Security solutions to the phishing: Transactions based on security questions and image

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

One of the latest computer-related problems to arise is phishing, which is the criminally fraudulent process in which e-mails lure unsuspecting victims into giving up user names, passwords, Social Security numbers, and account information after linking to counterfeit bank, credit card, and e-commerce Web sites. Phishers are mainly targeting the customers of banks and online payment services. It is so pervasive that even corporate and government sites are actively informing the users on this issue. This paper presents a solution, which aims to protect users against email phishing attacks. Main key words which are used are a user ID and password, and the other is an authenticating question. An e-mail that a bank sends to user contains some image and preselected question which the phisher couldn't have, that the user chose when setting up the account. This proves to the user that the e-mail came from the bank or business, not a phisher, and that it is safe to use the provided link. The user is asked to provide his ID and the bank checks if the ID is valid or not. If the ID is valid, the user is asked to load the image which has been mailed and answer his preselected question along with a request for their logon password. After receiving the correct password, user is allowed to access the Web site. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Devarakonda, A. K., Tummala, P., & Sandrala, I. P. (2010). Security solutions to the phishing: Transactions based on security questions and image. In Communications in Computer and Information Science (Vol. 70, pp. 565–567). Springer Verlag. https://doi.org/10.1007/978-3-642-12214-9_101

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free