKSEMPLOYASECONDAUTHENTICATIONFACTORATOKENTHATUSERPOSSESSESTHEIMPLEMENTATIONSOFTHEAUTHENTICATIONFACTORCANBECLASSIFIEDASFOLLOWSONETIMEPASSWORDAPPROACHTOKENSINFORMOFONETIMEP
16、ASSWORDSAREVERYPOPULARINSCANDINAVIANCOUNTRIESMAINADVANTAGEOFONETIMEPASSWORDSISTHEFACT,THATTHEYCANBEUSEDONLYONCEANDBECOMEINVALIDAFTERWARDS4CERTIFICATEBASEDAPPROACHCERTIFICATESARESOFTWARETOKENSTHATREQUIREPKIPUBLICKEYINFRASTRUCTUREINTHECASEOFCERTIFICATEBASEDAPPROACHACERTIFICATEISUSEDASTHESECONDAUTHENTI
17、CATIONFACTORTHEYCANBESTOREDEITHERONTHEHARDDRIVEORANOTHERSTORAGEDEVICEEGUSBSTICK,SMARTCARDUSUALLYBANKSEMPLOYTHECOMBINATIONOFACERTIFICATETOGETHERWITHUSERNAMEPASSWORD,PASSPHRASEORPINNUMBERTIMERBASEDSHORTPASSWORDAPPROACHTIMERBASEDONETIMEPASSWORDISGENERATEDUSINGHARDWAREGENERATORSEGSECUREIDADDITIONALLY,AP
18、INORPASSWORDISUSEDTOGETHERWITHONETIMEPASSWORDONCETHEPASSWORDISGENERATED,ITISVALIDONLYFORSOMESPECIFICTIMEINTERVALTHISAPPROACHISNOTONLYUSEDBYBANKS,BUTALSOEMPLOYEDBYPROVIDERSOFOTHERSERVICESLIKEPAYPALOREBAYCERTIFICATESMARTCARDBASEDAPPROACHINONLINEBANKINGSMARTCARDSCANBEUSEDTOSTORECERTIFICATESORASDEVICESF
19、ORGENERATINGONETIMEPASSWORDSWHENUSINGSMARTCARDS,CARDREADERISESSENTIAL3DIFFERENTAUTHENTICATIONSOLUTIONSFROMSECURITYANDUSABILITYPERSPECTIVEINTHISSECTIONWEHAVEANALYZEDANDCOMPAREDTHEDIFFERENTSOLUTIONSFROMBOTHSECURITYANDUSABILITYPERSPECTIVEAPPLICATIONSWHICHCONCERNSWITHMAJORSECURITYANDUSABILITYPROBLEMS,ES
20、PECIALLYINONLINEBANKINGSOLUTIONSAREBEINGUSEDBYCUSTOMERSWHOARELESSFAMILIARWITHTHETHREATSANDISSUESRELATEDTOTHESEAPPLICATIONSTHESESOLUTIONSAREBEINGUSEDBYALMOSTALLBANKSWHICHMAKEPOSSIBLEFORTHEMTOSERVEFARMORECUSTOMERSATTHEFRACTIONOFCOST31SECURITYFROMTHESECURITYPOINTOFVIEWTHEFIRSTSTEPISTOLOOKMORECLOSELYATT
21、HETHINGSTHATMAKEONLINEBANKINGAUTHENTICATIONMETHODSTOOMUCHSUSCEPTIBLETOATTACKSOFFLINECREDENTIALSTEALINGATTACKSAREONLYHARMFULFORTHOSEMETHODSINWHICHSECUREDDATAISVALIDFORLONGTIMEPERIOD,FOREXAMPLESTATICPASSWORDSFIXEDPASSWORDSANDDATAISENTEREDONUNTRUSTEDDEVICESSUCHASAUSERSCOMPUTERTHATHASNOANTIVIRUSORFIREWA
22、LLSTATICPASSWORDCANEASILYBEOBTAINEDBYMALWARELIKETROJANHORSESANDKEYLOGGERSWHICHRECORDTHEINPUTENTEREDBYTHEUSERVIATHEKEYBOARDASTATICPASSWORDONCEOBTAINEDBYTHEATTACKERCANBEUSEFULFORHIMUNTILUSERNOTICESTHATTHEPASSWORDHASBEENSTOLEN5ONEOFTHESOLUTIONSOFTHEPREVIOUSPROBLEMISONETIMEPASSWORDSOTPASPREVIOUSLYDISCUS
