SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 72
State of Cyber Crime Safety and Security in Banking
Lubna Tabassum
Amruta Institute of Engineering and Management Sciences
Abstract:
The article analyzes the security of threats and online transactions affecting banking systems. In the 21st
century, these threats have started to penetrate online banking, focusing on banking systems with the help of
pools of software engineers worldwide, from online lending to a fake lottery. Banking companies are confronted
with fraud and fraud problems that assimilate customers and financial professionals working in banking
institutions. Risk issues arise from the underlying malware that can affect payment information disclosure
systems that allow us to use current hacking techniques. For example, electronic threat checks include biometric
confirmation machines (PVN) that expel fraudsters from banking operations. Preparing for cyber security will
allow banking services and individuals to improve security efforts. Reports suggest that cyber risk is a
significant emergency that can affect banking systems and reduce opportunity odds.
Keywords: Cyber, Crime, Safety, Banking, Online tools
I. INTRODUCTION:
The advancement of the tool has had an incredible impact on the progress of banking and information
exchange on the Internet, and draws attention, the advanced space is a critical factor in the development and
optimization of information on the planet [1]. However, these rapid advances in the information and
correspondence phase are plagued by new threats called cybercrime. Cyber attacks must behave incredibly well
for new products and the underlying moral of disgruntled people. Shakedown Online is part of cybercrime,
which continues to be unimaginable in the financial sector. The massive rise of mixed-use media and the growth
of information advancement through systems have made cybercrime an unknown impact on notoriously bad
brand awareness around the world, weakening remote accounting professionals. As noted in the Saad Mubeen
(2020), the choice to add liquidity to the economy has accelerated the growth of cybercrime in the country.
Subsequently, cyber-attacks on banking systems are brutal, controllable, and require cyber security targets,
including necessary information about a country's cash flow [1-3]. Hence safety on cyber security becomes one
of the top priority research across the globe which can be noted in global leaders like America [4-7].
II. COPYRIGHT IS CONSIDERED
Between the twenty years 2000 and 2020, the bank's settlement strategies undoubtedly indicated the loss
of NGN 160 billion. As New Horizons Ltd notes, the amount lost due to cybercrime is generally 413 billion
each year. One of the differences resulting from this critical situation is that the representation of financial
fractions is measurable, but it cannot be resolved because frustration with human costs will cost more than a
material violation [5]. Monitor the problem of electronic scams; investigate the causes or causes of their
questions, and the best answers to remember the war against the violations, including the banking sector's
development information system. Cyber threats in the banking sector began in the 1990s with the rise and
resurgence of a diverse assortment. Recognized and anti-cybercrime issues in the banking sector include loss of
money, essential information, and trust between individuals and organizations. According to some new
organizations, awareness of cybercrime and the environment surrounding criminal law enforcement officials can
help identify the direct violation of cybercrime, the top ten countries in the world, and generally most
disadvantaged countries. Electronic piracy is the damage caused by its costs in the banking sector, which is
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 73
losing much money[1-3]. The information process opened up an endless field of social and business planning,
representing the country. Today, cybercrime has grown in these corridors, and the financial sector continues to
suffer from these violations. Fake lottery games continue to be the most prominent digital counterfeiters, as
connoisseurs deceive experimenters with impressive activity paths and admit that they have been duped. With
the approach of external financial experts are fooled continuously by false online acquisitions. These scams
plagued the bank, and one of the most prominent digital scams was a loss of $ 243 million by the Brazilian bank
