• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Security Aspects of Mobile Banking

By Abhishek Ghosh February 28, 2024 10:01 am Updated on February 28, 2024

Security Aspects of Mobile Banking

Advertisement

The term mobile banking refers to the processing of banking transactions that takes place with the help of mobile devices such as mobile phones or PDAs. It is possible to carry out mobile banking via special applications/widgets (small installed programs) or to access banking applications on the Internet directly via a mobile browser.

Mobile banking differs from mobile payment, in which payment transactions can be processed directly at the point of sale via mobile devices. This could change with the introduction of instant payment. In order to make a payment, a QR code displayed on the POS terminal with all the information about the transfer to be made can be scanned with a mobile banking app. However, there are already providers who have integrated the function of a mobile payment app directly into their own mobile banking app. In conjunction with an upstream electronic request for payment, a payment template (possibly including an electronic invoice document) can also be transmitted beforehand, which serves as the basis for the subsequent real-time transfer. Mobile banking consists of three applications:

  1. Mobile Accounting
  2. Mobile Brokerage
  3. Mobile Financial Information Services

Since information services provide the necessary basis for decision-making for transactions, account or custody account management services can only be offered if a certain minimum number of information services is offered. Information services, on the other hand, can also be offered as an independent module, i.e. without enabling transaction services.

Advertisement

---

From a sales point of view, mobile banking allows banks to have an additional distribution channel. This is the reason why mobile banking plays an important role in the multi-channel strategy of many banks.

Security Aspects of Mobile Banking

 

Technical Requirements

 

In October 2010, ISO Technical Committee 68 “Financial Services” approved a New Work Item Proposal for the development of the ISO 12812 “Mobile Financial Services” series of standards. Within the framework of this series of standards, specifications for mobile banking are to be defined in a normative manner. When implementing applications for mobile banking, certain requirements must be met.

 

Compatibility

There are a large number of smartphones from different providers and when creating an app, it has to be adapted for all the different operating systems. Some devices have Java ME, while others support the SIM Application Toolkit. Still others only have WAP or SMS.

In 2009, the Mobile Marketing Association (MMA) published an overview of financial institutions’ mobile banking and the pros and cons associated with this development.

 

Security

Transactions carried out via mobile devices pose a huge security risk, as they have to pass through a number of potentially vulnerable interfaces and the data is sent and received via insecure wireless, and therefore interceptable, connections. In order to create a secure environment for financial transactions, several requirements must be met:

  • It is necessary to ensure that the device supports the security measures used in the app
  • At least a username and password should be required to make it more difficult to access the app in the event of theft of the device
  • The endpoint must authenticate with the service provider before a transaction is made to ensure that no unauthorized person makes the transaction
  • All data must be sent and received in encrypted form
  • All data stored on the device must be encrypted.
  • One-time passwords are often used as part of two-factor authentication to prevent theft by cybercriminals.
  • In this case, the passwords are sent to the user for each transaction, who must transfer it to the app for confirmation. The password expires after use for the specific transaction or after a certain period of time.
Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Security Aspects of Mobile Banking

  • Online banking or Internet banking : How the system works

    Online banking or Internet banking provides some extra advantages. How the technology works behind Online banking and who and what should better be avoided ?

  • What is Transaction Processing

    In computer science, a transaction is a sequence of program steps that are regarded as a logical unit because they leave the data stock in a consistent state after error-free and complete execution. Therefore, a transaction is particularly required to be executed either completely and error-free or not at all. Transactions are mostly used in […]

  • Mobile App Websites Vs Mobile Ready Websites

    Confusion in Developmental Priority for Mobile App Websites Vs Mobile Ready Websites is Not an Uncommon Issue. This Article is Possibly Helpful.

  • Best Android Banking Apps and Money Related Apps

    Best Android Banking Apps lists some Android Apps those can help you to check your Bank Account or Transfer Money.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy