International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 7 | Issue 3 | Year 2017 | Article Id. IJPTT-V32P402 | DOI : https://doi.org/10.14445/22492615/IJPTT-V32P402

The Effectiveness of Security Images in Internet Banking


Jebakumar Immanuel.D, Ranjani.G, Nandhini.V, Shanmugha Priya.R

Citation :

Jebakumar Immanuel.D, Ranjani.G, Nandhini.V, Shanmugha Priya.R, "The Effectiveness of Security Images in Internet Banking," International Journal of P2P Network Trends and Technology (IJPTT), vol. 7, no. 3, pp. 6-9, 2017. Crossref, https://doi.org/10.14445/22492615/IJPTT-V32P402

Abstract

Security images are again used as part of the login process on internet banking websites,under the theory that they can help to find the phishing attacks in the websites. The majority of our participants entered their password when we removed the image and captcha. We found changing the appearance and other characteristics of the security image generally had little effect on whether user logged in when the security image was absent.Additionally we subjected the passwords are created by users to a password cracking algorithm and found that participants with stronger passwords were less likely to enter their password when the security image was missing.

Keywords

The majority of our participants entered their password when we removed the image and captcha.

References

1) J. Kirk, ?Study: Users ignore bank security features, Computerworld, Feb. 2007, computerworld.com

2) Bank of America, ?SiteKey FAQs, https://www.bankofamerica.com /privacy/faq/sitekey-faq.go, 2013.

3)PNC, ?Online security information, https://www.pnc.com/webapp/un sec/Solutions.do?siteArea=/pnccorp/PNC/Security+Information, 2013.

4)Santander Bank, ?SSA makes online banking even more secure, https://www.santanderbank.com/us/personal/banking/onlineand- mobile-banking/security-center/ssa-learn-more, 2014.

5) S. Schechter, R. Dhamija, A. Ozment, and I. Fischer, ?The emperor’s new security indicators: An evaluation of website authentication and the effect of role playing on usability studies, in Proceedings of the 28thIEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2007.

6) A. Herzberg and R. Margulies, ?Forcing Johnny to login safely, in.

7) Proceedings of the 16th European Symposium on Research in Computer Security, Leuven, Belgium, 2011, pp. 452–471