Consumer Use of E-Banking in Iraq: Security Breaches and Offered Solution

Authors

  • Qusay Zuhair Abdulla Department of Computer Science, Collage of science, Mustansiriyah University, Baghdad, Iraq https://orcid.org/0000-0002-8353-4643
  • Mustafa Dhiaa Al-Hassani Department of Computer Science, Collage of science, Mustansiriyah University, Baghdad, Iraq

DOI:

https://doi.org/10.24996/ijs.2022.63.8.40%20

Keywords:

E-banking, cybersecurity, Risk, Security, Authentication, Electronic fraud

Abstract

    After the software revolution in the last decades, the field of information technology had a tremendous evolution that made many organizations reach the best benefits from this evolution in technologies. The banking sector evolved their old system from ordinary system to the online system. The term E-banking appears to cover almost all bank operations such as money transactions, account management, instant reports, instant notifications. E-banking offers several advantages to clients, but this opens many challenges and motivates unauthorized parties to focus on creating methods and exploiting weaknesses to attack and steal critical information that belongs to the banking system or clients. Iraqi banks recently adopted E-banking serves and made them available to all their clients. However, this shift in approach leaves many clients vulnerable to cyber-attacks. This paper presents an analytical study on Iraqi clients using E-banking as a service using real case studies. Many researchers prevent these threats by introducing novel methods to support cybersecurity specialists. This paper covers related work and the most common terms involving E-banking. It also covers the risks involved in E-banking, most common attacks, and modern security methods to prevent attacks.

Downloads

Download data is not yet available.

Downloads

Published

2022-08-31

Issue

Section

Computer Science

How to Cite

Consumer Use of E-Banking in Iraq: Security Breaches and Offered Solution. (2022). Iraqi Journal of Science, 63(8), 3662-3670. https://doi.org/10.24996/ijs.2022.63.8.40

Similar Articles

1-10 of 298

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)