Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Marmara University O...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
versions View all 2 versions
addClaim

Internet banking

Authors: Gülşeni, Ahmet Çağlar;

Internet banking

Abstract

ÖZET INTERNET BANKACILIĞI Son yıllarda Internet Bankacılığı konusunda bir çok gelişme olmuştur. Internet'in bankacılık sektörünün gelecekteki uygulamalarında önemi bir yer tutacak olması nedeniyle, bu tezde Internet Bankacılığının güvenlik kavramları ele alınmıştır. Günümüzdeki Internet servislerinin sunduğu ve hem müşterilerin hem de bankaların gördüğü riskler bir arada ele alınarak, günümüzün ve geleceğin bu yeni iş yapma yönteminin tüm güvenlik gereksinimlerinin bir tablosu çizilmiştir. Bu tezde iki aşamalı bir güvenlik denetim mekanizması uygulanmıştır. İki aşamalı güvenlik denetimi sahip olunan bir cihazın bilinen bir veri ile birleştirilmesidir. Bilinen veri bir şifredir. Sahip olunan cihaz ise bir akıllı kart yada bir şifre üreteci olabilir. Bu tezde şifre ile birlikte bir şifre üreteci kullanılmıştır. Gerçek hayatta fiziksel bir cihaz olan şifre üreteci yerine, istemci tarafında çalışan bir yazılım kullanılmıştır. Veritabanındaki bilgilerin, özellikle şifrelerin, güvenli olarak saklanabilmesi için bir şifreleme algoritması kullanılmıştır. Bu algoritmada, müşterinin Internet Şubesine her girişinde değişen iki adet maske kullanılmıştır. Böylece veritabanındaki bilgilerin güvenliği arttırılmıştır. İki aşamalı güvenlik denetimi kullanılarak güçlü bir güvenlik sistemi kurulmuştur. Klasik (tek aşamalı) güvenlik denetim yöntemlerinde, kullanıcının şifresini ele geçiren kişi tüm hesaplarını ele geçirmektedir. Fakat iki aşamalı güvenlik denetimi ile bir kişinin hesabım ele geçirmek oldukça zorlaşmıştır. 08, 2002 Ahmet Çağlar Gfilşeni vı

ABSTRACT INTERNET BANKING Much has happened in the world of Internet Banking in the last few years. In order to assess the importance of the Internet as a future delivery mechanism for the banking industry, the security concepts of Internet Banking services is focused on in this thesis. By correlating the risks perceived by both customers and banks with the actual Internet services offered, a more complete picture of the security requirements and concerns in this new way of doing business now and in the future is provided. In this thesis, a two-factor authentication method is implemented. A two-factor authentication requires something you have combined with something you know. Something you know is a password. Something you have may be a physical device, like a smart card or a token generator. In the thesis, a token generator is used with the password. The token generator, which is originally a physical device, is simulated as software running on the client side. For the security of the data in database, especially the passwords, an encryption algorithm is used. In this algorithm two variable masks that change in every logon is used. This method increased the security of the data. By using a two-factor authentication method, a strong security is achieved. In classical (one-factor) authentication methods, a person who gets someone's password can reach his account. But in two-factor authentication, it becomes more difficult to hack someone's account. 08, 2002 Ahmet Çağlar Gülşeni vıı

91

Country
Turkey
Related Organizations
Keywords

Internet, İnternet Bankacılığı, Security, Computer Engineering and Computer Science and Control, Banking, Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green