Documente Academic
Documente Profesional
Documente Cultură
Banks are attracted to money so that more targeted to crimes. Some of them are cheque
fraudulence, robberies etc. Traditional banks haven’t had computer technology so that banks
used to have a strong physical security and robust process to fight. Now a days, threat to banks
has been enormous and unpredictable.
Most of the banking operation has been computerized and all data is in electronic format. This
effort is to provide network security solution for a Bank (Financial Institute) which is
implementing internet banking. The bank has over more than Thirty branches island wide which
has an intranet which is open to all the outsiders. Bank is a critical Financial institute which is
required to have a high level of Network security as all the inside and outside customers are
engaged in the Bank workflow. Features of developing an internet banking portal required a
virtuous study on security, data protection and access control.
The key components of a network security solution are IPS, Firewall, SSL, IDS, Access control,
Encryption module and associated protocols. More else possible network vulnerabilities, attack
scenarios and industry standard compliances are also discussed and analyzed by this work.
Let’s dig down on the services bank will provide that no other organization would provide. The
traditional three core piece of utilities are:
Since the emergence of banking during the 14th century, as banks we’ve taken that core utility
and we’ve added structure. Initially this structure was about network—where you could bank.
Banks then added structure around the business of banking, trust and identity—who could bank,
what was a bank and how you had to bank.
Technology now affords us the ability to radically eliminate that friction and create banking
embedded in the world around us, delivering banking when and where we need it the most. The
main issue of the technology innovation is because of the increase in cyber-attacks and computer
crime. The commonly identified threat in online bank transactions is the identity theft attack,
where the hacker is stealing the information to fraud transactions which may lead to empty the
entire accounts of the bank customers.
The financial institutes that cater customer to get what they want, when and where they want it
realize, the consumer does not need frequent branches, they need more robust online
applications, mobile banking applications to full fill the requirements.
“Banking is necessary, but banks are not.”
Today, we’re at an inflection point in which technology can be leveraged to bring back the
highly personal and relationship-oriented interactions of the past. That same technology can also
be used to dehumanize commerce and banking experiences, raise privacy concerns, and drive
unwanted interactions. As a banker, consumers are seeking for right set of services to create set
of experiences that consumer desired.
The chief objective of this project is to provide an effective solution for the network security of
the selected bank on regards to their online internet banking portals. In implementing such a
technique, its necessary to follow the required stages occasionally. Staring from the requirement
gathering stage, scaling and up to hardware infrastructure stage and then to software
infrastructure instalment, training and development of the respected members of the staff are the
basic stages which is to be followed. Any breakdown which will failed the reduce the
implementation efficiency of network security. As the selected Bank has over more than Thirty
branches island wide, with a goal of expanding the business in another two years. For the
purpose of this expansion the bank will be in a need of a solid and more vigorous network
security solution with a high level scalability. This paper will contain researches with similar
implementation methodologies that is recommended for and industry level work.
The selected bank still does not have the online banking facility given for their customers as they
have been much considering regarding the security measures that is needed to be taken in order
to secure the transactions happening between the customers. But they are in an essential of
providing the internet banking facilities to the customers as it has been a primary requirement for
the people who are with a busy schedule. As none of their applications are based on internet,
which has been applied by a closed network that is needed to be reconfigured to maintain the
internet banking. This work will overlook how to restructure the bank network and provide the
required network security to the internet banking portals.
2. Objective
The main Aim of this project is to analyze, design, propose and develop Network Security
solution for IB portal with respect to few of the selected institutions. And also the key objective
of presenting this work is to secure all the stored data components and manage all the Internet
Banking functions related security aspects. Achieving this aims have to been followed through
several stages. Beginning from assessing the existing network, scanning its vulnerabilities,
rearranging the current network and security levels, implementing public access portals along
with the security access control, and also end user approachability.
- Examine and conduct a research in the industry with expertise and conclude the best
solution.
- Identifying the security weaknesses if the existing environment.
- Securing the bank internal data from being accessed by the unauthorized outside parties.
- Proposing a better network security solution and ensuring the protection of the
transactions which is done through the bank online portal.
- To provide the financial organization a strategy on how to implement the new
explanation to succeed for the best possible result.
- Coming up with a new Security policy for internal users and also implementing the
necessary security roles in the environment.
Sri Lanka is a growing country and seeks new technology platform to make day today life easier.
Internet Technology is playing a major part in today’s countries economy. Most of the services
has been turned on to IoT to serve the consumer demand. Although growth has been enormous,
the relative challenges to the information security also vast. There are many reasons to cause
unintended security breaches.
