Cyber security is the protection of computers, networking, programs and data from foreign attack, misuse, and damage and unauthorized access. In context to computer, security is composed of both physical security and cyber security. Banks are the most targeted business of cybercrimes. This is because banks has more money than any other business. They in turn became the best target for the hacker to extort money from. There are numerous threats, which are aimed towards the banking business (Amin et al 2013. The hardest to detect threat is the threat from inside the organization. When these insiders abuse their power, the bank systems are hacked and sensitive information is disclosed to outsiders. The report further discusses about the objective, scope and literature review on the topic.
For maintaining cyber, security in an organization there needs to be three main objectives, which should be followed:
The objectives, which a banking industry must follow, are discussed below:
Objectives the Indian banking sectors follow in the current scenario:
Recommendation of the problems in Indian banking industry
The reserve bank of India has set out a list of guidelines, which can be followed by the banks in order to manage risks associated with cyber-attacks. The circular has covered all the notable suggestions for the banking industry. It discusses the use of continuous surveillance and the creation of a cyber-security policy for immediate assessment of the risks and to prepare a report to be submitted to the regulator (Gai et al. 2015). To diminish the future possibility of the risks in the organizations they should conduct a complete review of the security measures of the infrastructure of the organization. A forensic analysis of the systems should be of benefit to assess all the breached that has occurred or are in a compromised situation.
The project is in need to setup an awareness of the different problems in cyber security in the banking industry. Evaluating the different kinds needs and use of cyber security in banking purpose, how the businesses are improved by using of good cyber security protocols in the banking environment (Hahn et al. 2013). In the report there is going to be reviews of some journals in the literature review section to explain the main objectives related to the cyber security in banking industry and then conclude the processes and different requirements of this cyber security in a banking environment.
Cyber security is an ever-exploding field with a huge growing body of research material. It has its roots in the domain of computer science, but due to the recent cyber security flaws, it has gained importance in the domain of business management and law (Hong et al. 2014). New areas of technology like smart grids, smart automobiles and systems, which are experiencing new vulnerabilities in terms of security. Due to the recent increase in the cyber security problems a more unified into a standardized academic learning. Standardization of the problem is a commonplace in scientific discipline to begin with the standardization of vocabulary.
The intention of this type of literature review is to assess the new trends in the state of cyber security policy and to explore the new topics related to the cyber security systems (Knapp and Langill 2014). All the searches has been restricted to strict academic journals only.
Cyber-attacks refer to the deliberate actions used to change, disrupt, destroy or degrade the quality of a computer system or the programs running on this system. Any kind of business would rely upon information and data (Kumar, Pandey and Punia 2014). Computers are used by the business to store such information, process them and generate a report helpful for the organization. A network of computers may be crucial for many of the data processing work and back office works, so it needs to be kept secure. Advanced firewall technology, encryption of files and data, security systems, access specific tools and automated management tools can be used by the organizations to safeguard the information stored on the systems.
To achieve the best protection system, a strategy needs to be designed based on the analysis of the threats. The threats can be classified into three classes: piracy, tampering and reverse engineering (Oltramari et al. 2014. Piracy in this context is the unauthorized access of different software’s ad making copy of the same to sell illegally. The attack of tempering is the alteration of a computer system or assets without correct authorization. Changing the coding of software has to act as backdoor phishing software’s can be categorized into the act of tampering. Some of the anti-tampering mechanism in case of a network is the use of firewall or antivirus software’s. In case of software’s a secure loading software, which checks the authentication of the software’s, can be used. The third type of attack is known as reverse engineering. This method is used to learn the working of a software and use the same software to steal information from the user using the software. Reverse engineering the software can also be termed as piracy of software’s (Qiu et al. 2016). To combat such security attacks there should be implementation of a well-engineered combination to produce the best results in terms of safety.
With the gradual increase in the use of technologies in the banking industry, there has been a huge rise in the evolving cycle of the industry. Using internet of things, near able devices and near field communication devices are some of the emerging technologies that can be used in the baking industry in the near future. In the current market, the major breaches in data security occur in the cyber threat software. There is a constant change in the landscape of the treats, which are occurring in the industry (Ramirez and Choucri 2016). New types of attacks are coming up once an old attack becomes obsolete. Money laundering issues, which are being flagged, are not being reported as soon as they are being found. Official’s blackout of the situation if they find out about the problems in the money transaction systems. Data breach can occur at any time during the day or the night. This keeps the bank officials up at night so that their industry can thrive in the market. Keeping the customers satisfied in their business sis the most important aspect of the industry. The officials has often reported the ban threats as not threats but the act of an organized crime targeted towards the bank (Ramirez and Choucri 2016).
