Security of banking transactions | Darkan
Security of banking transactions on the Internet.


We invite you to participate in the training.

Trojan horse in the computer
Malicious software is used today only to steal information or money and is developed commercially.
The most popular of these tools is the ZeuS, a Trojan horse for mass infections, most commonly targeted against home users. It is also currently used against public organizations and companies that use online banking. A Trojan horse can bypass even a token security. It can also encrypt all documents, demanding
a ransom.

Defense:
The risk of malware can be minimized. Use only those electronic banking systems that offer two-factor authentication, preferably with an SMS password.


The development of electronic banking systems made it possible to reach different customers for online banking services. Unfortunately, the transition from service in branches to mass Internet banking brings
with it the risk of attacks. Their victims are increasingly falling into public offices and institutions.

 
A model in which all financial transactions were carried out in branches of banks is already a thing of the past. Instead of checks and forms, electronic systems operate in which banking services are available directly from the company or institution. Switching to such systems results in new threats, which occur in parallel with
old, common fraud.



Development of electronic banking systems
Use only electronic banking systems that use SMS passwords (ZeuS and SpyEye allow you to bypass the token protection).

To confirm a transaction, use a separate phone (not a smartphone), and each SMS compares with the information on the screen.


Check the list of defined transfers.


Do not use trusted transfers.


Defend yourself from malicious software.
Do not trust your browser!
 

The most common attack is to take control of the victim's computer and replace the content of the transactional system's sites with malicious software. In this situation, the system may request alleged additional acknowledgments that will in fact serve to fund the transfer or define a new trusted recipient.
Turning off from internet banking is a real scenario - of course if earlier banks do not begin to better communicate this problem to their clients and they will not begin to educate them in some way. Can this be a problem, because in the end who should do it? It is difficult to expect such activities from one or two players in such a competitive market.
93 percent. The respondents declare that they would interrupt the transaction if the site did not use secure certificates. Among the main concerns about online transactions, respondents mentioned theft of personal data (76%). One in five respondents is restricting their online activity due to safety concerns.
If one-fourth of computers connected to the Internet were connected to botnets for spreading spam, it means that the bankers have a real problem. Because these are the computers from which their customers unknowingly connect to the transaction system! 

There is a growing threat to the safety of online transactions. If the safety problem is Scandinavian Nordea, that means something. Penetration of internet banking among internet users reaches 80 percent. As you can see no bank should feel safe. More and more also indicates that even one-time passwords, so widespread in Polish e-banking, stop slowly enough. All due to poor customer hardware security.
We invite you to a few simple exercises.
You will reorganize and repeat your knowledge.


Test your knowledge

1. Set a secure password

Do not use a single password on all sites. Do not use passwords based on words from the dictionary, such as "kitty123". Set up a longer password, which consists of seemingly random characters, which for you will make more sense. You should change them sometime.

For how to set a secure password on the Internet, read here.

2. Have limited trust in free offers

Just like in life - on the Internet you rarely get something for free. If someone offers you something like that, think about the motives and if you do not put yourself in danger. Do not reply to emails with suspicious offers, do not click on links in messages from unknown sources.

3. Regularly check your computer

Having antivirus software should be obvious to you, without two sentences. But what you should still remember,

 This is a weekly full scan of your computer. Many programs allow you to set up an automatic scan from time to time, which you do not need to keep in mind on a regular basis.

4. Take care of your privacy

Limit your profile to social networking. By adding private content, set visibility only for friends.

 Do not accept people you do not recognize. Do not make public data that will allow you to identify your address, possessions, family relationships. Such knowledge can be exploited by perpetrators.

5. Check the authenticity of your sites

Remember that every page that needs a login should start

in the address bar of the browser from https, not http. It is also important to check the site's authenticity, which is available in browsers.





6. Pay special attention to the banks

No bank in Poland sends email to customers requesting login

and account password. It also does not send direct messages to the login page. Maile of similar content deserves only to be treated with the Delete button.

7. Carefully read the regulations

Before registering on any web site, read carefully the rules. Enough people give you money to cheat on the net.

Do not enlarge this team.