due to an Internet surplus. Cybercrime has become a global threat to banking institutions. The issuance of a
financial model in banks has the effect of reducing the return on security by abandoning the general market
valuation. Digital conflicts can trigger horrific multi-dollar events, which can undermine the value of the open
trust of financial experts and related companies. Cybercriminals continue to interact with their attackers,
including studying ridiculous tactics that could make the council shame the fund for imaginary insults [1-3,5].
Cybercrime is a series of complex mechanical skills and forces that present extraordinary challenges for the
financial sector. Risks to the country's banking institutions include spam, malware and fake digital cases [6-9].
The pseudo-digital photography is a digital lie that affects the bank, and when it joins phishing, important login
information and MasterCard are lost. This attack burns money at any time. Bank workers need better
certification than cardiac information systems that manage contact information engineering. The Federal
Council of individual financial institutions said that banking institutions were subjected to torture because of the
disruption in digital security that contradicts the decision [1,2].
III. CYBERCRIME MEETINGS
Many digital risks affect the bank. Money laundering is the primary type of error that affects banks, and
there is an illegal online activity derived from illegal developments. Numerous illegal associations have been
explored for reconciliation and mental warfare, and the financial sector has repeatedly reaped the benefits of
these exercises. According to Saad Mubeen (2020), financial isolation is a type of phishing that involves social
phishing. The problems depend on people who try to establish well-known links with money and ask for money
from people who have no information about marital infidelity. The bank is looking for information on the fake
victims, and in the long run, they are losing money [1-4]. Digital theft is closely associated with false financial
information because it uses computers to generate financial information via electronic systems. Programming
engineers are accused of breaking the banking systems that move money to supervise banks. The cracking of
travel cards is a risk for banking systems, and most of the banking systems involved do not report the theft,
which results in significant losses for partners and customers. The errors are caused by digital dysfunction
affecting the financial and banking sectors. The country has become a cashless economy through various money
laundering efforts. There have been lottery changes in the country; people have agreed to place a lottery online
and have had to send money through online gifts, for example, spending. It results in the identification of each
tantric practice. Some frauds appear to involve contacts and financial evidence in electronic fraud. Precisely,
these links do not exist [2,8-14].
IV. DIGITAL RISK ISSUES
The latest online payment disclosure systems have been updated to improve their management. This
improvement has prompted everyone to contact the conventional banking systems in their homes where they
can handle all the transactions they need. At these stages, this involves digital and entry holes, especially when
the digital thugs are left without money and are misused in this way. Sophisticated financial data interface areas,
especially for banks and online customer segments. Misappropriation of bank deposits to deliver assets to the
client. In a statement released by the Electronic Forum, the nickname for the financial system was described as
"exceptionally innovative", with around 30 people in the country suffering from "digital risks". The thugs block
all security efforts and continue to receive billions of dollars from internet companies and bank customers.
Faced with the evolution of MasterCard rates to improve security, new developments in digital vacations seem
to "energize" the efforts of banking systems to protect themselves from digital risks [15-19]. The basic malware
and various scams extend a variety of digital vulnerabilities. The cost of purchasing sufficient malware is
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 74
particularly low to avoid attacks on development systems. The malware bought for several dollars is enough to
capture banking and customer information. This cybercrime should be summarized in light of reasonable
