{"id":2387,"date":"2018-02-26T16:15:49","date_gmt":"2018-02-26T13:15:49","guid":{"rendered":"https:\/\/ishik.edu.iq\/conf\/iec\/?p=2387"},"modified":"2018-02-27T00:18:59","modified_gmt":"2018-02-26T21:18:59","slug":"iec2018-29","status":"publish","type":"post","link":"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/","title":{"rendered":"A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES"},"content":{"rendered":"<p style=\"text-align: center;\"><span style=\"color: #800000;\"><strong>4th International Engineering Conference on Developments in Civil &amp; Computer Engineering Applications (IEC2018)<\/strong><\/span><\/p>\n<p><strong>Title<\/strong>: A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES<\/p>\n<p><strong>Authors<\/strong>: Saman Mirza Abdullah, Bilal Ahmed, Musa M.Ameen<\/p>\n<p><strong>DOI<\/strong>:<strong>\u00a0<\/strong>10.23918\/iec2018.29<\/p>\n<p><strong>Abstract:\u00a0<\/strong>Mobile banking becomes an interested technique within the modern bank establishments. It facilitates the transactions and day lifestyle of customers. It minimizes the impact of location and time for doing bank activities and communicate with bank servers. However, the process is not less risks from attackers and hackers, especially, user behaviors that opens and creates many vulnerabilities in this system. This work presents a new taxonomy for mobile banking attackers and threats. Through this taxonomy, this work will identify the important user vulnerabilities that attackers may misuse them for penetrating systems and steal privacy and sensitive date. The main contribution of this work is providing important suggestions for mobile banking users so that they can take them as precaution for protecting their privacy and financial aspects. The work concluded that there are many user behaviors of mobile banking leading to bring threats inside to systems. The work presents many suggestions for users so that their systems be protected from malicious activities and malwares. Many future aspects have been presented.<\/p>\n<p><strong>Keywords<\/strong>: Mobile Banking, Threats and Attacks, User Vulnerabilities.<\/p>\n<p>[button href=&#8221;https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2018\/02\/iec2018.29.pdf&#8221; size=&#8221;medium&#8221; textcolor=&#8221;#ffffff&#8221;]Full Paper (PDF)[\/button]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>4th International Engineering Conference on Developments in Civil &amp; Computer Engineering Applications (IEC2018) Title: A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES Authors: Saman Mirza Abdullah, Bilal Ahmed, Musa M.Ameen DOI:\u00a010.23918\/iec2018.29 Abstract:\u00a0Mobile banking becomes an interested technique within the modern bank establishments. It facilitates the transactions and day lifestyle of customers. It &hellip; <\/p>\n","protected":false},"author":23,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-2387","post","type-post","status-publish","format-standard","hentry","category-iec2018-proceedings-book"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES -\" \/>\n<meta property=\"og:description\" content=\"4th International Engineering Conference on Developments in Civil &amp; Computer Engineering Applications (IEC2018) Title: A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES Authors: Saman Mirza Abdullah, Bilal Ahmed, Musa M.Ameen DOI:\u00a010.23918\/iec2018.29 Abstract:\u00a0Mobile banking becomes an interested technique within the modern bank establishments. It facilitates the transactions and day lifestyle of customers. It &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-26T13:15:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-26T21:18:59+00:00\" \/>\n<meta name=\"author\" content=\"Web Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:site\" content=\"@tishkuni\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Web Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/\"},\"author\":{\"name\":\"Web Admin\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/29db1c5dd3318fe7aa99165dc7b6c203\"},\"headline\":\"A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES\",\"datePublished\":\"2018-02-26T13:15:49+00:00\",\"dateModified\":\"2018-02-26T21:18:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/\"},\"wordCount\":245,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#organization\"},\"articleSection\":[\"IEC2018 Proceedings Book\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/\",\"name\":\"A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES -\",\"isPartOf\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#website\"},\"datePublished\":\"2018-02-26T13:15:49+00:00\",\"dateModified\":\"2018-02-26T21:18:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conferences.tiu.edu.iq\/iec\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#website\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/\",\"name\":\"TIU - IEC 2020\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conferences.tiu.edu.iq\/iec\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#organization\",\"name\":\"Tishk International