Preview

online banking

Better Essays
Open Document
Open Document
1291 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
online banking
Current Status of e-Banking
Channels in e-Banking available in Nepal
Automated Teller Machines (ATM)
Point of Sales (PoS)
Telephone Banking (Tele Banking)
Internet Banking
Mobile Banking (SMS Banking)
Current Status of e-Banking
Services Provided in e-Banking
In ATMs
Cash Withdrawal
Balance Inquiry
Fund Transfer is not available.
In PoS Terminals
Financial transactions are made via Cards.
Cash is debited from the client’s account(s).
Cash cannot be deposited.
Services Provided in e-Banking (contd…)
In Tele-Banking
Account Status check
Balance Inquiry
No fund transfer facility.
In SMS-Banking
Similar to Tele-Banking except telephone
Cell phone is required instead of telephone.
Current Status of e-Banking
Services Provided in e-Banking
In Internet-Banking
Fund Transfer within accounts (within the bank)
Get balance statement online
Pay bills online
Security measures in the Bank side
All banks that are providing internet-banking facility have the system consisting of the followings:
Password controlled system entry.
VeriSign issued Digital ID for the Bank’s server.
Secure Socket Layer (SSL) protocol for data encryption.
Firewall setup.
Frauds in e-Banking
Most popular frauds in e-Banking (worldwide) are
Card duplication
In this, the information in the cards are copied to another card.
Although the duplicated card may have other information, but the financial transactions are done from the original account.
Key Loggers
These are the programs which stores the characters as typed in the keyboard
The account no./passwords entered can be tracked via key loggers.
‘Phishing’ e-mails
E-mails pretending to be from the bank asking to input the username and password to update the information.
After submitting the information, the information passes to the false site where the information is captured.
In Nepal, no e-banking frauds have been found yet.
Lack of understanding of internet technology may be the reason.
E-banking is

You May Also Find These Documents Helpful

  • Good Essays

    These web entities are designed to look like a normal email or website, that’s how hackers convince their victims to hand over personal information.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Despite widespread public perception that FTC. How Not to Get Hooked by a ‘Phishing” Scam. June 2004. The Internet is a major contributor to the rise in identity theft, surveys indicate that comparatively few individuals who know how a thief acquired their personally identifiable information (PII) cite the Internet. Some attribute the rise in identity theft instead to carelessness by businesses in handling PII, and by credit issuers that grant credit without proper checks. The Internet may play a role, however. Today, attention is focused on a relatively new scam called “phishing.” Phishing refers to a practice where someone misrepresents their identity or authority in order to induce another person to provide PII over the Internet. Some common phishing scams involve e-mails that purport to be from a financial institution, ISP, or other trusted company claiming that a person’s record has been lost. The e-mail directs the person to a website that mimics the legitimate business’ website and asks the person to enter a credit card number and other PII so the record can be restored. In fact, the e-mail or website is controlled by a third party who is attempting to extract information that will be used in identity theft or other crimes. The FTC issued a consumer alert on phishing in June 2004. Several laws restrict the disclosure of consumer information and require companies to ensure the security and integrity of the data in certain contexts — Section 5 of the Federal Trade Commission Act, the Fair Credit Reporting Act (FCRA), and Title V of the Gramm-Leach-Bliley Act. Congress also has passed several laws specifically related to identity theft: the 1998 Identity Theft and Assumption Deterrence Act; the 2003 Fair and Accurate Credit Transactions (FACT) Act; and the 2004 Identity…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    It is important to make bank deposits for a medical office as quickly as possible for many reasons. One of the important reasons would be that it is a courtesy of the maker of the check. If the check isn’t deposited in a timely fashion then their checkbook will become off balance and they would have to spend time figuring out the reason why and that could be upsetting to the patient and possibly make the medical office look bad. If the maker of the check doesn’t keep track of their balance and just go by the balance given at an ATM they could continue writing checks and when the office goes to deposit the check there could be insufficient funds and the check will be returned causing a hassle for both parties involved. Another reason why could be that the maker of the check could stop payment for whatever reason and the office would not receive their payment. Also, if the office has a pile of checks waiting to be deposited it could become difficult to keep track of. They could easily become misplaced, lost, or possibly even stolen. Most checks have a time limit on when they can be deposited. If they are not deposited right away they can be forgotten about. If the medical office tries to cash the check past the time limit for cashing they could be denied and not receive the payment for their services.…

    • 521 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Phishing Scams

    • 3014 Words
    • 13 Pages

    The electronic world is embracing consumers and criminals. According to Report on Phishing by Binational Working Group on Cross-Border Mass Marketing Fraud, when internet users receive emails from trusted web sites such as famous financial institution, these emails redirect internet users to phony web sites that appear similarly to famous banks web sites. In addition, many customers are receiving phone calls from person who claims that he is working with famous financial institution asking them to provide him with their personal information; in fact this person has no relation to any organization. His purpose is to obtain specific key information that helping him to access people bank accounts or to enter inside their personal computers.…

    • 3014 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Universal Banking

    • 4852 Words
    • 20 Pages

    The second industrial revolution involved many new products and technologies, especially involving machinery, electricity, and chemicals. The novelty of these production processes posed severe information problems for external sources of finance. Firms were producing new goods in new ways on an unprecedented scale. Firms needed quick access to heavy financing from sources whose information and control costs were greater because of the difficulty of…

    • 4852 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Phishing Scams

    • 2858 Words
    • 12 Pages

    This new scam, which is increasing in a very significant pace, is called "Phishing Scams". Phishing is one of the Identity Theft form, where these con artists use official…

    • 2858 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Data intercepted by use of copycat web site. The way they do this is to send you an e‐mail…

    • 5077 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Data Protection

    • 735 Words
    • 3 Pages

    Some of the information that is collected by organisations online may not be as accurate as what they would be if they information was collected in person, as we know that people can lie over the internet and input false details such as their name, address, post code, age, gender etc.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Good Essays

    social crime

    • 1719 Words
    • 7 Pages

    Account takeover happens when a criminal tries to take over another person's account, first by gathering information about the intended victim, and then contacting their card issuer while impersonating the genuine cardholder, and asking for mail to be redirected to a new address. The criminal then reports the card lost and asks for a replacement to be sent.…

    • 1719 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Fraud Detection

    • 3042 Words
    • 13 Pages

    • Credit Card Fraud : This scam makes use the card’s details without possessing the physical…

    • 3042 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Electronic banking plays a vital role in the economic development of a country. Due to immense advances of information and communication technology (ICT), it certainly introduced new dimensions for the global banking community.…

    • 1573 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Phishing: Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data.…

    • 2004 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Phishing Attack

    • 4826 Words
    • 20 Pages

    Most methods of Phishing use some form of technical deception designed to make a link in an e-mail appear to belong to the spoofed organization. Misspelled URLs or the use of sub…

    • 4826 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Future of Crime Essay

    • 2189 Words
    • 9 Pages

    Phishing has become a popular method for cyber-thieves. Phishing exists when people begin thinking that they are providing their information to a legitimate business, only to discover that the data they provided directed into the possession of thieves. A prime example of this occurred in February 2005. According to The National Crime Prevention…

    • 2189 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Q: 5 To what extent do you prefer the use of internet banking over Credit card/Debit cards?…

    • 319 Words
    • 2 Pages
    Satisfactory Essays

Related Topics