TONY P. GHAZEL CONSULTING, Eastsound, WA

mobile/office (360) 622-6033 

   

 

Online Banking Frequently Asked Questions

How does my online banking session take place?
What are the basic security risks of Internet communications?
How does security technology protect against these risks?
To what degree can SSL security protect me?
How do my bank’s online security measures protect me?
What is encryption?
Phishing attacks

How does my online banking session take place?

An online banking session is started when the authorized subscriber uses his or her browser to send a secure message via SSL to your financial institution’s (bank’s) server. For this purpose he uses the customized password, along with his User ID. The server verifies this data and responds by authenticating the customer and initiating session encryption.

Once your session is securely established, the server processes and routes the transaction data using internal protocols. This prevents other Internet users from proceeding past the bank’s series of firewalls and filtering routers.

Robust bank’s online servers protect financial transactions through a number of barriers that prevent unauthorized access. The first barrier is a system of filtering routers and firewalls, which separates the outside Internet from the institution’s internal network. The filtering router verifies the source and destination of each Internet packet, and determines whether or not to allow the packet through. Access is denied if the packet is not directed at a specific available service. In addition, the filtering router prevents many common Internet attacks.

Furthermore, a good firewalling scheme, which many financial institutions utilize, will not allow servers in the bank’s network to communicate via TCP/IP - the Internet communication protocol. No internal online transaction processing systems are reachable using TCP/IP. This prevents unauthorized users from accessing any transaction data from the Internet.

The information is passed between the bank’s main server and the customer's PC after it is duly encrypted using the highest possible encryption.

Top


What are the basic security risks of Internet communications?

Sending data across a network involves three basic security risks:

Eavesdropping - intermediaries listen in on private conversations (one computer talking to another).
Manipulation - intermediaries change information in a private communication.
Impersonation - a sender or receiver communicates under false identification.

The situation is analogous to purchasing mail-order goods over the telephone. Mail-order shoppers want to know that no third party can hear their credit card number (eavesdropping); that no one can insert extra order information, or change the delivery address (manipulation); and that it is actually the mail-order company on the other end of the line and not a credit card thief (impersonation).

Top


How does security technology protect against these risks?

Current browsers counter security threats with a network communication protocol called Secure Sockets Layer (SSL). SSL is a set of rules that tells computers the steps to take to improve the security level of communications. These rules are designed for the following:

- Encryption, which guards against eavesdropping.
- Data integrity, which guards against manipulation.
- Authentication, which guards against impersonation.

However, these effects protect your data only during transmission. That is, network security protocols do not protect your data before you send it. Just as you trust merchants not to share your credit card information, you must trust the recipients of your online data not to mishandle it.

Top


To what degree can SSL security protect me?

SSL uses authentication and encryption technology developed by RSA Data Security Inc. The encryption established between you and a server remains valid over multiple connections, yet the effort expended to defeat the encryption of one message cannot be leveraged to defeat the next message.

A message encrypted with 40-bit RC4 takes on average 64 MIPS-years to break (a 64-MIPS computer needs a year of dedicated processor time to break the message's encryption). The high-grade, 128-bit U.S. domestic version provides protection exponentially more vast. The effort required to break any given exchange of information is a formidable deterrent. Server authentication uses RSA public key cryptography in conjunction with ISO X.509 digital certificates.

Top


How do my bank’s online security measures protect me?

Top


What is encryption?

Encryption is the scrambling of information for transmission back and forth between two points.

When you send out a letter to your friend, you communicate in a language that both of you understand. Since your language is also understood by thousands of other people, if someone else should get hold of your letter, he will not have any problem in understanding its contents. If you do not want anyone other than the party to whom your letter is intended to understand your message, you must use a secret language or you must substitute each alphabet in your letter for some other alphabet, which only the two of you will understand. Using a secret language or substituting one alphabet or word for another is called encryption and your letter is said to be encoded. To decode your letter, the receiver must have the same key that you used for encoding. To any other person who does not have this key, the contents of your message will not make any sense and will be garbage.

Computers also use the same principle. The browser in your computer uses a string of numbers, characters and special keys and makes the encoding and decoding immensely complicated. Your computer and the one at the receiving end agree upon the keys to be used for encoding. These keys are based on a set of mathematical formulae called algorithms. When a computer encrypts a message, there are billions of key combinations to select from. However, only one of the billions of combinations will be correct. Only the computers on both ends of the transaction know what key combination is in use during that session. The sending and the receiving computers use a different key combination for each session and only these two computers know what key is used for the current session. So if anyone else tries to read your message, he will only get meaningless string of numbers and characters.

Encryption finds its application in a variety of transactions that involves sensitive matters and even for national security. Encryption is used for sending e-mail messages, sensitive documents and in electronic commerce, such as, credit card transactions and electronic banking.

The security provided by encryption is measured in terms of the time frame the encoding key is used by your computer for encryption. The level of encryption is measured in bits like 40-bit or 128-bit encryption.

If the encryption has a 40-bit key, it means that there are 240 possible different combinations for solving the key. Similarly, for a 128-bit key, there are 2128 possible different combinations. In general, the longer the key, the longer it would take for someone without the correct decoder key to break the code. 

The 40-bit encryption and the 128-bit encryption differ in their complexity and the key length. 40-bit encryption can use one of the 240 possible different combinations (1 followed by 12 zeroes) and 128-bit encryption uses one of the 2128 possible different combinations (3.4 followed by 38 zeroes). 128-bit encryption is exponentially more powerful than 40-bit encryption.

40-bit encryption is not as powerful as 128-bit encryption, but this still requires a great deal of dedicated effort to break. When the length of the key is increased by one bit, the amount of effort required for breaking the code doubles. However, as the power in the hands of the potential criminals increases, it is necessary to use a more complex and longer key for secure transmission of data electronically. This is being provided by 128-bit encryption.

According to Netscape, 128-bit encryption is 309,485,009,821,345,068,724,781,056 times more powerful than 40-bit encryption.

For Microsoft browsers: You can find out the level of encryption by using your browser menu bar. Select "File" then "Properties" then "Security."

When you visit a site that requires encryption, your browser will display the symbol with a key or a lock. If you are not in a secure area, the key or lock will be broken.

Customer information and account data is protected by two independent security protocols: data encryption and a verifiable Password. When bank customers use online banking, they are first prompted to enter their Password. The receiving computer will not send any account information to the customer's computer unless the Password associated with the User ID has been correctly entered. All information that passes between the bank’s servers and the customer's computer is put through data encryption.

A bank’s success as a financial institution depends on its ability to manage these systems safely and to continue to earn your trust as a customer. By requiring 128-bit encryption, a bank is assuring the highest level of commercially available security for your financial transactions.

Top


Phishing attacks

What is Phishing?

PHISHING: is an online identity theft technique used to lure customers into disclosing their personally identifiable information including account names and passwords, and credit card information. This technique is widely in use in the digital world, oftentimes customers are sent emails, pop-ups, and instant messages that mimic legitimate communications. These communications prompt the user to visit fraudulent websites created to gather their personal information. Financial institutions, banks and online retailers are most susceptible to having their communication spoofed in phishing attempts. In the end, costumers are lured in by these seemingly legitimate communications into providing sensitive information, often resulting in credit card fraud; identify theft, and even financial loss.

How to recognize a phish (fraudulent) email as not sent from my bank?

Your bank should not request personal information from customers directly from an email-hyperlink or redirect the customer to a specified site.
Your bank should never send emails asking customers to supply, verify, or update personal or account information. Especially requests pertaining to passwords, PIN’s, and account numbers.
Your bank’s emails should always be personalized emails identifying the sender of the email as a legitimate bank employee and identifying the receiver as the bank’s customer. Sending emails with personalized information helps you identify legitimate versus spoofed emails.

Top