An Innovation Detection of Vulnerabilities for Digital Transactions in Financial Institutions Using Cyber Security Framework

Authors

  • R. Sangeetha Karunya Institute of Technology and Sciences, Coimbatore
  • R. Priscilla Joy Karunya Institute of Technology and Sciences, Coimbatore
  • M. Denisha Karunya Institute of Technology and Sciences, Coimbatore
  • Julia Punitha Malar Dhas Karunya Institute of Technology and Sciences, Coimbatore

Keywords:

Cyber security, Digital attacks, Sensitive information, Hacking, Framework

Abstract

Cyber security is an important and growing challenge in the world today. As technology advances, so do the potential threats posed by malicious actors. Cyber security is the practice of protecting networks, systems, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Cyber security threats come from a variety of sources, including activists, criminals, fo reign governments, and terrorists. All of these actors are constantly developing new tools and techniques for attacking systems. As a result, organizations must stay on top of the latest developments in order to protect themselves from these threats. One of the biggest challenges in cyber security is defending against the ever-evolving threats posed by malicious actors. To do this, organizations must have a comprehensive security strategy in place. In this paper, a cyber-security framework has proposed to identify the cyber threats. This strategy should include preventative measures such as firewalls, monitoring systems, and patch management. It should also include detection and response measures, such as incident response plans and digital forensics. Another challenge is staying ahead of the attackers. Attackers are constantly using new techniques and tools, making it difficult to defend against them. Organizations must stay up-to-date with the latest.

Downloads

Download data is not yet available.

References

Ramesh, G., Logeshwaran, J., & Aravindarajan, V (2022). A Secured Database Monitoring Method to Improve Data Backup and Recovery Operations in Cloud Computing. BOHR International Journal of Computer Science, 2(1), 1-7

Gupta, K., & Jiwani, N. (2021). A systematic Overview of Fundamentals and Methods of Business Intelligence. International Journal of Sustainable Development in Computing Science, 3(3), 31-46.

Moepi, G. L., & Mathonsi, T. E. (2021, December). Multi-Factor Authentication Method for Online Banking Services in South Africa. In 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (pp. 1-5). IEEE.

Hoballah, M. M., Hammoud, Z. L., & Awada, H. M. (2019). Electronic Financial Fraud: Abstract, Definitions, Vulnerabilities, Issues and Causes. Politics of the Machine Beirut 2019 2, 9-14.

Gupta, M., Rao, R., & Upadhyaya, S. (2004). Electronic Banking and Information Assurance Issues: Surveys and Synthesis. Journal of Organizational and End User Computing (JOEUC), 16(3), 1-21.

Logeshwaran J, Shanmugasundaram N, Lloret J. L-RUBI: An efficient load-based resource utilization algorithm for bi-partite scatternet in wireless personal area networks. Int J Commun Syst.2023;e5439

Jiwani, N., Gupta, K., & Afreen, N. (2022, March). Automated Seizure Detection using Theta Band. In 2022 International Conference on Emerging Smart Computing and Informatics (ESCI) (pp. 1-4). IEEE.

Gupta, M., Rao, R., & Upadhyaya, S. (2008). Electronic banking and information assurance issues: survey and synthesis. In Advances in Banking Technology and Management: Impacts of ICT and CRM (pp. 119-138). IGI Global.

Adhikari, N., Logeshwaran, J., & Kiruthiga, T. The Artificially Intelligent Switching Framework for Terminal Access Provides Smart Routing in Modern Computer Networks. BOHR International Journal of Smart Computing and Information Technology, 3(1), 45-50

Jiwani, N., & Gupta, K. (2019). Comparison of Various Tools and Techniques used for Project Risk Management. International Journal of Machine Learning for Sustainable Development, 1(1), 51-58.

Ramesh, G., Logeshwaran, J., & Aravindarajan, V (2022). The Performance Evolution of Antivirus Security Systems in Ultra dense Cloud Server Using Intelligent Deep Learning. BOHR International Journal of Computational Intelligence and Communication Network, 1(1), 15-19

Jiwani, N., & Gupta, K. (2022). Mitigating Cybersecurity Risks In Medical Devices Using Secure Implanted Techniques. Nasmin Jiwani, Ketan Gupta," MITIGATING CYBERSECURITY RISKS IN MEDICAL DEVICES USING SECURE IMPLANTED TECHNIQUES", International Journal of Creative Research Thoughts (IJCRT), ISSN, 2320-2882.

J.Logeshwaran (2022, October). The Topology configuration of Protocol-Based Local Networks in High speed communication networks. In Multidisciplinary Approach in Research, Vol. 15, pp. 78-83

Lloret, J., Garcia, M., Bri, D., & Sendra, S. (2009). A wireless sensor network deployment for rural and forest fire detection and verification. sensors, 9(11), 8722-8747.