security efforts to ensure that there are acceptable measures to take when there is a correlation between the
levels of risk and the costs associated with the fraud. The social system has now been ignored by hacking
techniques, as it was used to collect the benefits of online transactions for banks in 2020, prompting an
integrated study of cybercrime law to undermine the breach. The effects of cybercrime on banking systems are a
financial failure, so it is essential to take action to process and complete the file.
V. RECOMMENDATIONS
Understanding the accessibility between private banks and the National Bank leads to the spread of
malicious digital practices in the country's banking and financial sectors. The Ministry of Finance's Global
Cyber security Conference is required to use the Biometric Verification Tool (PVN) to combat fraud and fraud.
The system can also be used to identify people who commit fraud in a bank when accessing legal resources. The
main objective of the framework is to keep fraudsters away from warming systems. Individual banks and
various types of money should be filled with helpers since weak attitudes are the best test for customers who
have provided valuable information to fraudsters without information. Disadvantages allow customers to
disclose relevant information and then rewrite it. Therefore, training is an essential element in the fight against
digital conflicts, as it allows customers of these banking institutions to understand the comfort of receiving
relevant information on transaction costs [17-20]. In the wake of a more "zero-day" digital attack, buyers must
reinforce digital strategies that will have an impact on their banking information when it is transferred to
external sources, the global increase in digital penetration in countries. For example, countries with weak
banking structures need to develop new open standards to ensure that concrete and permanent measures are used
to end the digital divide.
Banks and cost agencies classify cybersecurity training to use it. Finance professionals and clients have
designed online to ensure that their personal information and systems are exchanged online [2]. The First
Atlantic Cyber Security Agency is a training ground for the United States and the organization. It is mainly
provided by digital security courses and the latest visual screening tests for acute treatment. Computer training
can help us find cyber security banking links by making security more critical in an organization.
The Internet of Things (IoT) has linked to devices, such as smart TVs and phones. He faces long-
standing challenges when it comes to reaching out to individuals and joining banking services, lack of help in
monitoring business processes and system security controls. The first test that affects the online banking sector
is the systems not used in the online banking system. It has led to the need for high-end models of IoT tools,
especially those used to execute online transactions. To this end, buyers should be able to stay in the order in
which they should be located on personal computers and update the tool's passwords and firmware to ensure
they are all secure [13-16].
VI. CONCLUSION:
This article describes how web systems can be affected by digital separators and how to exploit online
scams and theft to get massive amounts of dollars and other hard money transactions. The digital impact of
banking systems is a global emergency, where up-to-date information and pseudo-IoT systems introduce the
misuse of accurate information. By enabling digital security, it can help drivers protect their information from
fraudsters and update their personal information, for example, by helping passwords stay secure during online
banking transactions. In this sense, digital security poses a global threat to online banking systems and can be
seen by sharing each practical meeting.
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 75
VII. REFERENCES
1. Saad Mubeen, Elena Lisova and Aneta Vulgarakis Feljan. Timing Predictability and Security in Safety-Critical
Industrial Cyber-Physical Systems: A Position Paper. Applied Sciences, 10(3125).
https://doi.org/10.3390/app10093125(2020).
2. A.Mashkoor, J.Sametinger, M.Biro, and A.Egyed, Security‐ and safety‐critical cyber‐physical systems. Journal
of Software: Evolution and Process, 32(2), n/a–n/a. https://doi.org/10.1002/smr.2239(2020).
3. H.Abdo, M.Kaouk, J.-M.Flaus and F. Masse, A safety/security risk analysis approach of Industrial Control
