What do you think would be the best solution to the problem

Assignment Help Management Information Sys
Reference no: EM132134658

Solutions for E-Banking Security Holes:

Digital Security of software systems in Banks is very important to protect sensitive bank information, employee's identity and customer's privacy, also to avoid many legal problems.

Strong security solutions are very important especially with the presence of online banking, banking software and workflow systems. The extensive usage of software systems in banks without strong security could lead to many legal problems. Normal security systems and policies do not stop internal or external hacking, and do not provide a legal way to proof any made transaction.

Online banking accounts are frequently targeted by cybercriminals. Security issues remain a major concern for customers and corporations alike. As a result, banks need to implement adequate security measures to protect themselves and their customer base.

Saudi Arabian Monetary Agency (SAMA) suggested the following solutions that aim to increase the level of security for online banking:

Identity Authentication

Banks should use appropriate measures in order to authenticate the identity of customers. It is important for any bank to check that each online transaction or access request is legitimate to ensure the safety of online banking.

Banks therefore have to use reliable methods for verifying the identity and authorisation of new and existing customers. Showing the customers what has been done to secure them, makes them feel the system is secure and that there money are protected.

Segregation of Duties

Banks should promote adequate segregation of duties within e-banking systems, databases and application, which is critical for their security and soundness. Therefore, Banks are required to set up sophisticated internal control designed specially to reduce fraud risk in operational processes and systems and to ensure that transactions and equipment are properly authorised, recorded and safeguarded.

The classification of duties should cover authorization, custody, record keeping and reconciliation.

Protect Data Integrity

Data integrity of transactions, records and information are essential for any bank to be protected. If the bank did not give special attention to that, it may face financial losses as well as legal and reputational risk.

In addition, banks should arrange and represent proper organisational, procedural and technical methods, which ensure that the integrity of financial and transactional data is maintained. Financial data recording should be stored securely, retrievable for inquiry or reporting, safeguarded against improper alteration, and mostly reflect the actual values involved.

Regular Update and Audit

Feasible updates of the online banking system would reassurance that the authentication platform is stay one step ahead of hackers and decrease there chances to stole the data and also minimize the security holes.

Banks should ensure that the internal control system is adapted to e-banking services and that clear audit trails are maintained. Added to that, internal controls should be independently auditable by external agencies. Audit trail should:

Give adequate proof to show the transaction stream, from start to finish, and any accompanying control/procedural execution.

Be sufficient to fulfill the rules of the courts under which they could be used.

Preserve the Confidentiality

The advent of online banking introduces extra security challenges for banks since it increases the exposure that information transmitted over the public network or stored in databases may be accessible by unauthorised or inappropriate parties. Also, expand the use of service providers may uncover essential data of banks to other parties.

So, the key data of the banks must remain private. Any abuse could result in exposing the bank to high impact reputation and legal risk. The protection of confidentiality should be commensurate with the impact of the risk of unauthorised exposure:

Confidentiality should be maintained by use of access controls and encryption.

Cryptographic techniques should be based on recognized algorithms that have not been disputed in their strength or use.

Access should only be permitted based on the "need to know" principle.

My Q is what do you think would be the best solution to the problem ( E-Banking Security Holes ) ? and what are the possible impacts ?

Reference no: EM132134658

Questions Cloud

What is the running time complexity of your function : What is the running time complexity of your function ? Justify
How stooge works in the most simplified way : Can someone explain to me how Stooge works in the most simplified way. Because am having a hard time understanding it.
Describe your result include the error table : Employ the LDA method using all the predictors. To do the prediction, use the first 405 rows as the training set and the rest as the test set.
Calculate and interpret the regression equation : HA1011 Applied Quantitative Methods - Holmes nstitute - What is the probability that a random sample of 49 different one-hour shopping periods will yield
What do you think would be the best solution to the problem : Cryptographic techniques should be based on recognized algorithms that have not been disputed in their strength or use.
Develop a prototype interface design for the learning engine : You intend to implement an Internet-based "learning engine" that will enable you to deliver course content to a student.
How would you respond in a way that islegal or moral : You are a software engineer working at a large publicly-traded corporation, where a colleague invents a new kind of compiler.
A new defense against ddos attacks : Their marketing folks are claiming that this will stop all DDoS attacks cold in the water. Is this a good solution to the problem?
How a systems decomposition into components is driven : Can someone explain how a system's decomposition into components is driven by the system's features/requirements.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd