Research Article | Open Access | Download PDF
Volume 7 | Issue 3 | Year 2017 | Article Id. IJPTT-V32P402 | DOI : https://doi.org/10.14445/22492615/IJPTT-V32P402The Effectiveness of Security Images in Internet Banking
Jebakumar Immanuel.D, Ranjani.G, Nandhini.V, Shanmugha Priya.R
Citation :
Jebakumar Immanuel.D, Ranjani.G, Nandhini.V, Shanmugha Priya.R, "The Effectiveness of Security Images in Internet Banking," International Journal of P2P Network Trends and Technology (IJPTT), vol. 7, no. 3, pp. 6-9, 2017. Crossref, https://doi.org/10.14445/22492615/IJPTT-V32P402
Abstract
Security images are again used as part of the login process on internet banking websites,under the theory that they can help to find the phishing attacks in the websites. The majority of our participants entered their password when we removed the image and captcha. We found changing the appearance and other characteristics of the security image generally had little effect on whether user logged in when the security image was absent.Additionally we subjected the passwords are created by users to a password cracking algorithm and found that participants with stronger passwords were less likely to enter their password when the security image was missing.
Keywords
The majority of our participants entered their password when we removed the image and captcha.
References
1) J. Kirk, ?Study: Users ignore bank security features, Computerworld, Feb. 2007, computerworld.com
2) Bank of America, ?SiteKey FAQs, https://www.bankofamerica.com /privacy/faq/sitekey-faq.go, 2013.
3)PNC, ?Online security information, https://www.pnc.com/webapp/un sec/Solutions.do?siteArea=/pnccorp/PNC/Security+Information, 2013.
4)Santander Bank, ?SSA makes online banking even more secure, https://www.santanderbank.com/us/personal/banking/onlineand- mobile-banking/security-center/ssa-learn-more, 2014.
5) S. Schechter, R. Dhamija, A. Ozment, and I. Fischer, ?The emperor’s new security indicators: An evaluation of website authentication and the effect of role playing on usability studies, in Proceedings of the 28thIEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2007.
6) A. Herzberg and R. Margulies, ?Forcing Johnny to login safely, in.
7) Proceedings of the 16th European Symposium on Research in Computer Security, Leuven, Belgium, 2011, pp. 452–471