Confrontation of such issues is crucial for the banking industry. They use communication among themselves and with the IT specialist in removing such threats and cyber-attacks. Intelligently using software and installation of the tracing and monitoring software’s in the systems can help them to find out any kind of unauthorized entry in their system (Wilson and Kiy 2014). Collaborating with other industries like companies specializing in cyber security and threat reduction processes would help the industry to better control the process during time of risk. Using backup procedure and testing out different scenarios of data breach attacks can help them to identify the risks, which they are currently facing in their system. After correct assessment of the threats that are active in the industry, the organizations can improve by using better software’s and connections with other industries.
Thee major challenges, which the banking industry faces in the recent times, include:
To adopt the new emerging trends in the cyber security prospect the banking industry can adapt to the following phases:
The attack on the United Bank of India occurred on 22nd of February 2013. One of their offshore accounts suffered a data breach during a cyber-attack. The money trail was tracked down and the officials blocked the funds (Angst et al. 2017). The official report said that they did not suffer any loss at the bank as they had informed the officials about the breach. The official report said that the breach occurred in New York. Another source said that the attack was original attack originated from Hong Kong. Following a recent cyber-attack in a bank of Bangladesh the Indian bans has been asked to put up with cyber security policy for the industry. The forensic audit assessed the working of the current system and found the disputes in the system. They have reported in the report that they will be looking into the matter and change the security system.
Conclusion
From the above report, it can be concluded that cyber security is an increasing threat to the banking industry. Cyber-attacks can be of different types like fraud threats, ransom ware and malware attacks in the banking system. The objectives of the study has been discussed extensively before moving on to the literature review of journals to create the report. Banking sector in India has fairly matured in the recent development of the technologies. They have started to work with foreign banks to provide better banking experience to the citizens of the country. With the growing economy of India, it can be said that the banking industry in India is an industry, which should be clear from all types of cyber threats.
References
Amin, S., Litrico, X., Sastry, S. and Bayen, A.M., 2013. Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5), pp.1963-1970.
Buczak, A.L. and Guven, E., 2016. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016. A review of cyber security risk assessment methods for SCADA systems. computers & security, 56, pp.1-27.
Elnagdy, S.A., Qiu, M. and Gai, K., 2016, June. Understanding taxonomy of cyber risks for cybersecurity insurance of financial industry in cloud computing. In Cyber Security and Cloud Computing (CSCloud), 2016 IEEE 3rd International Conference on (pp. 295-300). IEEE.
Gai, K., Du, Z., Qiu, M. and Zhao, H., 2015, November. Efficiency-aware workload optimizations of heterogeneous cloud computing for capacity planning in financial industry. In Cyber Security and Cloud Computing (CSCloud), 2015 IEEE 2nd International Conference on (pp. 1-6). IEEE.
Gai, K., Qiu, M., Thuraisingham, B. and Tao, L., 2015, August. Proactive attribute-based secure data schema for mobile cloud in financial industry. In High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on (pp. 1332-1337). IEEE.
Hahn, A., Ashok, A., Sridhar, S. and Govindarasu, M., 2013. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid, 4(2), pp.847-855.
Hong, J., Liu, C.C. and Govindarasu, M., 2014. Integrated anomaly detection for cyber security of the substations. IEEE Transactions on Smart Grid, 5(4), pp.1643-1653.
Knapp, E.D. and Langill, J.T., 2014. Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.
Kumar, V.A., Pandey, K.K. and Punia, D.K., 2014. Cyber security threats in the power sector: Need for a domain specific regulatory framework in India. Energy Policy, 65, pp.126-133.
Oltramari, A., Ben-Asher, N., Cranor, L., Bauer, L. and Christin, N., 2014, October. General requirements of a hybrid-modeling framework for cyber security. In Military Communications Conference (MILCOM), 2014 IEEE (pp. 129-135). IEEE.
Qiu, M., Gai, K., Thuraisingham, B., Tao, L. and Zhao, H., 2016. Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Generation Computer Systems.
Ramirez, R. and Choucri, N., 2016. Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review. IEEE Access, 4, pp.2216-2243.
Sou, K.C., Sandberg, H. and Johansson, K.H., 2013. On the exact solution to a smart grid cyber-security analysis problem. IEEE Transactions on Smart Grid, 4(2), pp.856-865.
Tonge, A.M., Kasture, S.S. and Chaudhari, S.R., 2013. Cyber security: challenges for society-literature review. IOSR Journal of Computer Engineering, 2(12), pp.67-75.
Wilson, K.S. and Kiy, M.A., 2014. Some fundamental cybersecurity concepts. IEEE Access, 2, pp.116-124.
Angst, C.M., Block, E.S., D’Arcy, J. and Kelley, K., 2017. When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches. MIS Quarterly.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download