1. Multilevel Authentication System for Stemming Crime in Online Banking
- Author
-
Olufunso Dayo Alowolodu, Boniface Kayode Alese, A. F. Thompson, and Blessing Emmanuel Oladele
- Subjects
Information Systems and Management ,General Computer Science ,lcsh:T58.5-58.64 ,Computer science ,lcsh:Information technology ,05 social sciences ,Authentication system ,Computer security ,computer.software_genre ,soft-token ,multilevel-security ,0502 economics and business ,cybercrime ,authentication ,0501 psychology and cognitive sciences ,050207 economics ,computer ,050107 human factors - Abstract
Aim/Purpose: The wide use of online banking and technological advancement has attracted the interest of malicious and criminal users with a more sophisticated form of attacks. Background: Therefore, banks need to adapt their security systems to effectively stem threats posed by imposters and hackers and to also provide higher security standards that assure customers of a secured environment to perform their financial transactions. Methodology : The use of authentication techniques that include the mutual secure socket layer authentication embedded with some specific features. Contribution: An approach was made through this paper towards providing a more reliable and complete solution for implementing multi-level user authentication in a banking environment. Findings: The use of soft token as the final stage of authentication provides ease of management with no additional hardware requirement. Recommendations for Practitioners : This work is an approach made towards providing a more reliable and complete solution for implementing multi-level user authentication in a banking environment to stem cybercrime. Recommendation for Researchers: With this approach, a reliable system of authentication is being suggested to stem the growing rate of hacking activities in the information technology sector. Impact on Society :This work if adopted will give the entire populace confidence in carrying out online banking without fear of any compromise. Future Research: This work can be adopted to model a real-life scenario.
- Published
- 2018