ENHANCED WEB SECURITY APPLICATION FOR ONLINE FINANCIAL TRANSACTIONS

ENHANCED WEB SECURITY APPLICATION FOR ONLINE FINANCIAL TRANSACTIONS

  • The Complete Research Material is averagely 62 pages long and it is in Ms Word Format, it has 1-5 Chapters.
  • Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
  • Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
  • Full Access Fee: ₦7,000

Get the complete project » Instant Download Active

ABSTRACT

Online users now make use of internet banking as a major platform of making payments of

products online. Cybercriminals are using newer and more advanced methods to target online

users. One of the fastest growing threats and attacks in the world today is Man-in-the-Browser

(MITB) attacks. As the advance in technology continues to influence the way society makes

payment for goods and services, then more advanced security approach is required for

transaction authentication on the internet. This dissertation provides a more secure

authentication for online transaction using an enhanced security approach that uses an Anti-

form grabbing technique to encode user inputs to random characters, JSON Web Token

(JWT) to provide and secure safe passage of information between two parties, a One Time

Password (OTP) token for authentication and the use of Email as another verification

channel from the server to combat MitB attacks.

CHAPTER ONE

INTRODUCTION

1.1 Background of the Study

When using services in a web environment, security is of great importance especially for both

the user and the provider. The information in use must be handled in a way that does not

compromise its security. Passwords are only secured as long as the user keeps them secret.

Not everyone is aware of the risk that comes with compromised passwords and other security

leaks (Nilsson, 2012).

Lately, client side attacks on online banking and electronic commerce are on the rise due to

inadequate security awareness amongst end users. As a result, end user would not be aware if

there is vulnerability on their machine or platform that might lead to client side attack such as

man-in-the-browser (MitB) attacks. For instance, man-in-the-middle (MitM) attack

techniques which are mainly targeting the information flow between a client and a server

have now evolved to become man-in-the-browser (MitB) attack. MitM attack occurs when

someone manages to eavesdrop on web traffic by fooling the other connections (Web Server

and Client Server) to connect to the attacker instead of connecting to each other. One of the

common ways to coun


You either get what you want or your money back. T&C Apply







You can find more project topics easily, just search

Quick Project Topic Search