Security and privacy of electronic banking by




Download 0,67 Mb.
Pdf ko'rish
bet10/13
Sana25.11.2023
Hajmi0,67 Mb.
#105148
1   ...   5   6   7   8   9   10   11   12   13
Bog'liq
Security and Privacy of Electronic Banking

b) Personal firewalls 
When connecting your computer to a network, it becomes vulnerable to attack. A personal 
firewall helps protect your computer by limiting the types of traffic initiated by and directed to 
your computer. The intruder can also scan the hard drive to detect any stored passwords.
c) Secure Socket Layer (SSL) 
Secure Socket Layer (SSL) is a protocol that encrypts data between the consumer’s computer 
and the site's server. When an SSL-protected page is requested, the browser identifies the server 
as a trusted entity and initiates a handshake to pass encryption key information back and forth. 
Now, on subsequent requests to the server, the information flowing back and forth is encrypted 
so that a hacker sniffing the network cannot read the contents.
The SSL certificate is issued to the server by a certificate authority authorized by the 
government. When a request is made from the consumer’s browser to the site's server using 
https://..., the consumer’s browser checks if this site has a certificate it can recognize. 
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012 
ISSN (Online): 1694-0814 
www.IJCSI.org
442
Copyright (c) 2012 International Journal of Computer Science Issues. All Rights Reserved.


d) Server firewalls 
A firewall is like the moat surrounding a castle. It ensures that requests can only enter the system 
from specified ports, and in some cases, ensures that all accesses are only from certain physical 
machines.
A common technique is to setup a demilitarized zone (DMZ) using two firewalls. The outer 
firewall has ports open that allow ingoing and outgoing HTTP requests. This allows the client 
browser to communicate with the server. A second firewall sits behind the e-Commerce servers. 
This firewall is heavily fortified, and only requests from trusted servers on specific ports are 
allowed through. Both firewalls use intrusion detection software to detect any unauthorized 
access attempts.
Another common technique used in conjunction with a DMZ is a honey pot server. A honey pot 
is a resource (for example, a fake payment server) placed in the DMZ to fool the hacker into 
thinking he has penetrated the inner wall. These servers are closely monitored, and any access by 
an attacker is detected.

Download 0,67 Mb.
1   ...   5   6   7   8   9   10   11   12   13




Download 0,67 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Security and privacy of electronic banking by

Download 0,67 Mb.
Pdf ko'rish