23、SEDTHEREARESEVERALTYPESOFONETIMEPASSWORDSONEOFTHEORMSOFOTPISSCRATCHLISTWHICHISISSUEDTOTHEUSERBYHEBANKEACHPASSWORDONTHESCRATCHLISTISVALIDFORONLYONETIMELOGINTHEREMAYBEAPROBLEMWITHSUCHMETHOD,THATSOMEUSERSSTORETHESEPASSWORDSONTHEIRCOMPUTERSFORCONVENIENCEINTHISWAYTHESEPASSWORDSMAYBEEXPOSEDTOOFFLINECREDEN
24、TIALSTEALINGATTACKSTHISSCHEMEMAYBESLIGHTLYMORESECUREBECAUSEBANKINGSERVERMAYSPECIFYWHICHPASSWORDWILLBEUSEDINTHESCRATCHLISTNEXTSOTHESECURITYOFTHISSCHEMEEQUIRESTHATTHEPASSWORDSARENOTSTOREDTOINSECUREDEVICESLIKECOMPUTERSETCTHISPROBLEMISOVERCOMEBYANOTHERTECHNIQUETHATEVERYTIMEGENERATESNEWPASSWORDEITHERBASE
25、DONTIMESYNCHRONIZEDOTP,NONIMESYNCHRONIZEDOTPORCHALLENGEBASEDPASSWORDSDEPENDINGONTHEMETHODUSEDINTHESEMETHODSUSERMUSTMANUALLYCOPYTHEPASSWORDFROMMICROPROCESSORBASEDHARDWARETOKENTOWEBFORMSOTHEAUTHENTICATIONINTHESEMETHODSIEHARDWARETOKENPUBLICKEYNFRASTRUCTURE,THEREISLESSCHANCEFOROFFLINECREDENTIALSTEALINGA
26、TTACKSINUNSECUREDCOMPUTERSBUTTHESEMETHODSARESUSCEPTIBLETOONLINECHANNELBREAKINGATTACKSINTHESESCHEMESTHEBANKASSIGNUSERSWITHAMATCHINGPRIVATEANDPUBLICKEYANDATRUSTEDAUTHORITYISSUESADIGITALCERTIFICATETHISCERTIFICATEVERIFIESTHEUSERNAMEISCORRESPONDINGTOTHEGIVENPUBLICKEYANDTHERESPECTIVEPRIVATEKEYISVALIDONTHE
27、BASISOFTHEPRIVATEKEYANDCERTIFICATEANAUTHENTICATEDSSL/TLSCONNECTIONISESTABLISHEDBETWEENBANKSERVERANDUSERSCOMPUTERINTHISCASETHEISSUEISWITHTHEPROTECTIONOFPRIVATEKEYOFUSERFROMDIFFERENTMALWARESONEOFTHEPOSSIBILITIESISTOSTORETHEKEYASSOFTTOKENWHICHISBASICALLYANENCRYPTEDFILESTOREDONUSERSCOMPUTER,BUTINTHISCAS
28、ETHEKEYISVULNERABLETOOFFLINECREDENTIALATTACKSINORDERTOAVOIDTHISAMBIGUITYTHETAMPERRESISTANTHARDWARELIKESMARTCARDSANDUSBSTICKSETCAREUSEDTHESEDEVICESEXPOSEPRIVATEKEYRELATEDFUNCTIONALITYONLYFIGURE1SHOWSTHETAXONOMYOFINTERNETBANKINGAUTHENTICATIONMETHODSTHESEMETHODSARECLASSIFIEDACCORDINGTOTHEIRRESISTANCEAG
29、AINSTOFFLINECREDENTIALSTEALINGANDONLINECHANNELBREAKINGATTACKS32USABILITYTHEUSABILITYOFTHESYSTEMISTHATHOWFEASIBLEISFORTHEUSERTOUSETHESYSTEMINAREDEFINEDSOMESECURITYUSABILITYPRINCIPLESTHESEPRINCIPLESEXPLAINDIFFERENTTYPESOF6USERINVOLVEMENTWITHSECURITYAPPLICATIONSLIKEONLINEBANKINGSECURITYACTIONSECURITYAC
