Prevention of Online Transaction Frauds Using OTP Generation Based on Dual Layer Security Mechanism
Amit Kulat1, Raghav Kulkarni2, Nagesh Bhagwat3, Kartik Desai4
1234 BE IT, Department of Information Technology, RMD Sinhgad School of Engineering, Pune, Maharashtra, India. Mrs. Prajakta Kulkarni5
5Assistant Professor, Department of Information Technology, RMD Sinhgad School of Engineering, Pune, Maharashtra, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – With the developing technology online shopping of goods and various other products has increased to a great extent. With this service people tend to use their debit cards and credit cards for the online payment and this has been a common practice. Fraudsters take good advantage of this situation to commit frauds by making an identity theft. To avoid this many technologies emerged lately but they had some disadvantages which was not very comfortable for the end user. This project aims at implementing the web application for preventing online transaction frauds considering user comfort while making transactions from regular or different machine and from same or various other locations. Security is provided by the generation of OTP (One Time Password) providing a dual layer security mechanism which includes cookie based OTP generation and location based OTP generation. The key points of OTP generation, cookies,
Some security risks involved with conducting business online are imposters, eavesdroppers and thieves. Also, there are crackers or hackers, which are people who write programs and manipulate technologies to obtain unauthorized access to computers and networks. The elements of computer security are secrecy, integrity and necessity. Secrecy is protecting against unauthorized data disclosure. Integrity is preventing data from being modified by someone who is unauthorized and ensuring that the contents of emails aren’t changed before they get to he recipient. Necessity is preventing data delays or denials. It is important to establish a security policy to protect assets, to define acceptance and unacceptable behavior and to review physical and
<! DOCTYPE html> Practice Lab Assignment Lab Assignments Assignment 1 Assignment 2 Assignment 3 Assignment 4 Lab Practica Practicum 1 Practicum 2 Course Title: IT 207, Section: 002, Semester Fall 2015 Instructor: Omar Nachawati University: GMU
In this era of globalization and cut-throat world of competition, it is virtually impossible to do business without using the internet and web applications. Internet gets used for processing the credit card or debit card sale and even for using to save the data of customers to the merchant’s database for future reference and to send promotional offers to the previous and patron customers. And on the other hand, hackers are trying their best to get the data stored on the merchant’s server by spoofing
Online shopping has become a lifesaver for many consumer providing conveniences; convenience sells. Today’s consumers expect to see a company’s presence online with the top social media tools including Facebook and Twitter. With the advancements in mobile technology, consumers can make purchases with the click of a few keystrokes on their smartphone. These purchases require customers to enter in their personal information, including mailing address, email and banking information. Entering this information online can open customers up to the threat of hackers stealing their personal information including their bank account information.
Submitted in partial fulfillment of the requirements for the degree of Bachelor of Engineering in Computer Engineering
Department of Telecommunication Engineering, University College of Engineering & Technology, The Islamia University of Bahawalpur, Pakistan.
ACCEPTED and APPROVED in partial fulfillment of the requirements for the degree of Bachelor of Science in Information Technology.
This report deals with the development and deployment of a Online Banking System which is highly secure and can be accessed from anywhere by entering the URL https://cse545group4.vlab.asu.edu/SecureOnlineBanking. The banking system consists of a system administrator, regular bank employees, several individual customers and merchants. The application is https secured and cookies are sent only over SSL/TLS. The other security mechanisms implemented are One-Time Password and Public Key Infrastructure (PKI) in different functionalities. All the inputs in all the functionalities are validated to prevent XSS attacks, and SQL injection attacks. The details of customers are made not be accessed by bank employees without permission from the user to provide outmost user satisfaction. The application is tested rigorously after addition of each new function for possible failures. The final system is developed as per the functional and non-functional requirements as stated in the requirements document. All the security vulnerabilities and functionality flaws, which were noticed after final deployment by other group members, have been taken care of.
This Report Presented in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Computer Science and Engineering
This proposal is submitted to the Computer and Information Science faculty in partial fulfillment for the degree
Information Technology solutions have cleared a path to another universe of web, business systems administration and e-keeping money, maturing as an answer for diminish costs, change the advanced monetary undertakings to more less demanding, expedient, effective, and efficient technique for exchanges. Web has developed as a gift for the present pace of life but in the meantime additionally brought about different dangers to the shoppers and different establishments for which it 's turned out to be generally helpful. Different lawbreakers like programmers, saltines have possessed the capacity to clear their approach to meddle with the web accounts through different strategies such as hacking the Domain Name Server (DNS), Internet Provider 's (IP) address, ridiculing, phishing, web phishing and so on and have been fruitful in increasing "unauthorised access" to the client 's PC framework and stolen helpful information to increase tremendous benefits from client 's records Cybercrime includes criminal activities that aim PC, web, or system
As the technology is increasing day by day, many people fall victim to cyber theft. This high development of technology and the availability of internet to most of the public, broadens the pathway of cyber-crime. Cyber-Security was once not a serious issue. But, now many people are complaining about their credit card information getting stolen or sudden drop of credits in their bank account. The internet has become the integral part of today’s generation of people. Many people share their information out in the web through social networking sites like Facebook, Twitter, Snapchat, Instagram etc. Internet has touched every aspect of life right from the beginning to the present. As people share their personal information online; most of their accounts get hacked by cyber-criminal or in other words black hat hackers. And, trusting internet nowadays isn't a wise thing to do.
In this system security parameters were embedded to ensure that credit card numbers are replaced with other numbers termed First Virtual Personal Identification Number. A person’s account was not charged till e-mail verification was obtained from the person confirming the purchase.
This mobile application securely stores credit cards, offers, gift cards and more on their mobile phone. This virtual wallet is changing the face of commerce by enabling customers to simply make “tap and go” payments with their mobile devices, while increasing loyalty at merchant locations. Although m-commerce market in India is still in its initial phase, India is getting richer and phones are getting cheaper. It is also estimated that, by 2020, 80% of the mobile devices used in the country will be smartphones. Many e-tailers have realized the potential of mobile commerce in multiplying their sales and are rapidly adopting the necessary tools, withencouraging re sults. Snapdeal.com, for example, gets over half of its sales from customers using mobile devices, while even one year ago the share of mobile purchases was a mere 5%.Flipkart, the largest online shopping platform in India, receives 20% of its e- commerce orders from customers using mobile devices and plans to increase this number to as much as 50% in future.India has more than 100 million users in India,of which nearly 84 million access the site through mobile phones. This suggests the rise of the “mobile first” generation of internet
One problem of shopping online is credit risk, although it brings us convenience, it also brings us some negative effects at the same time. Credit problems of online shopping are rising obviously because of the rapid development of online shopping. In particular, in most cases lots of criminal use a stolen card to withdraw cash or pay due to the users’ personal information and bank card information are disclosed without any precaution. It might be lead to personal information has been abused and cause financial losses. According to MITTAL (2017), network security is a big problem, and if the website does not have strict network security measures, the customer's data might fall into the hands of criminals, such as name, address, bank card information and phone number. Therefore, personal awareness of prevention is important. In addition,