Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

E-Banking Transaction Authorization: Common Vulnerabilities, Security Verification, and Best Practices

OWASP Foundation via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore common vulnerabilities, security verification techniques, and best practices for implementing e-banking transaction authorization in this 32-minute conference talk from AppSecEU 2015 in Amsterdam. Delve into various operation authorization methods, analyze their potential weaknesses, and understand the challenges posed by malware. Learn about recommended approaches for enhancing security, including specific requirements for implementation and verification. Gain insights into future developments in e-banking security as presented by Wojtek Dworakowski, an expert in the field.

Syllabus

Intro
Wojtek Dworakowski
Operation authorization methods
IDEAS ARE GREAT
What's wrong with these?
SMS number change
Example #3
Step 1: User enters transaction data
Step 2: User enters authorization data
Transaction signing' using SMS code
What could possibly go wrong?
Malware VS operation auth ex1
Recommendations
Malware VS operation auth ex 2
Requirements for implementation / verification
Future work

Taught by

OWASP Foundation

Reviews

Start your review of E-Banking Transaction Authorization: Common Vulnerabilities, Security Verification, and Best Practices

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.