Goal of this research is to provide an effective and secure solution for a banking organization
seeking to implement a online base application. Some of the challengers has been identified such
as implementation cost, infrastructure, security, complexity of implementation which required a
solution from scratch. The solution which proposed here, consider the existing infrastructure as
well which would be a cost factor.
The most effective method of security the banking application would be from the scratch which
is to follow secure development lifecycle and tack count of security from the initial phase.
3. Literature Review
Because of the increasing computer crimes and development in hacking tools & hacking
methods, financial service in the modern world such as Internet Banking are needs to
implementation of high class security procedure. Modern internet banking are wider availability
and security area is the most important two pivotal areas (Chang 2003).
Same as Sri Lanka other places also discussed, It's like Internet Banking introduction at
Malaysia. On the other side, regarding the improvement of the IB infrastructure most of the
authors were discussed in detail, modern IB based on the tele-banking experience (Yousafzai,
2012). Discussing about the infrastructure of the modern IB, needs to resolve the main two
factors. Those security problems are building from the customer end (like a security issues of
The Global System for Mobile communication network -GSM functionality and compromising
of the Mobile app) and also Bank Server end (loopholes, human error, backdoors, etc. open the
way for unauthorized entry and data accessibility). Man in the middle attack irrelevant to this
case (because the data protection of the data transit is not irrelevant to this case). Will address
these matter can be resolved if the data transmission protocols (https) compliance. (Mallat et al.,
2004).
Reduce the effects on the customer end, banking App should be authenticating by the Bank, the
thing is malignant apps will harm to customer and bank posing as the official application.
(Cognizant, 2014). In there, bank app will be the door between the bank and customer, then the
authenticity is the main part. Also, GSM infrastructure problems and security issues are not
relevant (directly) in this type case. Therefore, take some time to recovery that hole, also will
developed the solutions globally (Chbeir et al, 2013). Implementation of the online bank facility
should concern security of the both ends (customer end and bank end) than the middle.
Under this implementation, information exchanged has high important part, also storing very
important. Normally we all are knew bank have millions of data (customers), those are credit
card information, credentials, spending etc. (Hyun Lee, et al. 2013). Therefore, the bank should
need the combination of the authentication, encryption and auditing mechanism and
methodology as an integral part (system). Secure Sockets Layer (SSL) coupled with encryption
(128 bit) in these type of system (as a basic components), Firewalls (both hardware and software
type), Authentication protocols (Username & Password), Alert system (for customer as well as
banking monitor), Access control (of staff members and IT admins), Data encryption in storage,
and Account locking. Malware threats should be identifying, should take suitable responsible
activities, also knew the specific targeting areas. (EPC, 2017; Mohamed & Maskat, 2007). Also
Phishing can effective to modern Internet Banking authentication systems (Drolet, 2018), It is
rise from those days on the implementation of Internet Banking.
Security of the e commerce depend on the few things (facts) and complex inter combination &
interrelationship of those things, database management systems, network infrastructure and
systems software, also including the application development platforms. In here, if the one of
component have single issue, it causes to overall failure and security problems in the entire set-
up. Since the early days in E-commerce that points have been valid (Deitel et al, 2001; Stallings,
1999). Those implementations key ingredient is access control, then proposed implementation
will add the significant access control. Also under the passing note, hope to carrying out a
customer survey of their IT literacy and utilize of the Internet Banking etc. In here compatibility
is very important, still we haven't evaluated the app structure and portal design (without a survey
sample). But, Already The Bank IT department client interface management taken, in this
proposal subject limited is Networking Security.
Industry has a reputation that isn’t much better than the tobacco industry. That a survey found
that 51% of respondents indicated the financial services industry has a “very bad” reputation.
Contrast this with technology companies, in which just 6% of respondents indicated this, and
banks need to do more than have Facebook pages. People trust their friends and family, but not
their banks. How can the banking industry rebuild trust and relationships with its customers?
Aside from some of the basic business model reformation that will happen, for example, finding
ways of making money through value creation versus penalty fees, overdraft fees, automated
teller machine (ATM) fees, and so on, understanding and fitting into a customer’s lifestyle
becomes very important. This is where social fits in.
Mobility devices are becoming computing device for customers and from that new set of
possibilities open financial institutions. These new opportunities come about as a result of online
applications.
