Article

Article title SECURITY OF BANKING REMOTELY SYSTEM
Authors Firas Naziyah Mahmood, Hayder Hussein Shakir, K. Ye. Rumyantsev
Section SECTION V. TELECOMMUNICATIONS AND INFORMATION SECURITY
Month, Year 02, 2018 @en
Index UDC 654.024:004.056
DOI 10.23683/2311-3103-2018-2-256-263
Abstract SMS banking allows customers to request and receive banking information from their Bank on their mobile phones. Clients can securely manage their Bank accounts, balances of current account, send cheque requests and account fees. Secured banking channel SMS also acts as the means of the Bank alerting its customers, especially in an emergency situation. The aim of this paper to design and implement the program/ application to send and received a secured SMS for banking works, installing on client’s devices by authorized bank employer. This program/Application decrypt the code that send to the client by one of the authorized telecommunication company servers according to contract with services provider company. The code expiration is 15 seconds for increasing the security levels and if the client doesn’t send the code, the company send a new SMS to ask him to resend a new code, and we can make a limitation of the money Drawdowns per day according to dealing with the costumer contract with bank for increasing the level of security. IN case of using the card for drawdown more than the money that dealing with bank, the bank preform the locking procedure for that account and stopping the drawdown process and Report this situation from the customer of the bank that is under threat or other similar so. Electronic Markets (E-markets) can be more effective and less expensive way to sell products or provide services without geographical barriers. It changes the relationship of buyer-seller, improves business processes and helps reach new markets or segments through the electronic medium.

Download PDF

Keywords Banking Remotely; Security and Threats.
References 1. Adrian B.-W.; Atkinson P. and Roulet C. Bank Business Models and the Separation Issue. Financial Market Trends. – 2013.
2. Kotenko V.V., Rumyantsev K.E. Theory of Information and Protection of telecommunications: Monograph. – Rostov-on-Don: Publishing house of the SFedU, 2009. – 369 p.
3. Kotenko V.V., Rumjantsev K.Y., Котенко S.V. Methodology of the identification analysis in information systems: Monograph. – Rostov-on-Don: Publishing house of the SFedU, 2014.
– 315 p.
4. Kotenko V.V., Rumjantsev K.Y. Theoretical basis of information counteraction of the terrorism threats: the Monography. – Rostov-on-Don: Publishing house JUFU, 2014. – 228 p.
5. Kotenko V.V. Strategy of optimization of scientific creativity when resolving the problems of research activities in higher educational institutions // International Journal of applied and fundamental research: Executive Editor: Publishing house «Academy of Natural History» (Germany, An der Trift 30, 63263 Neu-Isenburg). – 2017. – No. 3 – URL: www.science-sd.com/471-25322 (05.12.2017).
6. Kotenko V.V., Lukin M.J., Mirgorodsky S.V. Strategy of decision of tasks of defence of information from positions of virtualization of processes of antijamming encryption // Izvestiya SFedU. Engineering sciences. - 2015. - No. 8 (169). - P. 46-57.
7. Kotenko V.V., Kotenko S.V. Analysis of cryptographic identification algorithms with positions virtualisation identifiers // Izvestiya SFedU. Engineering sciences. - 2015. - No. 8 (169).
- P. 32-46.
8. Amtul F. E-banking Security Issues – Is There a Solution in Biometrics? // J. Int. Ban. Com.
- August 2011. - No. 16 (2). - P. 6-13.
9. Kotenko V., Rumjantsev K., Kotenko S. New Approach to Evaluate the Effectiveness of the Audio Information Protection for Determining the Identity of Virtual Speech Images // Proc. of the Second International Conference on Security of Information and Networks. The Association for Computing Machinery (ACM). - New York. Publications Dept., ACM, Inc. 2009.
- P. 235-239.
10. Kotenko V.V., Kotenko S.V., Rumyantsev K.E., Gorbenko I.D. Optimization of information security processes in terms of virtualization relative to conditions of theoretical indecipherability // Applied Radio Electronics: Sci. Journ. – 2013. – Vol. 12. – No. 2. – P. 265-272.
11. Omariba Z.B.; Masese N.B. and Wanyembi G. Security and Privacy of Electronic Banking // Int. J. Comp. Sci. - 2012. - No. 9, Issue 4.
12. Baragnhai S.N. 2007 MS. C. Thesis. Lulea University of Technology, Sweden, 15.
13. Mirmiran S.F. and Shams A. The Study of Differences between E-commerce Impacts on Developed Countries and Developing Countries, Case Study: USA and Iran // New Marketing Research Journal Special Issue. – 2014. – P. 79-100.
14. Nejadirani F., Behravesh M. and Rasouli R. «Developing Countries and Electronic Commerce the Case of SMEs // World Applied Sciences Journal. – 2011– No. 15 (5). – P. 756-764.
15. Dehkordi L.F., Shahnazari A. and Noroozi A. A Study of the Factors that Influence the Acceptance of e-Commerce in Developing Countries: A Comparative Survey between Iran and United Arab Emirates // Interdisciplinary Journal of Research in Business. – 2011. – No. 1, Issue 6.
16. Chang Y. 2016. MS. C. Thesis. Southern Illinois University Carbondale, 9.
17. Terzia N. The impact of e-commerce on international trade and employment // Procedia Social and Behavioral Sciences. – 2011. – Vol. 24. – P. 745-753.
18. Nedelea Ş. And Adriana L. 2010 E-Marketplaces and Their Importance for Logistic Networks // Internal Auditing & Risk Management, (17).
19. Rotimi E., Awodele O. and Ajayi B.O. 2007. SMS Banking Services: A 21st Century Innovation in Banking Technology. Sci. Inf. Tech., 4.
20. Kotenko V.V., S.V. Kotenko, Rumyantsev K.E., Gorbenko Yu.I. Continuous data protection strategy from the standpoint of virtualization of ensemble of keys on a formal relationship of ensembles // Applied Radio Electronics: Sci. Journ. – 2013. – Vol. 12, No. 2, pp. 308-312.

Comments are closed.