Gain a Splash of New Skills - Coursera+ Annual Just ₹7,999
Our career paths help you become job ready faster
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore common vulnerabilities, security verification techniques, and best practices for implementing e-banking transaction authorization in this 32-minute conference talk from AppSecEU 2015 in Amsterdam. Delve into various operation authorization methods, analyze their potential weaknesses, and understand the challenges posed by malware. Learn about recommended approaches for enhancing security, including specific requirements for implementation and verification. Gain insights into future developments in e-banking security as presented by Wojtek Dworakowski, an expert in the field.
Syllabus
Intro
Wojtek Dworakowski
Operation authorization methods
IDEAS ARE GREAT
What's wrong with these?
SMS number change
Example #3
Step 1: User enters transaction data
Step 2: User enters authorization data
Transaction signing' using SMS code
What could possibly go wrong?
Malware VS operation auth ex1
Recommendations
Malware VS operation auth ex 2
Requirements for implementation / verification
Future work
Taught by
OWASP Foundation