30、TIONISWHENUSERENTERSCREDENTIALSTOELICITSOMESECUREDINFORMATIONONEOFTHEEXAMPLESOFSECURITYACTIONISENTERINGANDSUBMITTINGUSERPASSWORDSECURITYCONCLUSIONSECURITYCONCLUSIONISTOOBSERVETHESECURITYSTATEOFTHESYSTEMONEOFTHEEXAMPLESOFSECURITYCONCLUSIONISTOOBSERVEWHETHERCOMMUNICATIONISPROTECTEDBYSSLTHEREAREUSABILI
31、TYPRINCIPLESREGARDINGTOSECURITYACTIONANDSECURITYCONCLUSIONUSABILITYPRINCIPLESREGARDINGSECURITYACTIONAREUSERSHAVEUNDERSTANDINGOFTHESECURITYACTIONSREQUIREDUSERSCANIMPLEMENTTHEIGHTSECURITYACTIONSTHELOADOFSECURITYACTIONSMUSTBEACCEPTABLETHELOADOFREPEATINGTHESECURITYACTIONSFORPRACTICALTRANSACTIONSMUSTBEAC
32、CEPTABLEUSABILITYPRINCIPLESREGARDINGSECURITYCONCLUSIONAREUSERMUSTHAVEPROPERUNDERSTANDINGOFTHEPRECAUTIONSTOMAKESAFETRANSACTIONSSYSTEMMUSTPROVIDETHEDETAILEDINFORMATIONFORDERIVINGTHESECURITYCONCLUSIONTHELOADOFSECURITYCONCLUSIONMUSTBEACCEPTABLETHELOADOFREPEATINGTHESECURITYCONCLUSIONFORPRACTICALTRANSACTI
33、ONSMUSTBEACCEPTABLEINTHEUSABILITYISSUEWITHTHEFIXEDPASSWORDSSYSTEMWASTINTEDWHEREASTHISWASNOTANISSUEWITHTHESECURITYBOXUSERS“12DIGITSORSOMETHINGWHICHYOUCANNOTREMEMBERSOYOUNEEDABITOFPAPERWITHYOU”FIXEDPASSWORDUSERS“IHAVETHEBOXANDIHAVEMYOWNCODETOTHEBOX”SECURITYBOXUSERINTHEUSABILITYOFPUSHBUTTONTOKEN,CARDAC
34、TIVATEDTOKEN,PINSECUREDTOKENTECHNIQUESISEXPERIMENTALLYMEASUREDTHERESULTWASTHATTHEPUSHBUTTONTOKENWSAHAVINGTHEHIGHUSABILITYWHILECARDACTIVATEDTOKENWASHAVINGMEDIUMANDPINSECUREDTOKENWASHAVINGLOWUSABILITYIFWESEEINTHETERMSOFSECURITYTHEPINSECUREDTOKENWASHAVINGHIGHWHILECARDACTIVATEDTOKENWASHAVINGMEDIUMANDPUS
35、HBUTTON7TOKENWASHAVINGLOWSECURITYINHEREARESUGGESTEDAVARIETYOFSOLUTIONSTOIMPROVETHEUSABILITYOFSMSBASEDAUTHENTICATIONBYPROVIDINGBETTERUSERINTERFACEINCERTIFICATEBASEDAUTHENTICATIONAPPROACHESLIKEUSBANDSMARTCARD,USABILITYISSUEWITHSMARTCARDISTHATISORDERTOMAKEONLINETRANSACTIONUSERMUSTHAVECARDREADERTOMAKEON
36、LINETRANSACTIONWHILEUSBDEVICEISSIMPLEPLUGANDPLAYHAVINGNOSPECIALDEVICEREQUIREMENT4RISKASSESSMENTMEASURINGCREDITRISKFORBANKSISPARTICULARLYCHALLENGINGBECAUSEOFTHEIMPORTANCEOFFINANCIALLINKAGESINTHEBANKINGSYSTEMTHEIMPLEMENTATIONOFAPPROPRIATEAUTHENTICATIONMETHODOLOGIESSHOULDSTARTWITHANASSESSMENTOFTHERISKP
