Attacks and Authentication for Mobile Banking

Attacks and Authentication for Mobile Banking

DOI: 10.4018/978-1-5225-2759-6.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

It is important that any new product or service is based on user needs and requirements rather than being driven by technology. This is an important issue to consider with SMS and mobile banking. Research related to the usability design issues surrounding online banking are relevant to SMS banking. Concepts related to authentication, online banking processes, and other relevant information security issues are discussed further. Literature relevant to these factors is also considered throughout this process of reflection. This chapter discussed the concepts related to authentication, online banking processes and other relevant information security issues are discussed further. Literature relevant to these factors is also considered throughout this process of reflection. In next chapter discusses about Web based electronic money for online banking.
Chapter Preview
Top

Authentication

Authentication (D. R. Cheriton and W. Zwaenepoel 1984), in general, can be divided into two categories: Entity Authentication and Data Authentication. Although, we often consider these two categories to be quite similar, they are very different when it comes to why and how these authentications are carried out. While entity authentication always begins the process, data authentication comes into play after the user authentication is completed. With this said, it is important to understand that although entity authentication and data authentication are two major modes of authentication, there are different methods used to employ such authentication tactics.

Complete Chapter List

Search this Book:
Reset