A Comprehensive Analysis of Cyber Security Protection Approaches for Financial Firms: A Case of Al Rajhi Bank, Saudi Arabia

2021 ◽  
pp. 8-17
Author(s):  
Mohammed I. Alghamdi ◽  

In the modern internet-connected society, technologies underpin almost every action in society. Although there have been positive effects of technologies in the organization, there have been forensic specialists indicating the issues and challenges with cyber security threats. The real-time conditions provide the capability of the organization in detecting, analyzing, and defending individuals against such threats. In this research project, the focus is on understanding the cyber security threats and the protection approaches to be utilized in safeguarding threats from financial institutions. With the Covid-19 pandemic, most of the financial firms, including Al Rajhi Bank, are utilizing technologies in their operations, and this has exposed them to cyber security threats. From the literature review conducted, the financial firms need to consider cyber security approaches including implementing triple DES, RSA, and blowfish algorithms in improving the security measures of the organizations.

Author(s):  
Victor R. Kebande ◽  
Nickson M. Karie ◽  
Richard A. Ikuesan

AbstractThe phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats (CSTs) in the world today, many organisations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of Real-Time Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments.


2020 ◽  
Author(s):  
Pranav C

Abstract: With rapid computerisation of all walks of life, cyber security has become a major challenge to the mankind. Cyber security is all about security of anything in cyber realm, while information security is all about security of information regardless of the realm. Cybercrimes are perpetrated by using computers and related devices / networks by individuals with sophisticated knowledge in the field of computers. Cybercrime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cybercrime has assumed rather sinister implications. Cybercrime perpetrators are keeping pace with innovations in technology and are way ahead of security measures taken to curb them. With huge money involved in cybercrimes, it has become a major concern. This research paper briefly defines cyber security and deals in detail with cybercrime and five major cyber security threats currently plaguing the world.


2020 ◽  
Vol 10 (1) ◽  
pp. 13-26
Author(s):  
Candra Irawan ◽  
Adi Bastian ◽  
Febrozi Rohadi

Currently in Indonesia Islamic Bank has gained a place and interested in the community, causing many emerging Syari'ah Bank and Financial Institutions of the syari'ah, and products in Islamic banks are widely used is murabahah financing. The formulation of the problem in this research are: (1). How is the implementation of the sale and purchase through murabahah financing between Bank Muamalat Harkat with customers. (2). Is trading system murabahah financing between Bank Muamalat Harkat and customers have been according to the principles of Syari’ah. (3). How murabahah financing efforts to resolve the breach between the customer and Muamalat Harkat. This research method is empirical legal research, this study was conducted in Bank Muamalat Harkat based data collection through field research such as interviews, observation and description as well as information from respondents through library research. The results of this research are: before an agreement Bank to assess carefully the prospective customer in the form of a comprehensive analysis and is divided into several stages, such as the assessment using the principle of 5C Character (Character of the debitor), Chapacity (Capability Candidate Debitor) , Capital (Capital candidate Debitor), Collateral (Collateral candidate Debitor) and Condition of economy (economic condition of the prospective Borrower). Trading system murabahah financing between Bank Muamalat Harkat with the customer has not fully based on the principles of the Syari'ah. Murabahah financing efforts to resolve the defaults can be solved by R3 is Restrukturing (Arrangement Back), Reconditioning (Terms Back) and Rescheduling (rescheduling), sales collateral and auction execution. 


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


Author(s):  
Chris Reeves ◽  
Geoff Davis ◽  
David D. Ward ◽  
Tim Edwards ◽  
Alastair R. Ruddle

Sign in / Sign up

Export Citation Format

Share Document