Considering the all above factors, Proposed Bank - ground survey should implement following
components in the Internet Banking implementation (to assess the current setting of bank,
security status, staff and customer IT literacy networking architecture), Scan Vulnerability,
Identification of Customer requirement.
Also needs to identification of components proposed network security solution, should take the
verification of proposal with industry standards, Consider the possible attacks (E.g. DoS,
Hacking, Phishing, etc.) and give the special attention, give the proposal for enhancement of the
existing environment and new guide, solution for IB.
One of PayPal’s biggest innovations over the past couple of years has been its co-innovation
with the banking industry. One such example allows bank customers to use their mobile phone to
instantly send money around the world for a fraction of what it cost years ago, which offers
significant value.
Main components are the Firewall (both hardware and software), SSL module, Authenticating
module (single sign-on) Web Application Firewall, IPS/IDS.
That type of major network change will affect daily works of the bank, Access privileges, IT
policies & practices. Because through the proposal, should needs to inform to senior
management over the time scale, module by module, should discuss those effects,
implementation should have several stages, each module have training session.
4. Network Security for Banking
This section will be discussed about the requirements of the new implementation, Legal and
regulatory. Policy and procedures and con concept behind these technologies. This creates a
baseline for a better solution and will provide operational principals and operational
environment.
The Baseline Security Standard for Information Security Management (BSS) has focused on
every aspect of information storage, transmission and processing via CIA triage. The Network
security has been identified in the Part II: Security Domain, Communication Security –
As you see here, the Network security and Internet security has been focusing in the standard as
well. These are legal requirement and the bank should be adhered to these guidelines when
implementing the policy and procedures.
The section “Communication Security” brief about controls which are relevant to network,
should be identified and implemented in order to protect the information which has been
processed, transit and stored in the infrastructure. The controls such as VPN, SSL, RA, CA are
some of examples. Then it mentions about access control to be implemented to enable secure
access to the network. And it mentions about network segregation and information segregation
separation of environment. Further it discusses about the network policy as well.
Section 10 discuss about adequate procedures for segregation of duties, which means
Segregation of duties is like a separation of duties and responsibilities policy, but it also
combines the principle of least privilege. The goal is to ensure that individuals do not have
excessive system access that may result in a conflict of interest. When duties are properly
segregated, no single employee will have the ability to commit fraud or make a mistake and have
the ability to cover it up. It’s similar to separation of duties in that duties are separated, and it’s
also similar to a principle of least privilege in that privileges are limited.
Authentication method to ensure non-repudiation: Not being able to deny having performed an
action or activity or being able to verify the origin of a communication or event. Nonrepudiation
ensures that the subject of an activity or who caused an event cannot deny that the event
occurred. Nonrepudiation prevents a subject from claiming not to have sent a message, not to
have performed an action, or not to have been the cause of an event. It is made possible through
identification, authentication, authorization, accountability, and auditing. Nonrepudiation can be
established using digital certificates, session identifiers, transaction logs, and numerous other
transactional and access control mechanisms. A system built without proper enforcement of
nonrepudiation does not provide verification that a specific entity performed a certain action.
Nonrepudiation is an essential part of accountability. A suspect cannot be held accountable if
they can repudiate the claim against them.
Maintain comprehensive audit trail, the audit trails created by recording system events to logs
can be used to evaluate the health and performance of a system. The event logs leading up to a
crash can often be used to discover the reason a system failed. Log files provide an audit trail for
re-creating the history of an event, intrusion, or system failure. Auditing is needed to detect
malicious actions by subjects, attempted intrusions, and system failures and to reconstruct
events, provide evidence for prosecution, and produce problem reports and analysis. Auditing is
usually a native feature of operating systems and most applications and services.
Above are the security controls mentioned in the BSS standard related to network security and
internet banking.
According to the IT staff, all are well knowledge of IT technology and relevant competency has
been maintaining. And aware about information security and data protection, liabilities.
The rest of the people are non-IT staff which would do the regular banking activities as BAU.
The ratio between IT and non- IT is 1:3 and total staff would be 60. Considering the ratio of this
initial requirement can be cater with the existing staff.
Management Contribution: In a project like this, Management contribution is critical and they
has to support the plan and growth. A formal meeting has been conducted with the bank
management to gather information on their expectation. This covered future expansion goals,
current investment capacity, IT awareness & restructuring costs factor, time factor (road map) of
implementation, and accessibility to bank's central IT infrastructure. It has also detailed each
stage how the solution will be implemented, system shutdown requirements, and permission to
cooperate with mobile interface developers