37、OSEDBYTHEINSTITUTIONSINTERNETBANKINGSYSTEMSTHERISKSHOULDBEEVALUATEDINFOLLOWINGPERSPECTIVETYPEOFCUSTOMEREGRETAILORCOMMERCIALCUSTOMERTRANSACTIONALCAPABILITIESEGBILLPAYMENT,WIRETRANSFER,LOANORIGINATIONTHESENSITIVITYOFCUSTOMERINFORMATIONBEINGCOMMUNICATEDTOBOTHINSTITUTIONANDTHECUSTOMERTHEEASEOFUSINGTHECO
38、MMUNICATIONMETHODTHEVOLUMEOFTRANSACTIONSRISKASSESSMENTISTHEPROCESSBYWHICHBUSINESSESANDORGANIZATIONSFOCUSONCRITICALAREASOFCONCERNANDPRIORITIZETHEIRUSEOFRESOURCESINORDERTOMAXIMIZERESPONSEANDRECOVERYEFFORTSRISKASSESSMENTISEXTREMELYIMPORTANTINONLINEBANKINGSECURITYTHEPROCESSSHOULDIDENTIFYALLTRANSACTIONSA
39、NDLEVELSOFACCESSASSOCIATEDWITHINTERNETBASEDCUSTOMERPRODUCTSANDSERVICESIDENTIFYANDASSESSTHERISKMITIGATIONTECHNIQUES,INCLUDINGAUTHENTICATIONMETHODOLOGIES,EMPLOYEDFOREACHTRANSACTIONTYPEANDLEVELOFACCESSINCLUDETHEABILITYTOGAUGETHEEFFECTIVENESSOFRISKMITIGATIONTECHNIQUESFORCURRENTANDCHANGINGRISKFACTORSFORE
40、ACHTRANSACTIONTYPEANDLEVELOFACCESS5DISCUSSIONSECURITYANDUSABILITYBOTHAREIMPORTANTASPECTSWHICHNEEDTOBECONSIDEREDIN8ONLINEBANKINGAUTHENTICATIONSOLUTIONSONLINESOLUTIONSARENOTJUSTTOBEDESIGNEDFROMSECURITYPERSPECTIVEBUTUSABILITYMUSTALSONEEDTOBECONSIDEREDINSIMPLEWORDSWEMAYSAYTHATWENEEDUSABLESECURITYSYSTEMM
41、USTNOTBEDESIGNEDJUSTTOFULFILLREQUIREMENTOFTHEBANKSBUTALSOTOSATISFYITSUSERSCUSTOMERSREQUIREMENTSONTHEOTHERHAND,INORDERTOSECURELYUSEONLINEBANKINGAUTHENTICATIONAVERAGEUSERMUSTHAVESOMETECHNICALEXPERTISETOMAINTAINTHESYSTEMUSERMUSTBEAWAREOFTHEISSUESLIKEFAILUREOFAUTOUPDATEETCBUTTHESETASKSARECHALLENGINGFORA
42、NAVERAGECOMPUTERUESER6FUTUREWORKMOSTOFTHEBANKSWHICHPROVIDEONLINESERVICESAREUSINGTWOFACTORAUTHENTICATIONMETHODSTWOFACTORAUTHENTICATIONMETHODSHAVEBEENINTRODUCEDBYBANKSINRESPONSETOTHETRADITIONALPHISHINGATTACKS,ANDTHESEMETHODSAREINDEEDEFFECTIVEINSTOPPINGSUCHATTACKSAPARTFROMBENEFITSTHEREARESOMEISSUESASSO
43、CIATEDWITHTHESEMETHODSONEOFTHEMAJORISSUESISTWOFACTORAUTHENTICATIONSOLUTIONSAREVERYCOSTLYCOSTISNOTONLYASSOCIATEDWITHTHEIMPLEMENTATIONOFTHESOLUTIONSBUTEXPENSEFORMAINTENANCEOFTHESYSTEM,ANDTRAININGTHEUSERTOADOPTTHENEWSYSTEMRESEARCHISCURRENTLYGOINGONTOMAKEPOSSIBLEPERSONALELECTRONICDEVICESSUCHASMOBILEPHON
