Topic > Argumentative essay on e-banking - 1059

● An attack could take the form of unauthorized access to the virtual identity, its destruction, corruption or alteration of data or information, or any type of malicious procedure to cause system or server network failure, reboot or freeze as a result of a threat to security and secrecy. ● Modern security techniques have made cracking very tedious but not impossible, so security is very important. ● If the system is not configured correctly or updated software patches are not installed, hackers could breach the system by exploiting a security loophole. ● A wide range of information about Internet security flaws and their solutions is available free of charge on the Internet. ● Over the past few decades, during the e-banking process, the prevalence of malicious applications and software that steal financial account information has increased dramatically, often resulting in people losing their money. ● Hackers tend to target the weakest link or security hole, whether it is the host computer, the bank's server or the bank's website. ● Once the attacker has control over a user's computer, he can take advantage of the situation by abusing it