University\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2021\/09\/cropped-cropped-cropped-8IEC2-e1765454092479-1-1.png\",\"contentUrl\":\"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2021\/09\/cropped-cropped-cropped-8IEC2-e1765454092479-1-1.png\",\"width\":116,\"height\":63,\"caption\":\"Tishk International University\"},\"image\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks\",\"https:\/\/x.com\/tishkuni\",\"https:\/\/www.instagram.com\/tishk.international.university\/\",\"https:\/\/www.youtube.com\/channel\/UCQRKNIvqcvKLa7DLbWVvR7Q\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/29db1c5dd3318fe7aa99165dc7b6c203\",\"name\":\"Web Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g\",\"caption\":\"Web Admin\"},\"url\":\"https:\/\/conferences.tiu.edu.iq\/iec\/author\/web_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/","og_locale":"en_US","og_type":"article","og_title":"A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES -","og_description":"4th International Engineering Conference on Developments in Civil &amp; Computer Engineering Applications (IEC2018) Title: A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES Authors: Saman Mirza Abdullah, Bilal Ahmed, Musa M.Ameen DOI:\u00a010.23918\/iec2018.29 Abstract:\u00a0Mobile banking becomes an interested technique within the modern bank establishments. It facilitates the transactions and day lifestyle of customers. It &hellip;","og_url":"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/","article_publisher":"https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","article_published_time":"2018-02-26T13:15:49+00:00","article_modified_time":"2018-02-26T21:18:59+00:00","author":"Web Admin","twitter_card":"summary_large_image","twitter_creator":"@tishkuni","twitter_site":"@tishkuni","twitter_misc":{"Written by":"Web Admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/#article","isPartOf":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/"},"author":{"name":"Web Admin","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/29db1c5dd3318fe7aa99165dc7b6c203"},"headline":"A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES","datePublished":"2018-02-26T13:15:49+00:00","dateModified":"2018-02-26T21:18:59+00:00","mainEntityOfPage":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/"},"wordCount":245,"commentCount":0,"publisher":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#organization"},"articleSection":["IEC2018 Proceedings Book"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/","url":"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/","name":"A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES -","isPartOf":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#website"},"datePublished":"2018-02-26T13:15:49+00:00","dateModified":"2018-02-26T21:18:59+00:00","breadcrumb":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/iec2018-29\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conferences.tiu.edu.iq\/iec\/"},{"@type":"ListItem","position":2,"name":"A NEW TAXONOMY OF MOBILE BANKING THREATS, ATTACKS AND USER VULNERABILITIES"}]},{"@type":"WebSite","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#website","url":"https:\/\/conferences.tiu.edu.iq\/iec\/","name":"TIU - IEC 2020","description":"","publisher":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conferences.tiu.edu.iq\/iec\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#organization","name":"Tishk International University","url":"https:\/\/conferences.tiu.edu.iq\/iec\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/logo\/image\/","url":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2021\/09\/cropped-cropped-cropped-8IEC2-e1765454092479-1-1.png","contentUrl":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-content\/uploads\/2021\/09\/cropped-cropped-cropped-8IEC2-e1765454092479-1-1.png","width":116,"height":63,"caption":"Tishk International University"},"image":{"@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Tishkuniversity\/?ref=bookmarks","https:\/\/x.com\/tishkuni","https:\/\/www.instagram.com\/tishk.international.university\/","https:\/\/www.youtube.com\/channel\/UCQRKNIvqcvKLa7DLbWVvR7Q"]},{"@type":"Person","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/29db1c5dd3318fe7aa99165dc7b6c203","name":"Web Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conferences.tiu.edu.iq\/iec\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3a47b9231d151155cd33bd25d059ecb52841805eb3d30eec2e06be3ffe6ee961?s=96&d=mm&r=g","caption":"Web Admin"},"url":"https:\/\/conferences.tiu.edu.iq\/iec\/author\/web_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/posts\/2387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/comments?post=2387"}],"version-history":[{"count":3,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/posts\/2387\/revisions"}],"predecessor-version":[{"id":2403,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/posts\/2387\/revisions\/2403"}],"wp:attachment":[{"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/media?parent=2387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/categories?post=2387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/iec\/wp-json\/wp\/v2\/tags?post=2387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}