44、ES,ANDPERSONALDIGITALASSISTANTSPDASTOBEHIGHLYSECUREFORONLINEBANKINGTRANSACTIONSONEMETHODISTOGENERATECIPHERTEXTREPRESENTATIONOFTHEIRPININCIPHERTEXTDATAHASBEENENCRYPTED,ANDISUNREADABLEUNTILITHASBEENDECRYPTEDINTOPLAINTEXTWITHAKEYTHEFUNCTIONALITYISUNLIKETHEELECTRONICTOKEN,ANDSEEKSTOUSEEXISTINGTECHNOLOGY
45、THATMAYALREADYBEINTHEPOSSESSIONOFPOTENTIALUSERS,TOREDUCECOSTSTHEREISALSORESEARCHGOINGONFORDEPLOYINGVOICEAUTHENTICATIONTECHNOLOGIESFORBANKSTOADDANEXTRALAYEROFSECURITYFORTHEIRONLINEANDTELEPHONEBANKINGCUSTOMERSVOICEAUTHENTICATIONISRELIABLE,BUTSHOULDBEUSEDWITHOTHERFORMSOFAUTHENTICATIONSOTHATIFONEMETHODC
46、REATESAQUESTION,OTHERMETHODHELPSRESOLVEUNCERTAINTYABANKMAYHAVEINAUTHENTICATINGUSERCONTINUOUSRESEARCHISREQUIREDTOMEETTHEGROWINGNEEDSFORSECURITYOFTHEONLINESERVICEPROVIDERSLIKEBANKSSERVICEPROVIDERSNEEDSUCHASYSTEMWHICHISHIGHLYUSERFRIENDLYBUTWITHNOCOMPROMISEONSECURITYOFTHESYSTEMFINALLY,INORDERTOEVALUATE9
47、THEPERFORMANCEOFTHENEWSCHEMEANINVESTIGATIONANDRESEARCHISNEEDED7CONCLUSIONINANENVIRONMENTWHEREUSERSARECONTINUALLYAFFECTEDBYTHERISKSASSOCIATEDWITHONLINEBANKING,ITISIMPORTANTTHATUSERMUSTBEAWAREOFTHEFACTORSWHICHINFLUENCETHEIRTRUSTTWOFACTORAUTHENTICATIONMETHODSHAVEBEENINTRODUCEDBYBANKSINRESPONSETOTHETRAD
48、ITIONALPHISHINGATTACKS,ANDTHESEMETHODSAREINDEEDEFFECTIVEINSTOPPINGSUCHATTACKSONEOFTHEBIGCHALLENGESFORONLINEBANKINGISTOMAINTAINTHEBALANCEBETWEENTHESECURITYANDUSABILITYOFTHESOLUTIONSPROVIDEDINTHISPAPERWEHAVEANALYZEDANDCOMPAREDTHEDIFFERENTSOLUTIONSFROMBOTHSECURITYANDUSABILITYPERSPECTIVEWEHAVEALSOPERFOR
49、MEDRISKANALYSESBASEDONTHEPRESENTEDAUTHENTICATIONSOLUTIONSIDENTITYMANAGEMENTANDAUTHENTICATIONSYSTEMSNEEDTOPROVIDEADEQUATEUSABILITYANDSECURITYWEAREQUITEHOPEFULTHATTHETWOFACTORAUTHENTICATIONMETHODSHAVEBEENPROVIDINGONLINEBANKSANDOTHERONLINESERVICEPROVIDERSTOBEBETTERPREPAREDFOREMERGINGRISKS,WHICHNEEDUTMOSTSECURITYANDUSABILITY10外文文献译文标题网上银行安全资料来源瑞典LINKOPINGS大学信息安全课程研究报告作者FAHEEMRAMZANTEHMANPERVAIZ摘要在本文中,我们从安全性和实用性的角度比较和分析了不同的解决方案,还在风险分析的基础上提出了身份认证的解决方案。1介绍随着时间的推移,网上银行正在被越来越多的客户接受并信任。旅行支付账单,在其他账户转账,查看贷款余额等,这些都是网上银行的优势。促进网上银行系统增长的其中一个原因就是它的可用性。网上银行认证方法有许多的技术支持,增加这些技术的安全性和可用性变得越来越迫切。安全性的重要意义在于客户将可