Digital Banking Practical 5
Digital Banking Practical 5
• Goal: Find reliable sources (articles, blog posts, whitepapers) that cover
security features, technologies, and best practices in digital banking.
• Search Engine: Use popular search engines like Google or Google Scholar
for academic sources.
Google Search: Type your selected keywords into the search bar and examine the
results on the first few pages.
1. Look for relevant sources, such as those from authoritative sites (e.g., security
blogs, financial institutions, tech websites).
2. Use search modifiers (e.g., add “filetype ” to find whitepapers, or include dates
for recent sources).
2. Encryption
• What it is: Converts sensitive data (e.g., personal information, banking
details) into unreadable code while it's being transmitted or stored.
• How it works: Banks use encryption protocols like SSL (Secure Socket
Layer) or TLS (Transport Layer Security) to protect data exchanged
between the user and the bank's servers.
• Why it matters: Prevents hackers from intercepting and reading sensitive
information during online transactions.
3. Biometric Authentication
• What it is: Uses unique biological characteristics such as fingerprints,
facial recognition, or voice recognition to verify the user’s identity.
• How it works: The bank’s mobile app or website captures the biometric
data, which is compared to the stored template for authentication.
• Why it matters: Provides a more secure and convenient alternative to
passwords, which can be forgotten or stolen.
6. End-to-End Encryption
• What it is: Ensures that messages and transactions between the user and
the bank are encrypted at both ends (from sender to recipient).
• How it works: Data is encrypted before being sent and only decrypted
when it reaches its final destination.
• Why it matters: Protects data from being intercepted during transit,
providing enhanced security for communications between users and banks.
7. Time-Outs and Session Management
• What it is: Automatically logs users out after a certain period of inactivity.
• How it works: If no activity is detected after a few minutes, the banking
system will end the session, requiring the user to re-authenticate to
continue.
• Why it matters: Prevents unauthorized access if a user leaves their device
unattended or forgets to log out.
9. Behavioural Biometrics
• What it is: Analyzes the user’s typical behavior patterns (e.g., typing
speed, swipe gestures, or mouse movements) to detect anomalies in real
time.
• How it works: A system tracks how a person interacts with the banking
platform and compares it with their historical data to verify their identity.
• Why it matters: Adds an invisible layer of security that continuously
monitors user behavior to identify and block unauthorized access.
10. Secure Mobile App Development
• What it is: Ensuring that the mobile banking apps are designed with
security in mind, including regular updates and patches for vulnerabilities.
• How it works: Mobile apps undergo rigorous testing for weaknesses like
insecure storage or flawed encryption before being released.
• Why it matters: Reduces the likelihood of vulnerabilities that hackers can
exploit through mobile devices, a key target in today’s digital landscape.
11. Tokenization
• What it is: Replaces sensitive account information with unique
identification symbols or "tokens" during transactions.
• How it works: Instead of sending actual account numbers or card details,
the system generates a random token that can be used to complete the
transaction without exposing the actual information.
• Why it matters: Protects sensitive data from being compromised, even if
transaction details are intercepted by attackers.
a) Authentication
Definition: Methods used to verify the identity of the user or device accessing
the banking system.
• Features:
o Two-Factor Authentication (2FA): Verifies identity through two
different forms of credentials (password + one-time code).
o Biometric Authentication: Uses fingerprint, facial recognition, or
voice recognition to authenticate users.
o Multi-Factor Authentication (MFA): Involves using more than
two factors, often adding security questions or tokens.
• Purpose: Ensures only authorized users access the banking platform.
b) Data Protection
Definition: Security measures that safeguard sensitive information from being
exposed or stolen.
• Features:
o Encryption: Converts sensitive data into unreadable formats during
transmission and storage.
o End-to-End Encryption (E2EE): Ensures that data is encrypted at
the origin and only decrypted at the final destination.
o Tokenization: Replaces sensitive data with non-sensitive
equivalents (tokens) for safer transactions.
o Secure Mobile App Development: Involves secure coding
practices and regular updates to prevent vulnerabilities.
• Purpose: Protects personal and financial data from unauthorized access or
breaches.
c) Fraud Prevention
Definition: Techniques and technologies that prevent fraudulent activities or
detect them in real-time.
• Features:
o Real-Time Fraud Detection: Uses algorithms and AI to monitor
and analyze transactions for suspicious activity.
o Behavioral Biometrics: Tracks user behavior (e.g., typing patterns,
mouse movements) to detect unusual activity.
o Multi-Layer Security (Defense in Depth): Combines several
security tools like firewalls, intrusion detection, and encryption to
create multiple layers of defense.
o Transaction Monitoring: Monitors transactions in real-time,
flagging anything that appears irregular.
• Purpose: Identifies and prevents fraudulent activities before they can
cause harm.
5. Summarize Findings
• Process: Create a summary or report that highlights the key features in
each category, noting any commonalities or unique solutions.
• Goal: Organize the information in a way that makes it easy to reference or
present.
• Details:
o Provide an overview of each category, along with the security
features that were most frequently mentioned.
o Note any patterns you observed, such as whether certain
technologies are gaining popularity or evolving.
o Highlight best practices in security, as discussed across multiple
sources.
4. Explain Each Security Feature
6. Tokenization
• Purpose: Protects sensitive financial data during transactions by
substituting it with a randomly generated string of characters (a "token"),
reducing the risk of data exposure if intercepted.
• How it works: Instead of transmitting actual sensitive data, such as credit
card numbers or account details, tokenization replaces this information
with a unique token. The actual data is stored securely in a token vault,
while the token itself is used for the transaction. Even if a hacker intercepts
the token, it is useless without access to the vault where the real data is
stored. This is commonly used in mobile payments (e.g., Apple Pay) and
digital wallet transactions.
7. Real-Time Fraud Detection
• Purpose: Detects and prevents fraudulent activities as they occur,
protecting users from unauthorized transactions and reducing financial loss
for banks and customers.
• How it works: Real-time fraud detection systems analyze user transactions
and behavior patterns using machine learning and AI algorithms. These
systems can flag suspicious activities, such as a sudden transaction from a
foreign country or an unusually large withdrawal, in real-time. When a
suspicious transaction is detected, the system may temporarily block it,
send an alert to the customer, or request additional verification before
proceeding.
8. Behavioral Biometrics
• Purpose: Provides continuous, invisible security by analyzing user
behavior to detect anomalies that may indicate fraudulent access.
• How it works: Behavioral biometrics track the unique ways users interact
with devices, such as their typing speed, mouse movements, and even how
they hold their smartphone. These patterns are stored and compared in real
time. If a user’s behavior suddenly changes (e.g., their typing rhythm is
significantly different), the system may flag the activity as suspicious and
trigger additional security checks. This method adds an invisible layer of
protection that operates without requiring active input from the user.