"We conducted experiments with five popular mobile payment systems, in four broad categories - wallets (PayTM, FreeCharge), direct link with user's bank (BHIM), specific bank's app for account holders (iMobile by ICICI Bank), and basic USSD service (dialing *99#)," said Prof. Rahul De, Chairperson, CSITM, and faculty in the Decision Sciences and Information Systems area at IIM Bangalore.
He explained that the study evaluated the apps on the following six key security principles combining the Basel Committee's 'Risk Management Principles for Electronic Banking' and RBI norms for electronic banking transactions:
- The potential for confidentiality breaches
- The management of the transactions for subsequent repudiation
- The strength of the authentication process
- The data and transaction integrity procedures
- The extent of access and availability of services
- The procedures for maintaining privacy of customer information
"The study found serious privacy concerns with all the services studied. For instance, while in many apps like Freecharge, the wallets are not directly linked to third party vendors (such as Uber or BigBasket), apps such as PayTM allow for automatic linkage with the vendors, and the vendors can automatically deduct amounts without the explicit consent of the user. Potential for confidentiality breaches was a problem observed for all the mobile payment methods, except USSD", said Prof. De.
A recurring security concern found in the study was that many of the apps (such as PayTM, Freecharge) do not automatically log the users out, and anyone having access to the phone can make financial transactions through these apps.
"This risk is highest if the user loses or misplaces her/his mobile phone, and higher still if the phone is unlocked or unprotected. However, apps such as iMobile, BHIM have auto-logout/ session time-out features", said the study.
"We also observed inadequate management of the transactions and no evidence of systematic analysis of transaction patterns. The lack of these features are a potential security violation. However, even while we were conducting the study, we observed that the features of the apps and services were constantly evolving and changing. Hence, we add the caveat that the evaluation of the apps in this report is as observed during our study conducted between December 16 to January 17, and it is likely that some of the concerns presented in this report have been addressed, and perhaps new concerns have emerged," Prof. De emphasized.
Click here fore more Education News