Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
to
Internet Banking
Introduction to E-Banking
Security issues
Conclusions
The basis
Introduction to E-Banking
Introduction to E-Business
What is E-Bank
Why to do E-Banking
Customers have :
Collision!
their job during the day
family activities after job
WWW service
Money …
Cryptography basics
Authentication – no spoofing
Privacy – no eavesdropping
ENCRYPTED
ENCRYPTION ALG. MESSAGE DECRYPTION ALG.
(CYPHERTEXT)
MESSAGE MESSAGE
(PLAINTEXT) (PLAINTEXT)
SENDER RECEIVER
KEYES.
Symmetric approach
Asymmetric approach
Hybrid approach
ENCRYPTED
SYMMETRIC KEY MESSAGE SYMMETRIC KEY
(CYPHERTEXT)
MESSAGE MESSAGE
(PLAINTEXT) (PLAINTEXT)
SENDER RECEIVER
ENCRYPTED
PUBLIC KEY MESSAGE PRIVATE KEY
(CYPHERTEXT)
MESSAGE MESSAGE
(PLAINTEXT) (PLAINTEXT)
SENDER RECEIVER
Q1: “How can I be sure that the public key that my browser uses to send
account number information is in fact the right one for that Web site, and
not a bogus one?”
HA
Message Msg* Digest’
’
HA DS*
Digest
Digest’
Public Key
Private key DS
Equal?
4. Verification of Information
5. Certificate Creation
6. Sending/Posting of Certificate
Client Server
List of supported
ciphers
Strongest cipher
supported + DC
SSK generated
and encrypted Encrypted SSK
with PK
Decrypts SSK with own
From now
SK and sends ack.
use SSK!
Client Server
Fragments msg.
into blocks (bytes) Msg. block MAC
Web server
Branch office
terminals
Security
subsystem
SSL connection
Internet
User
Security Firewall
On Site
Local Internet
POP
Internet
Synchronization
Router
Firewall
Bank site
ASP (Equifax)
Internet
User 50 of 110
An Introduction to Internet Banking SSGRR 2001
Banking software architecture
data management
Server
business logic
Network
presentation logic
Client
Client
Client
Data management
Client
Presentation logic
Intranet Intranet
logic
Internet
Business
Client
logic
https = ssl+http
App. server
1 SQL thru JDBC/ODBC to data tier
4
Request for service 2
and data response Required data
3
An Introduction to Internet Banking SSGRR 2001 54 of 110
Planning phase in setup process
Vertical ASP
Horizontal ASP
Complexity of a problem:
telecommunications infrastructure
security
multi-tier software infrastructure
maintenance…
An ASP must:
CheckFree, www.checkfree.com
Digex , www.digex.com
DiamondBullet , www.diamondbullet.com,
,,,,,,,,,,,,,,,,,,,,,,,,;www.bankingwebsites.com
Permanent marketing
number of visitors
number of transactions
which services are most/least used
average time spend at Web site by common user
Feedback support
(customer forms, e-mail for additional questions/services)
competition
(what they offer, what are the complaints of their customers)
potential customers
CheckFree
Other FSP
Equifax
Security border
Security border
Security border
The Bank of
?$ Web Hosting
Provider
Northern Michigan
www.bankofnorthernmichigan.com
Security border
Customer's PC
An Introduction to Internet Banking SSGRR 2001 90 of 110
Out-of-house architecture
(BNM)
Synchronization
Router
Firewall
BNM
Equifax
Internet
User 91 of 110
An Introduction to Internet Banking SSGRR 2001
Distribution of services
DigiTRADE
EDGAR
Wall Street City.Com
Yahoo! Finance
Potential customers
Potential competitors
subject directories
meta-crawlers
Parser
Link
Indexer
URL queue
List of pages
Searcher
standard focused
www7.scu.edu.au/programme/fullpapers/1921/com1921.htm
the anatomy of the Google search engine
http://www.streeteye.com/cgi-bin/allseeingeye.cgi ,
financial data meta-crawler
www.moneysearch.com , finance specific directory search
Page Rank
IR (P ) 1 d d * IR (Ti ) /Ci
i
Ti – pages that point to P, Ci – num. of outgoing links
from Ti , d – dumping factor
Location metric
IL(P)= F(u), u is link to P
wi=0 for ith word from the lexicon not in document, else
wi=f * idf, f – frequency of the ith word in the document
idf – inverse document frequency of the ith word