Thursday, May 7, 2020

The Security Measures Are Confidentiality Integrity,...

Abstract - A bank plays a vital role in peoples life.A bank connects customers with deficit assets to customers with surplus assets.Net banking refers to the system that enables bank customers to access accounts and general information on bank products and services through personal computer(PC) or other intelligent devices and it also performs virtual banking functions. Bank’s first aim is to achieve the trust of customers then customers report their personal details ,Security of the customers is the prime concern of the banks and it has its own measures to secure client details and transactions i.e; both online and offline.The major security measures are confidentiality integrity ,availability and accuracy. Apart from all the security†¦show more content†¦Login process can be done by using digital signatures. Eg:ICICI Bank,Kotak Bank,Canara Bank. B.Security: a.Frauds due to lack of security: The top frauds witnessed during April to December 2016 is ICICI Bank.During the first nine months of current ficial 455 fraud cases involved Rs.1 Lakh and above were detected in ICICI bank. SBI,ICICI,HDFC,YES banks were effected with an estimate of Rs.1.3crores already whisked off by hackers. The reason behind this is malware that targets computer system. b.security risks: Apart from all the protection we are still prone to risk like:phishing,Trojan horse,skimming and spyware. i.Phishing: This scheme involves useimng fake emails and fake websites. ii.spyware: A software that is secretly installed in a computer and takes information without the knowledge of a client. iii.Trojan horse: A scheme based on embedding a computer virus type software program on to clients PCs,Trojan hoses tie themselves into keyboard driver and record key strokes. iv:skimming: It is an advanced version of identity theft.frauders copy the information from magnetic strip and the back of your plastic without interfering with the legitimate payment transaction. v.criterion risk(HTTP): When A sends information to B,it will be in unencrypted form.This form is acceptable when A is not sharing any confidential information.When sender sends sensitive information like passwords,it will be ofShow MoreRelatedRelationship Between Info Sec And Cia Model1437 Words   |  6 PagesCIA 4) Confidentiality with Policy, Technology and Education. Two examples with how confidentiality is lost with policy and technology on Storage/Processing/Transmission aspects. The practice of defending digital information from unauthorized Access, Use, Recording, Disruption, Modification and Destruction is Information Security. There comes a question as to how do we start building or evaluating a security system. The answer is CNSS model or McCumbers cube (Committee on National Security Systems)Read MoreChallenges Faced By Large And Small Enterprises1372 Words   |  6 Pagesthe rise in increasing number and complexity of attacks, vigilant approaches to security in both large and small enterprises are a must. These days even a small sized business organizations as well as medium sized organizations have lot of money due to repeated fraudulent transactions. These are mainly due to the fraudulent electronic financial transactions. Individuals are really the weakest connection in any security composition. A great many people are not cautious about keeping secrets, for exampleRead Moreinformation system1104 Words   |  5 Pagesremember, each component of the information system has its own security requirements security and privacy to information systems. 1. Confidentiality To protect the confidentiality of information, you can use a number of measures, including the following: Information classification Secure document storage Application of general security policies Education of information custodians and end users Confidentiality, like most of the characteristics of information, is interdependent Read MoreThe Basic Components Of A Public Key Infrastructure1107 Words   |  5 Pagesprovides the framework services, technology, protocols, and standards that manage strong information security systems. Without a public key infrastructure, public key technology is not generally suitable for large-scale enterprise deployment. The purpose of a public-key infrastructure is to manage keys and certificates, which are used for documentation, entitlements, authentication, and confidentiality. Through managing keys and certificates, an organization creates and preserves a trustworthy networkingRead MoreLegal Aspects of Cloud Computing758 Words   |  3 Pageslanguage with the cloud is data security and ownership, says Lee.. Lee further explains that a company wants to have the right to conduct audits of security procedures and data centers. As far as writing a solid strong contract where all parties can live with, Lee makes another suggestion concerning contract language. The attorney states that the contract should ensure the guidelines of data encryption, including â€Å"a requirement to be notified immediately of any security breach and a requirement to allowRead MoreDifferent Types Of Information System Security Plan1183 Words   |  5 Pagesof information system security plan that will eventually helps an organization to run smoothly. The policy and analysis guidelines are needed to represent the relationship between organization policy as well as selected policy. Every organization should have a system security plan (SSP) which will apply to major as well as minor information systems. The better implementation of security policy will preserve as well as protect organizational classified data. System security plan should be configuredRead MoreThe Vulnerability Of Network Infrastructure Vulnerabilities1436 Words   |  6 Pages Security services are an integral part of any network design. Assessing the vulnerability of network infrastructure to disruptive events is recognized as an important component of network planning and analysis. This section provides an overview of common network infrastructure vulnerabilities, essential network security concepts analysis and present. It illustrates the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. This paperRead MoreA Brief Note On The Internal Revenue Service1153 Words   |  5 PagesThe Internal Revenue Service is trying to preserve and protect the availability, confidentiality, integrity, authentication, authorization and security controls of all employees and also the taxpayers. In the context of IRS information security, availability is generally expressed as the amount of time users can use a system, application and data, where user refers employees and taxpayers. Integrity refers the validity and accuracy of data. For IRS, data and information are intellectual property assetsRead MoreAnnotated Bibliography On Web Services Security1713 Words   |  7 PagesOverview Web Services Security has developed, implement, and will maintain a policy to ensure that appropriate safeguard measures are taken to be in compliance with American Legal System. Organization’s Position Web Services Security uses a risk-based approach to determining system security requirements to ensure that security is commensurate with the risk and magnitude of harm that can result from the loss, misuse, or unauthorized access to, or modification of, each of the following laws; GLBA,Read MoreTaking a Look at Information Warfare1781 Words   |  7 Pagesas the Internet and networked technology to reduce operating costs, improve customer service, and improve productivity. However, Using the Internet has increased the number of frontier that must be protected and has bought a lot of concerns about security issues. (Ezingeard, McFadzean, Birchall, 2005) Although, governments and businesses have spent billions of dollars on IT to protect their information, Medias highlights that the number of cyber fraud and cyber attacks by nation states, criminals

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.