8. Be aware of the consumer

You can return the goods to the seller within 10 days

without giving a reason. Watch out! Unpacked music and programs are not refundable!

9. Do not be intimidated

Downloading movies and music is illegal? This is bullshit - do not be intimidated. You have the right to download all published works under your own authorized use. But beware! You do not have the right to continue downloading downloaded songs on the Internet or download and use paid versions of your computer programs.

10. Always be reasonable

Remember! The most important program to protect your computer online is common sense! Be alert, the enemy is not sleeping!

10 commandments secure internet


Check on the website of your bank what security is used on the website.


Always follow the security rules out there. In case of any irregularities immediately contact us

with an employee of the Bank.

 

 A computer or mobile phone connected to the Internet must have an antivirus program installed and must be up-to-date. Activation of relevant modules is also required in a security package such as an antivirus monitor, a mail scanner, or a firewall. A common mistake is to disable these modules to reduce system load.


Make Internet payments only using "certain computers."


Do not make payments online from computers in public places such as internet cafes or universities.


Contact your internet service provider to make sure they use secure distribution channels. Pay close attention to the quality and security of your Internet service provider. If you have any doubts in this regard you always have the right to ask the provider about the quality of the security offered by him.

 Install only legitimate software on your computer. Programs of unknown origin, including downloaded Peer-to-Peer (P2P) programs may be prepared by hackers and contain viruses or other malicious software.

 

It is recommended that you periodically scan your computer, in particular before entering the bank's website and executing any transaction. Most anti-virus programs with antivirus monitor enabled have detection (detection) same as antivirus scanner and no need to scan your computer. However, some programs that detect anti-virus monitor are lower than the scanner, but this is a security vulnerability.


Update your operating system and applications such as web browsers.


Hackers are constantly looking for vulnerabilities in the software that They are then used for cybercrime. Operators and applications publish patches that address vulnerability

Their products for attacks carried out through found gaps.



Do not open messages and attachments of unknown origin.


Often, such attachments contain viruses or other software that allows you to spy on your activities.

 


 Avoid encouraging sites to see very attractive content or attractive deals. Particularly dangerous websites may contain pornographic content. Also, seemingly innocent pages containing "freeware" programs can also be very dangerous, as hackers often recompile them by adding malicious code

 


Remember, no bank will ever send you queries about your passwords or other sensitive data or requests for updates.


Banks never provide inbound links to transactional websites. Letters, emails or phone calls on such matters should be treated as an attempt to delude sensitive information. Do not respond to them by submitting your confidential data. Immediately contact your bank

and report the event.


 When logged into the transaction system

Do not go away from your computer and log out when you are done close and close the browser.




confidentiality
Security services
Legal software
"Sure"
terminal
Secure internet
Automatic Updates
Attachments of the message

Computer security
Security
on the Web

Prevention
Antyvirus

Security of bank transactions in the Internet.


(click on each box to find out more).
Kliknij na obiekty żeby dowiedzieć się więcej

 


IDS

This Intrusion Detection System is designed to identify dangerous activities in the network. Looks for any unauthorized or suspicious network activity that could pose a threat to the system.

Detects unsuccessful attempts to attack or prepare for full intrusion, such as port scanning or network mapping by searching for critical servers, services, and applications. The task of IDS probes is to collect information, and the task of the management system is to process the collected information and to extract the signals from the attack.

 

 Anti-Spam Programs This is a kind of software that blocks unwanted correspondence sent electronically. Programs filter messages and use so-called blacklists of addresses and domains used by spammers. Most of these types of software have the ability to set up their own rules, which we can modify and define, for example, key words in advertising materials, thus blocking our mailbox with messages containing those words in the shipping title. However, these programs are not error-free and sometimes they can block the correspondence that should be delivered


Anti-virus programs

This is a computer software that has the task of detecting, securing, combating, removing

 and to repair damage caused by computer viruses. If the application runs with malicious software then the program will execute the appropriate action that will exclude the virus and allow access to the program running. An important function of each antivirus is to regularly update the definition of viruses included in the program. 


