Internet Banking Safety Framework: An Evaluation of the Banking Industry in Bangladesh

Internet Banking Safety Framework: An Evaluation of the Banking Industry in Bangladesh

Ayon Dutta, Partho Ghosh, Avishak Bala
Copyright: © 2022 |Pages: 11
DOI: 10.4018/978-1-6684-3448-2.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The internet is part and parcel of our everyday lives. Internet banking is playing a major role. But the risk is always there: malpractitioners always ready with their unethical and illegal ways of making crimes. Internet banking is the updated medium of communication to serve customers. Recently, the use of the internet in the banking sector of Bangladesh has increased rapidly. Through the internet banking system, banks have made a consequential growth and the number of frauds also has increased. Like other countries, Bangladesh is facing security problems. It is not totally free form risk and fraudulent activities. This chapter unveils internet banking crimes methodology and the limitations of existing security systems. To mitigate the internet security problems, manifold-layered security systems should be ensured among the clients and the banks. The internet banking security structure and its manifold-layered security systems have been developed and evaluated through an expert evaluation method.
Chapter Preview
Top

Discussion

This paper pays concentration on client-side susceptibility; this is usually occurred by unauthorized software on devices. Internet banking is the updated medium of communication to serve customers (Danaiata, 2014). Recently the use of the internet in the banking sector of Bangladesh has increased rapidly. Through the internet banking system, banks have made a consequential growth and the number of frauds also has increased. The use of the unsafe application is another customer-side risk. The invaders take the opportunity of using unsafe applications to access or manipulate clients’ sensitive information and hack users’ application sessions.

Complete Chapter List

Search this Book:
Reset