Presenting yourself under a false identity In the context of e-banking, this means that a third party logs into a financial institution’s site with someone else’s access data and therefore under someone else’s name. This then gives the third party unlimited account access. For the financial institution, it becomes exceedingly difficult to distinguish whether they are communicating with customers themselves, with an intermediary on their behalf, or with a criminal attacker. Impersonation is used in classic-style phishing attacks and when third party providers access bank accounts.
Amongst others, this is used as a protocol of the network layer on the Internet and creates the terminal system connection between computers. This protocol therefore controls the process used for data to reach their destination via a network.
Transmission Control Protocol/Internet Protocol
This is an address in computer networks based on the Internet Protocol. It is allocated to devices connected to the net, and renders devices addressable, and hence reachable.
This is the provider of Internet access, i. e. the organisation or company which enables users to connect their computer to the Internet. At a fee, they grant a connection to the Internet via cable connections, telephone lines or satellite links.
Participate in one of our «eBanking – but secure!» courses (in GERMAN, FRENCH and ITALIAN language only) and learn how the «5 steps for your security» can protect you when e-banking!
information / registration
Copyright © 2019 – All rights reserved. Lucerne School of Information Technologies