FireWall

A firewall is a way to protect your computers, networks, and servers from intruders. A firewall can be either computer hardware with special software or software that blocks access to our resources to unauthorized persons or programs. Only a few years ago, firewall software was available and was dedicated to important servers or large networks. However, with the rapid growth of technology, the firewall becomes the indispensable software of any home computer connected to a LAN or Internet. A firewall on such a home computer checks all incoming and outgoing network traffic, restricts and forbids access on both sides to unknown programs or users.




Make transactions with known and verified online stores. For smaller sites, check their credibility, for example, by calling the service and verifying their offer, terms of transaction, and complaints. Make sure you are not on a website pretending to be your bank / store (like the name and appearance of the site used by dishonest imitators in order to mislead and steal money). Read the terms and conditions of the online store, especially with regard to transaction security. Before making a transaction, make sure that the transmission is in secure connection using SSL / TLS.

 

 

Protect your card number and other sensitive transaction codes such as PIN, CVV2 or CVC2 - the last three digits of the number on the signature bar on the back of the card. Criminals can take possession of them by recording a card image, for example, using a cell phone with a camera, video camera, or otherwise.



Do not save the PIN code on the card or store it with the card.

In such circumstances, not only do you act contrary to the law, but also in the event of theft of your wallet or purse and use your payment card, the bank will be relieved of the obligation to cover the resulting damage.

 

 Never provide card information on pages that are not secure. For example, sites with pornographic content or websites of unknown companies offering branded goods at sensational prices. Before entering the card number on the form on the page, make sure that the data sent from the form is adequately protected (ie - to simplify - whether the address of the form starts with https and whether the site has the appropriate certificates) - this information is given by the browser, usually in the status bar at the bottom of the window). .


Never respond to e-mails from which you need to provide information about your card - report this situation to your bank.

Also, do not respond to e-mails that invite you to visit the website to verify the data, including the cards. This kind of fraud is called "phishing".


Please keep your eyes on the card number. Do not share your card number with anyone who is calling us, even if the caller is reporting that there are computer problems and asking for verification information. It is not customary for businesses to call by calling their card number. If we are initiating a call, also do not make a phone number card available when we are not sure that the caller deserves credit.

 

Phishing 

It's tricky to get sensitive personal information like passwords or credit card details by pretending to be a trusted person whose information you need urgently. This is a kind of attack based on social engineering. Today cybercriminals use phishing techniques for profit. The most popular are banks or online auctions. Phisher usually sends spam to a large number of potential victims by directing them to a Web site that pretends to be a real online bank, and in fact captures the information that the attackers put in there. The most common way is information about the alleged deactivation of the account and the need to reactivate, including any confidential information. Another common way is also to imitate the website of the Internet bank, the user enters all the necessary information to properly log in, but does not take place, and the data entered by the user is obtained by the phisher.

Card number
 PIN Code
Anti-Spam Programs
Use only secure pages
Anti-virus programs
SSL/TLS
Firewall
Card details
Phising
IDS

Security of bank transactions in the Internet


(Click the appropriate fields to find out more)..
e-mail
When you log into the transaction system do not leave the computer, And when you're done, log out and close your browser.
 Legal software and P2P (peer to peer) can guarantee the security of your computer.

 Contact your internet provider to make sure they are using it on the secure distribution channels of this service.

 Check the security of your bank on the web site. Always log on every time you log in to the security rules published there.


The bank sends you questions about your passwords or other sensitive data in which case you should update them.

 It does not matter to open the message and their attachments from unfamiliar sources.

Check








 Security of online banking systems - exercises

(choose the right answer).
Exercise 2
Specify actions and place them in the correct columns.

My account is logoned only by the bank, I do not search the account login by the search engine.
 
I never pay attention to the details of your account's recent login or login attempts.
 I do not report all the problems that occur during the execution of the transaction may be due to browser errors, internet activity, etc.

 In case of doubt about the transaction I contact the contact center of my bank

 When I use mail I never reply to messages that require details of my card.
 I do not use anti-virus, firewalls - my bank is guarding transactions for me
Safe
Unsafe
Dobra odpowiedź
Zła odpowiedź
Check
Thank you for attending the training.
0%