Proceedings of the International Conference on Dynamics of Environment, Sustainability, and Gender Disparities: A Holistic Dialogue for Inclusive Futures (ICDESGD 2025)

Combating Cyber Attacks in Online Banking: Effective Prevention Techniques and User Awareness Strategies

Authors
Samriti Mahajan1, Praveen Kumar Pandey2, *, Komal Jaiswal3, Sapna Sharma4, Sandeep Kapoor5, Anuradha6
1Associate Professor, New Delhi Institute of Management (NDIM), New Delhi, India
2Post Doctoral Fellow, Manipal University, Jaipur, India
3Assistant Professor, School of Commerce and Management, Lingaya’s Vidyapeeth, Faridabad, India
4Assistant Professor, School of Commerce and Management, Lingaya’s Vidyapeeth, Faridabad, India
5Assistant Professor, GN Group of Institutions GNIT, Greater Noida, India
6Assistant Professor, Department of Management Studies, Anangpuria School of Management and Technology, Faridabad, India
*Corresponding author. Email: praveen.pandey2022@gmail.com
Corresponding Author
Praveen Kumar Pandey
Available Online 6 May 2026.
DOI
10.2991/978-2-38476-575-1_12How to use a DOI?
Keywords
Phishing Attacks; Online Banking; Cybersecurity; Social Engineering; Protective Strategies
Abstract

The Phishing-attacks pose a serious threat to the security of online banking. These scams rely on manipulating human behaviour to steal sensitive details. Attackers seek passwords and account numbers. As people rely more on digital services, methods have become more advanced. This change raises dangers for everyone involved. Impacts go further than money lost. Attacks weaken faith in online systems. They also harm the wider financial network. Users suffer direct effects. Banks face harm to their name. They meet checks from regulators. Phishing thus weakens the base of safe digital deals.

This study looks at how phishing works in banking. It reviews the mind tricks attackers use. Criminals send fake emails. They build false sites that look real. Users act because they seem true. For example, a pretend alert from a bank urges quick login. The site then takes details. This shows how tricks use rush or worry. Responses include tech fixes and teaching programs. Banks add extra checks for user proof. Campaigns show how to spot odd notes. But success differs. Surveys find many still open bad links after lessons. This shows a need to check methods often.

Findings point to low knowledge as a main cause. To fix this, the study suggests focused plans. People can check web addresses before sharing info. These steps cut dangers in many ways. All must commit to make them work. The analysis uses first-hand data from event logs. It adds facts from past work. Logs show how often attacks happen. They note win rates. Other studies give info on who falls victim. These build a full picture of weak spots. Groups can add smart spot tools. Banks can team with security groups for fast threat news.

Copyright
© 2026 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the International Conference on Dynamics of Environment, Sustainability, and Gender Disparities: A Holistic Dialogue for Inclusive Futures (ICDESGD 2025)
Series
Advances in Social Science, Education and Humanities Research
Publication Date
6 May 2026
ISBN
978-2-38476-575-1
ISSN
2352-5398
DOI
10.2991/978-2-38476-575-1_12How to use a DOI?
Copyright
© 2026 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Samriti Mahajan
AU  - Praveen Kumar Pandey
AU  - Komal Jaiswal
AU  - Sapna Sharma
AU  - Sandeep Kapoor
AU  - Anuradha
PY  - 2026
DA  - 2026/05/06
TI  - Combating Cyber Attacks in Online Banking: Effective Prevention Techniques and User Awareness Strategies
BT  - Proceedings of the International Conference on Dynamics of Environment, Sustainability, and Gender Disparities: A Holistic Dialogue for Inclusive Futures (ICDESGD 2025)
PB  - Atlantis Press
SP  - 182
EP  - 207
SN  - 2352-5398
UR  - https://doi.org/10.2991/978-2-38476-575-1_12
DO  - 10.2991/978-2-38476-575-1_12
ID  - Mahajan2026
ER  -