Systems: A cyber bowtie – combining new version of attack tree with bowtie analysis. Computers &
Security, 72. http://search.proquest.com/docview/1978661176/(2018).
4. Nadikattu, Rahul Reddy, New Ways of Implementing Cyber Security to Help in Protecting America
(May 14, 2020). Journal of Xidian University, VOLUME 14, ISSUE 5, 2020, Page No: 6004 - 6015.
Available at SSRN: https://ssrn.com/abstract=3622822
5. M.Biro, A.Mashkoor, J.Sametinger and R. Seker, Software Safety and Security Risk Mitigation in Cyber-
physical Systems. IEEE Software, 35(1), 24–29. https://doi.org/10.1109/MS.2017.4541050(2018).
6. A.Carelli, A.Vallero and S. Di Carlo, Performance Monitor Counters: Interplay Between Safety and Security in
Complex Cyber-Physical Systems. IEEE Transactions on Device and Materials Reliability, 19(1), 73–83.
https://doi.org/10.1109/TDMR.2019.2898882(2019).
7. Soni, Vishal Dineshkumar, Challenges and Solution for Artificial Intelligence in Cybersecurity of the
USA (June 10, 2020). Available at SSRN: https://ssrn.com/abstract=3624487 or
http://dx.doi.org/10.2139/ssrn.3624487
8. N. H.Carreras Guzman, M.Wied, I.Kozine and M. A. Lundteigen, Conceptualizing the key features of
cyber‐physical systems in a multi‐layered representation for safety and security analysis. Systems
Engineering, 23(2), 189–210. https://doi.org/10.1002/sys.21509(2020).
9. Nadikattu, Rahul Reddy, New Ways in Artificial Intelligence (November 7, 2019).
INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY, 2019. Available
at SSRN: https://ssrn.com/abstract=3629063 or http://dx.doi.org/10.2139/ssrn.3629063
10. A.Ferdowsi, S.Ali, W.Saad and N. B. Mandayam, Cyber-Physical Security and Safety of Autonomous
Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning. IEEE Transactions on
Communications, 67(10), 7228–7244. https://doi.org/10.1109/TCOMM.2019.2927570(2019).
11. I.Friedberg, K.Mclaughlin, P.Smith, D.Laverty and S. Sezer, STPA-SafeSec: Safety and security analysis for
cyber-physical systems. Journal of Information Security and Applications, 34(P2), 183–196.
https://doi.org/10.1016/j.jisa.2016.05.008(2017).
12. Krini Ossmane and Laile Edgar. Unambiguous and Reliable Positioning in the vehicle in terms of Functional
Safety and Cyber Security. MATEC Web of Conferences, 210.
https://doi.org/10.1051/matecconf/201821003013(2018).
13. Mohammad, Sikender Mohsienuddin, Blockchain and Bitcoin Security in IT Automation (March 3,
2020). International Journal of Computer Trends and Technology (IJCTT) – Volume 68 Issue 3 -
March 2020. Available at SSRN: https://ssrn.com/abstract=3630584
14. Stephen A. Ojeka, Egbide Ben-Caleb and Edara-Obong Inyang Ekpe. Cyber Security in the Nigerian Banking
Sector: An Appraisal of Audit Committee Effectiveness. International Review of Management and
Marketing, 7(2), 340–346. https://doaj.org/article/ea7ab2d10c74465cbea0cb760f37c539(2017).
15. M. U.Tariq, J.Florence and M. Wolf, Improving the Safety and Security of Wide-Area Cyber-Physical Systems
Through a Resource-Aware, Service-Oriented Development Methodology. Proceedings of the IEEE, 106(1),
144–159. https://doi.org/10.1109/JPROC.2017.2744645(2018).
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 76
16. Mohammad, Sikender Mohsienuddin, Security and Privacy Concerns of the 'Internet of Things' (IoT)
in IT and its Help in the Various Sectors across the World (April 4, 2020). International Journal of
Computer Trends and Technology (IJCTT) – Volume 68 Issue 4 – April 2020. Available at SSRN:
https://ssrn.com/abstract=3630513
17. A.Vishwanath, L.Neo, P.Goh, S.Lee, M.Khader, G.Ong and J. Chin, x Cyber hygiene: The concept, its
measure, and its initial tests. Decision Support Systems, 128. https://doi.org/10.1016/j.dss.2019.113160(2020).
18. M.Wolf and D. Serpanos, Safety and Security of Cyber-Physical and Internet of Things Systems [Point of
View]. Proceedings of the IEEE, 105(6), 983–984. https://doi.org/10.1109/JPROC.2017.2699401(2017).
19. Xiaorong Lyu, Yulong Ding and Shuang-Hua Yang. Safety and security risk assessment in cyber-physical
systems. IET Cyber-Physical Systems, 4(3), 221–232. https://doi.org/10.1049/iet-cps.2018.5068(2019).
20. Zachosova Nataliia, Nosan Nataliia and Bauer Gulia. New Developments in State Regulation of Banking
Safety and Security of the Non-Banking Financial Market: Expectations from SPLIT. Modern Economics, 13,
106–111. https://doi.org/10.31521/modecon.V13(2019)-17(2019).