Das, D., Kaytal, Y., Ganesh, R., Bhattacharya, R., & Ranjan, R. K. (2021, November). AuthSHAP: authentication vulnerability detection on tabular data in black box setting. In Proceedings of the Second ACM International Conference on AI in Finance (pp. 1-8).

Jasmine, J., Yuvaraj, N., & Logeshwaran, J. (2022, April). DSQLR-A distributed scheduling and QoS localized routing scheme for wireless sensor network. In Recent trends in information technology and communication for industry 4.0, Vol. 1, pp. 47–60

Muhammad, K., Hamza, R., Ahmad, J., Lloret, J., Wang, H., & Baik, S. W. (2018). Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Transactions on Industrial Informatics, 14(8), 3679-3689.

Gupta, M., Rao, H. R., & Upadhyaya, S. (2009). Security of alternative delivery channels in banking: Issues and countermeasures. In Socioeconomic and Legal Implications of Electronic Intrusion (pp. 305-327). IGI Global.

Ramkumar, M., Logeshwaran, J., & Husna, T. (2022). CEA: Certification based encryption algorithm for enhanced data protection in social networks. In Fundamentals of Applied Mathematics and Soft Computing, Vol. 1, pp. 161–170

Lin, B., Zhu, F., Zhang, J., Chen, J., Chen, X., Xiong, N. N., & Mauri, J. L. (2019). A time-driven data placement strategy for a scientific workflow combining edge computing and cloud computing. IEEE Transactions on Industrial Informatics, 15(7), 4254-4265.

Logeshwaran, J. (2022, March). The control and communication management for ultra dense cloud system using fast Fourier algorithm. ICTACT Journal on Data Science and Machine Learning, 3(2), 281–284.

Hong, S. (2019). Security Vulnerability and Security Measures of Kakao Bank in Industrial Environment. Journal of Industrial Convergence, 17(2), 1-7.

Grabosky, P., & Smith, R. (2003). Telecommunication fraud in the digital age: The convergence of technologies. In Crime and the Internet (pp. 41-55). Routledge.

Karim, Y., & Hasan, R. (2021). Taming the Digital Bandits: An Analysis of Digital Bank Heists and a System for Detecting Fake Messages in Electronic Funds Transfer. In National Cyber Summit (NCS) Research Track 2020 (pp. 193-210). Springer International Publishing.

Kovacs, L., & David, S. (2016). Fraud risk in electronic payment transactions. Journal of Money Laundering Control, 19(2), 148-157.

Hasan, I., & Rizvi, S. A. M. (2022). AI-Driven Fraud Detection and Mitigation in e-Commerce Transactions. In Proceedings of Data Analytics and Management: ICDAM 2021, Volume 1 (pp. 403-414). Springer Singapore.

Gupta, M., Rao, R., & Upadhyaya, S. (2005). Electronic Banking and Information Assurance Issues: Survey and Synthesis. In Advanced Topics in End User Computing, Volume 4 (pp. 233-256). Igi Global.

Logeshwaran, J. (2021, December). AICSA - an artificial intelligence cyber security algorithm for cooperative P2P file sharing in social networks. ICTACT Journal on Data Science and Machine Learning, 3(1), 251–253.

Edu, A. S., Agoyi, M., & Agozie, D. (2021). Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: FMEA and FTOPSIS analysis. PeerJ Computer Science, 7, e658.

Logeshwaran, J., & Shanmugasundaram, R. N. (2019, December). Enhancements of Resource Management for Device to Device (D2D) Communication: A Review. In 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 51-55). IEEE.

Kumar, S., Pathak, S. K., & Singh, J. (2022). A Comprehensive Study of XSS Attack and the Digital Forensic Models to Gather the Evidence. ECS Transactions, 107(1), 7153.

Creado, Y., & Ramteke, V. (2020). Active cyber defence strategies and techniques for banks and financial institutions. Journal of Financial Crime, 27(3), 771-780.

Sutharasan, M., & Logeshwaran, J. (2016, May). Design intelligence data gathering and incident response model for data security using honey pot system. International Journal for Research & Development in Technology, 5(5), 310–314.

Rose, J. D. ., R, V. R. ., Lakshmi, D., Saranya, S. ., & Mohanaprakash, T. A. . (2023). Privacy Preserving and Time Series Analysis of Medical Dataset using Deep Feature Selection. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 51–57. https://doi.org/10.17762/ijritcc.v11i3.6201

Sarangi, D. P. K. . (2022). Malicious Attacks Detection Using Trust Node Centric Weight Management Algorithm in Vehicular Platoon. Research Journal of Computer Systems and Engineering, 3(1), 56–61. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/42

Downloads

Published

16.07.2023

How to Cite

Sangeetha, R. ., Joy, R. P. ., Denisha , M. ., & Dhas , J. P. M. . (2023). An Innovation Detection of Vulnerabilities for Digital Transactions in Financial Institutions Using Cyber Security Framework. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 70–76. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3143

Issue

Section

Research Article

Most read articles by the same author(s)