Mobile Banking Security

Mobile Banking Security

Insight Report mobile banking security mFinancial Services Series www.goodeintelligence.com First Edition October 2012 Whilst information, advice or comment is believed to be correct at © Goode Intelligence time of publication, the publisher cannot accept any responsibility All Rights Reserved for its completeness or accuracy. Accordingly, the publisher, author, or distributor shall not be liable to any person or entity with respect to any loss or damage caused or alleged to be caused Published by: directly or indirectly by what is contained in or left out of this Goode Intelligence publication. 26 Dover Street London All rights reserved. No part of this publication may be reproduced, W1S 4LY stored in a retrieval system or transmitted in any form or by any United Kingdom means, electrical, mechanical, photocopying and recording without Tel: +44.20.33564886 the written permission of Goode Intelligence. Fax: +44.20.33564886 www.goodeintelligence.com [email protected] Mobile Banking Security CONTENTS Introduction to Mobile Banking Security ................................................................................................ 3 Five years of rapid change .................................................................................................................. 3 Banking goes mobile ........................................................................................................................... 4 What about security? .......................................................................................................................... 4 Executive Summary ................................................................................................................................. 5 Smart phones can improve banking security ...................................................................................... 5 Potential pitfalls .................................................................................................................................. 6 Mobile Vulnerabilities ..................................................................................................................... 6 Mobile malware on the rise and targeting banks ........................................................................... 6 How banks need to respond ............................................................................................................... 7 Market analysis ....................................................................................................................................... 8 Business drivers for the banks ............................................................................................................ 8 Convenience trumps security ............................................................................................................. 9 Ease of use is essential, but poor security is a “show stopper” ........................................................ 10 Mobile could be more secure ........................................................................................................... 10 Less malware ................................................................................................................................. 10 Personal relationship to the device .............................................................................................. 11 Continuous connection ................................................................................................................. 11 Multi-factor Authentication and Verification (MFA/MFV) ........................................................... 11 Regional Guide ...................................................................................................................................... 14 Introduction ...................................................................................................................................... 14 The global rise of the mobile phone ................................................................................................. 14 Africa ................................................................................................................................................. 15 Case study: South Africa ............................................................................................................... 16 Asia .................................................................................................................................................... 17 USA .................................................................................................................................................... 18 Case study – Bank of America ....................................................................................................... 19 Europe ............................................................................................................................................... 20 UK .................................................................................................................................................. 20 Slovakia ......................................................................................................................................... 22 Australasia ......................................................................................................................................... 23 Goode Intelligence © 2012 P a g e | 1 www.goodeintelligence.com Mobile Banking Security New Zealand ................................................................................................................................. 23 Rest of the world ............................................................................................................................... 24 Compliance and regulation ................................................................................................................... 25 USA .................................................................................................................................................... 25 Shifting responsibilities ................................................................................................................. 25 Western Europe ................................................................................................................................ 26 Conclusion ......................................................................................................................................... 26 Technology ............................................................................................................................................ 27 Introduction ...................................................................................................................................... 27 Dealing with the right person: Authentication ................................................................................. 27 Multi-Factor Authentication/ Verification (MFA/MFV) ................................................................ 28 The threat landscape .................................................................................................................... 29 Building secure apps – and keeping them secure ............................................................................. 31 Test the whole system .................................................................................................................. 32 How to keep apps secure .............................................................................................................. 33 Handling high smart phone turnover ............................................................................................ 33 Broader considerations ..................................................................................................................... 34 Goode Intelligence advice summary ................................................................................................. 36 Technology vendors and service providers .......................................................................................... 37 Introduction ...................................................................................................................................... 37 Encap ................................................................................................................................................. 38 Entersekt ........................................................................................................................................... 40 Entrust ............................................................................................................................................... 41 Monitise ............................................................................................................................................ 42 RSA .................................................................................................................................................... 43 Beating rogue apps ....................................................................................................................... 43 Managing transaction risks across the channels .......................................................................... 43 Future additions ............................................................................................................................ 44 SecurEnvoy .......................................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    58 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us