Más contenido relacionado

La actualidad más candente

Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
Jeff Martinez
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
James Sheehan
 
Security Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkSecurity Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. Framework
Divya Kothari
 

La actualidad más candente (20)

2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
Effects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack IncidentsEffects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack Incidents
 
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
Fraud & Abuse Report 2020 by Arkose LabsFraud report q1 2020
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Article global it systems are now even more vulnerable - paul wright
Article  global it systems are now even more vulnerable - paul wrightArticle  global it systems are now even more vulnerable - paul wright
Article global it systems are now even more vulnerable - paul wright
 
Cyber Review_April 2015
Cyber Review_April 2015Cyber Review_April 2015
Cyber Review_April 2015
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Security Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkSecurity Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. Framework
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 

Similar a State of Cyber Crime Safety and Security in Banking

CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
ijsc
 
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
ijsc
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
hallettfaustina
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
naveen p
 

Similar a State of Cyber Crime Safety and Security in Banking (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...
 
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Cyber Security and Banking Sector
Cyber Security and Banking SectorCyber Security and Banking Sector
Cyber Security and Banking Sector
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 

Más de IJSRED

BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
IJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
IJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
IJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
IJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
IJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
IJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
IJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
IJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
IJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
IJSRED
 

Más de IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Último

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 

Último (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

State of Cyber Crime Safety and Security in Banking

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 72 State of Cyber Crime Safety and Security in Banking Lubna Tabassum Amruta Institute of Engineering and Management Sciences Abstract: The article analyzes the security of threats and online transactions affecting banking systems. In the 21st century, these threats have started to penetrate online banking, focusing on banking systems with the help of pools of software engineers worldwide, from online lending to a fake lottery. Banking companies are confronted with fraud and fraud problems that assimilate customers and financial professionals working in banking institutions. Risk issues arise from the underlying malware that can affect payment information disclosure systems that allow us to use current hacking techniques. For example, electronic threat checks include biometric confirmation machines (PVN) that expel fraudsters from banking operations. Preparing for cyber security will allow banking services and individuals to improve security efforts. Reports suggest that cyber risk is a significant emergency that can affect banking systems and reduce opportunity odds. Keywords: Cyber, Crime, Safety, Banking, Online tools I. INTRODUCTION: The advancement of the tool has had an incredible impact on the progress of banking and information exchange on the Internet, and draws attention, the advanced space is a critical factor in the development and optimization of information on the planet [1]. However, these rapid advances in the information and correspondence phase are plagued by new threats called cybercrime. Cyber attacks must behave incredibly well for new products and the underlying moral of disgruntled people. Shakedown Online is part of cybercrime, which continues to be unimaginable in the financial sector. The massive rise of mixed-use media and the growth of information advancement through systems have made cybercrime an unknown impact on notoriously bad brand awareness around the world, weakening remote accounting professionals. As noted in the Saad Mubeen (2020), the choice to add liquidity to the economy has accelerated the growth of cybercrime in the country. Subsequently, cyber-attacks on banking systems are brutal, controllable, and require cyber security targets, including necessary information about a country's