Get the complete project »
- The Complete Research Material is averagely 62 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦7,000
Online users now make use of internet banking as a major platform of making payments of
products online. Cybercriminals are using newer and more advanced methods to target online
users. One of the fastest growing threats and attacks in the world today is Man-in-the-Browser
(MITB) attacks. As the advance in technology continues to influence the way society makes
payment for goods and services, then more advanced security approach is required for
transaction authentication on the internet. This dissertation provides a more secure
authentication for online transaction using an enhanced security approach that uses an Anti-
form grabbing technique to encode user inputs to random characters, JSON Web Token
(JWT) to provide and secure safe passage of information between two parties, a One Time
Password (OTP) token for authentication and the use of Email as another verification
channel from the server to combat MitB attacks.
1.1 Background of the Study
When using services in a web environment, security is of great importance especially for both
the user and the provider. The information in use must be handled in a way that does not
compromise its security. Passwords are only secured as long as the user keeps them secret.
Not everyone is aware of the risk that comes with compromised passwords and other security
leaks (Nilsson, 2012).
Lately, client side attacks on online banking and electronic commerce are on the rise due to
inadequate security awareness amongst end users. As a result, end user would not be aware if
there is vulnerability on their machine or platform that might lead to client side attack such as
man-in-the-browser (MitB) attacks. For instance, man-in-the-middle (MitM) attack
techniques which are mainly targeting the information flow between a client and a server
have now evolved to become man-in-the-browser (MitB) attack. MitM attack occurs when
someone manages to eavesdrop on web traffic by fooling the other connections (Web Server
and Client Server) to connect to the attacker instead of connecting to each other. One of the
common ways to coun
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONEINTRODUCTION1.1 BACKGROUND OF THE STUDYA visa (from the Latin charta visa, meaning "paper which has been seen") is a conditional authorizat...Continue Reading »
» ABSTRACT Computer are known for their wide range of uses especially in scientific and mathematical field. However, title or no thought has been given ...Continue Reading »
3. DESIGN AND IMPLEMENTATION OF A VIRTUAL E-LEARNING SYSTEM (A Case Study of Lagos State University)» CHAPTER ONE 1.0 INTRODUCTION Virtual e learning is a system designed to help students gain access and acquire knowledge in any...Continue Reading »
4. DESIGN AND IMPLEMENTATION OF A COMPUTER ASSISTED LEARNING SYSTEM (CASE STUDY OF TUTORIAL ON PRIMARY SCHOOL MATHEMATICS)» ABSTRACTIn Nigeria today, it’s a well known fact that mathematics is one of the subjects that student find difficult to understand and pass for one ...Continue Reading »
» ABSTRACT Online school fees payment system is a research work that will help build an effective information management system for Osisa polytechnic in...Continue Reading »
» ABSTRACT An Airline Reservation system is very important because it has the strong ability to reduce errors that might have occurred when using a manu...Continue Reading »
» CHAPTER ONEINTRODUCTION1.1 IntroductionAll organizations, however large or small, need to keep certain records, some because the law requires them, an...Continue Reading »
» 1.0 INTRODUCTION 1.1 INSIGHT TO ONLINE MARKETPLACE Online Market, commonly known as e commerce or eCommerce, or e business consists of the buying and ...Continue Reading »
» AbstractThe aim of this study was to determine the impact of social media on modern journalism in Makurdi metropolis. To achieve this aim, the survey ...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Children are heritage of the cord and the fruit of the womb is his reward. As arrows are in the h...Continue Reading »