cash flow [1-3]. Hence safety on cyber security becomes one of the top priority research across the globe which can be noted in global leaders like America [4-7]. II. COPYRIGHT IS CONSIDERED Between the twenty years 2000 and 2020, the bank's settlement strategies undoubtedly indicated the loss of NGN 160 billion. As New Horizons Ltd notes, the amount lost due to cybercrime is generally 413 billion each year. One of the differences resulting from this critical situation is that the representation of financial fractions is measurable, but it cannot be resolved because frustration with human costs will cost more than a material violation [5]. Monitor the problem of electronic scams; investigate the causes or causes of their questions, and the best answers to remember the war against the violations, including the banking sector's development information system. Cyber threats in the banking sector began in the 1990s with the rise and resurgence of a diverse assortment. Recognized and anti-cybercrime issues in the banking sector include loss of money, essential information, and trust between individuals and organizations. According to some new organizations, awareness of cybercrime and the environment surrounding criminal law enforcement officials can help identify the direct violation of cybercrime, the top ten countries in the world, and generally most disadvantaged countries. Electronic piracy is the damage caused by its costs in the banking sector, which is RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 73 losing much money[1-3]. The information process opened up an endless field of social and business planning, representing the country. Today, cybercrime has grown in these corridors, and the financial sector continues to suffer from these violations. Fake lottery games continue to be the most prominent digital counterfeiters, as connoisseurs deceive experimenters with impressive activity paths and admit that they have been duped. With the approach of external financial experts are fooled continuously by false online acquisitions. These scams plagued the bank, and one of the most prominent digital scams was a loss of $ 243 million by the Brazilian bank due to an Internet surplus. Cybercrime has become a global threat to banking institutions. The issuance of a financial model in banks has the effect of reducing the return on security by abandoning the general market valuation. Digital conflicts can trigger horrific multi-dollar events, which can undermine the value of the open trust of financial experts and related companies. Cybercriminals continue to interact with their attackers, including studying ridiculous tactics that could make the council shame the fund for imaginary insults [1-3,5]. Cybercrime is a series of complex mechanical skills and forces that present extraordinary challenges for the financial sector. Risks to the country's banking institutions include spam, malware and fake digital cases [6-9]. The pseudo-digital photography is a digital lie that affects the bank, and when it joins phishing, important login information and MasterCard are lost. This attack burns money at any time. Bank workers need better certification than cardiac information systems that manage contact information engineering. The Federal Council of individual financial institutions said that banking institutions were subjected to torture because of the disruption in digital security that contradicts the decision [1,2]. III. CYBERCRIME MEETINGS Many digital risks affect the bank. Money laundering is the primary type of error that affects banks, and there is an illegal online activity derived from illegal developments. Numerous illegal associations have been explored for reconciliation and mental warfare, and the financial sector has repeatedly reaped the benefits of these exercises. According to Saad Mubeen (2020), financial isolation is a type of phishing that involves social phishing. The problems depend on people who try to establish well-known links with money and ask for money from people who have no information about marital infidelity. The bank is looking for information on the fake victims, and in the long run, they are losing money [1-4]. Digital theft is closely associated with false financial information because it uses computers to generate financial information via electronic systems. Programming engineers are accused of breaking the banking systems that move money to supervise banks. The cracking of travel cards is a risk for banking systems, and most of the banking systems involved do not report the theft, which results in significant losses for partners and customers. The errors are caused by digital dysfunction affecting the financial and banking sectors. The country has become a cashless economy through various money laundering efforts. There have been lottery changes in the country; people have agreed to place a lottery online and have had to send money through online gifts, for example, spending. It results in the identification of each tantric practice. Some frauds appear to involve contacts and financial evidence in electronic fraud. Precisely, these links do not exist [2,8-14]. IV. DIGITAL RISK ISSUES The latest online payment disclosure systems have been updated to improve their management. This improvement has prompted everyone to contact the conventional banking systems in their homes where they can handle all the transactions they need. At these stages, this involves digital and entry holes, especially when the digital thugs are left without money and are misused in this way. Sophisticated financial data interface areas, especially for banks and online customer segments. Misappropriation of bank deposits to deliver assets to the client. In a statement released by the Electronic Forum, the nickname for the financial system was described as "exceptionally innovative", with around 30 people in the country suffering from "digital risks". The thugs block all security efforts and continue to receive billions of dollars from internet companies and bank customers. Faced with the evolution of MasterCard rates to improve security, new developments in digital vacations seem to "energize" the efforts of banking systems to protect themselves from digital risks [15-19]. The basic malware and various scams extend a variety of digital vulnerabilities. The cost of purchasing sufficient malware is
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 74 particularly low to avoid attacks on development systems. The malware bought for several dollars is enough to capture banking and customer information. This cybercrime should be summarized in light of reasonable security efforts to ensure that there are acceptable measures to take when there is a correlation between the levels of risk and the costs associated with the fraud. The social system has now been ignored by hacking techniques, as it was used to collect the benefits of online transactions for banks in 2020, prompting an integrated study of cybercrime law to undermine the breach. The effects of cybercrime on banking systems are a financial failure, so it is essential to take action to process and complete the file. V. RECOMMENDATIONS Understanding the accessibility between private banks and the National Bank leads to the spread of malicious digital practices in the country's banking and financial sectors. The Ministry of Finance's Global Cyber security Conference is required to use the Biometric Verification Tool (PVN) to combat fraud and fraud. The system can also be used to identify people who commit fraud in a bank when accessing legal resources. The main objective of the framework is to keep fraudsters away from warming systems. Individual banks and various types of money should be filled with helpers since weak attitudes are the best test for customers who have provided valuable information to fraudsters without information. Disadvantages allow customers to disclose relevant information and then rewrite it. Therefore, training is an essential element in the fight against digital conflicts, as it allows customers of these banking institutions to understand the comfort of receiving relevant information on transaction costs [17-20]. In the wake of a more "zero-day" digital attack, buyers must reinforce digital strategies that will have an impact on their banking information when it is transferred to external sources, the global increase in digital penetration in countries. For example, countries with weak banking structures need to develop new open standards to ensure that concrete and permanent measures are used to end the digital divide. Banks and cost agencies classify cybersecurity training to use it. Finance professionals and clients have designed online to ensure that their personal information and systems are exchanged online [2]. The First Atlantic Cyber Security Agency is a training ground for the United States and the organization. It is mainly provided by digital security courses and the latest visual screening tests for acute treatment. Computer training can help us find cyber security banking links by making security more critical in an organization. The Internet of Things (IoT) has linked to devices, such as smart TVs and phones. He faces long- standing challenges when it comes to reaching out to individuals and joining banking services, lack of help in monitoring business processes and system security controls. The first test that affects the online banking sector is the systems not used in the online banking system. It has led to the need for high-end models of IoT tools, especially those used to execute online transactions. To this end, buyers should be able to stay in the order in which they should be located on personal computers and update the tool's passwords and firmware to ensure they are all secure [13-16]. VI. CONCLUSION: This article describes how web systems can be affected by digital separators and how to exploit online scams and theft to get massive amounts of dollars and other hard money transactions. The digital impact of banking systems is a global emergency, where up-to-date information and pseudo-IoT systems introduce the misuse of accurate information. By enabling digital security, it can help drivers protect their information from fraudsters and update their personal information, for example, by helping passwords stay secure during online banking transactions. In this sense, digital security poses a global threat to online banking systems and can be seen by sharing each practical meeting.
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 75 VII. REFERENCES 1. Saad Mubeen, Elena Lisova and Aneta Vulgarakis Feljan. Timing Predictability and Security in Safety-Critical Industrial Cyber-Physical Systems: A Position Paper. Applied Sciences, 10(3125). https://doi.org/10.3390/app10093125(2020). 2. A.Mashkoor, J.Sametinger, M.Biro, and A.Egyed, Security‐ and safety‐critical cyber‐physical systems. Journal of Software: Evolution and Process, 32(2), n/a–n/a. https://doi.org/10.1002/smr.2239(2020). 3. H.Abdo, M.Kaouk, J.-M.Flaus and F. Masse, A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie – combining new version of attack tree with bowtie analysis. Computers & Security, 72. http://search.proquest.com/docview/1978661176/(2018). 4. Nadikattu, Rahul Reddy, New Ways of Implementing Cyber Security to Help in Protecting America (May 14, 2020). Journal of Xidian University, VOLUME 14, ISSUE 5, 2020, Page No: 6004 - 6015. Available at SSRN: https://ssrn.com/abstract=3622822 5. M.Biro, A.Mashkoor, J.Sametinger and R. Seker, Software Safety and Security Risk Mitigation in Cyber- physical Systems. IEEE Software, 35(1), 24–29. https://doi.org/10.1109/MS.2017.4541050(2018). 6. A.Carelli, A.Vallero and S. Di Carlo, Performance Monitor Counters: Interplay Between Safety and Security in Complex Cyber-Physical Systems. IEEE Transactions on Device and Materials Reliability, 19(1), 73–83. https://doi.org/10.1109/TDMR.2019.2898882(2019). 7. Soni, Vishal Dineshkumar, Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA (June 10, 2020). Available at SSRN: https://ssrn.com/abstract=3624487 or http://dx.doi.org/10.2139/ssrn.3624487 8. N. H.Carreras Guzman, M.Wied, I.Kozine and M. A. Lundteigen, Conceptualizing the key features of cyber‐physical systems in a multi‐layered representation for safety and security analysis. Systems Engineering, 23(2), 189–210. https://doi.org/10.1002/sys.21509(2020). 9. Nadikattu, Rahul Reddy, New Ways in Artificial Intelligence (November 7, 2019). INTERNATIONAL JOURNAL OF COMPUTER TRENDS AND TECHNOLOGY, 2019. Available at SSRN: https://ssrn.com/abstract=3629063 or http://dx.doi.org/10.2139/ssrn.3629063 10. A.Ferdowsi, S.Ali, W.Saad and N. B. Mandayam, Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning. IEEE Transactions on Communications, 67(10), 7228–7244. https://doi.org/10.1109/TCOMM.2019.2927570(2019). 11. I.Friedberg, K.Mclaughlin, P.Smith, D.Laverty and S. Sezer, STPA-SafeSec: Safety and security analysis for cyber-physical systems. Journal of Information Security and Applications, 34(P2), 183–196. https://doi.org/10.1016/j.jisa.2016.05.008(2017). 12. Krini Ossmane and Laile Edgar. Unambiguous and Reliable Positioning in the vehicle in terms of Functional Safety and Cyber Security. MATEC Web of Conferences, 210. https://doi.org/10.1051/matecconf/201821003013(2018). 13. Mohammad, Sikender Mohsienuddin, Blockchain and Bitcoin Security in IT Automation (March 3, 2020). International Journal of Computer Trends and Technology (IJCTT) – Volume 68 Issue 3 - March 2020. Available at SSRN: https://ssrn.com/abstract=3630584 14. Stephen A. Ojeka, Egbide Ben-Caleb and Edara-Obong Inyang Ekpe. Cyber Security in the Nigerian Banking Sector: An Appraisal of Audit Committee Effectiveness. International Review of Management and Marketing, 7(2), 340–346. https://doaj.org/article/ea7ab2d10c74465cbea0cb760f37c539(2017). 15. M. U.Tariq, J.Florence and M. Wolf, Improving the Safety and Security of Wide-Area Cyber-Physical Systems Through a Resource-Aware, Service-Oriented Development Methodology. Proceedings of the IEEE, 106(1), 144–159. https://doi.org/10.1109/JPROC.2017.2744645(2018).
  • 5. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July –Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 76 16. Mohammad, Sikender Mohsienuddin, Security and Privacy Concerns of the 'Internet of Things' (IoT) in IT and its Help in the Various Sectors across the World (April 4, 2020). International Journal of Computer Trends and Technology (IJCTT) – Volume 68 Issue 4 – April 2020. Available at SSRN: https://ssrn.com/abstract=3630513 17. A.Vishwanath, L.Neo, P.Goh, S.Lee, M.Khader, G.Ong and J. Chin, x Cyber hygiene: The concept, its measure, and its initial tests. Decision Support Systems, 128. https://doi.org/10.1016/j.dss.2019.113160(2020). 18. M.Wolf and D. Serpanos, Safety and Security of Cyber-Physical and Internet of Things Systems [Point of View]. Proceedings of the IEEE, 105(6), 983–984. https://doi.org/10.1109/JPROC.2017.2699401(2017). 19. Xiaorong Lyu, Yulong Ding and Shuang-Hua Yang. Safety and security risk assessment in cyber-physical systems. IET Cyber-Physical Systems, 4(3), 221–232. https://doi.org/10.1049/iet-cps.2018.5068(2019). 20. Zachosova Nataliia, Nosan Nataliia and Bauer Gulia. New Developments in State Regulation of Banking Safety and Security of the Non-Banking Financial Market: Expectations from SPLIT. Modern Economics, 13, 106–111. https://doi.org/10.31521/modecon.V13(2019)-17(2019).