Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32807
Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: Network worms, malware infection propagating malicious code, virus, security, VPN.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1089501

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2752

References:


[1] Jae-Deok Lim, ETRI, Daejeon, Young-Ho Kim ; Bo-Heung Jung ; Ki-Young Kim, ”Implementation of multi-thread based intrusion prevention system for IPv6 ", pp.10.1109/ICCAS.2007.4406938, ISBN:978-89-950038-6-2.
[2] Tahir, H.M., "Implementation of IPv4 Over IPv6 using Dual Stack Transition Mechanism (DSTM) on 6iNet”, 10.1109/ICTTA.2006.1684921, INSPEC Accession Number: 9075857, Print ISBN:0-7803-9521-2.
[3] Huajun Huang , Browser-Side Countermeasures for Deceptive Phishing Attack, Print ISBN:978-0-7695-3687-3 ,10.1109/NISS.2009.80,INSPEC AccessionNo:10891791.
[4] Huajun Huang, Junshan Tan, "Countermeasure Techniques for Deceptive Phishing Attack” IEEE Conference, NISS 2009, June 30 2009-July 2 2009.
[5] Dan Boneh,D. Pointcheval, "How to encrypt properly with rsa,” Crypto-Bytes, vol. 5, no. 1, pp. 10–19, 2002. http://www.rsa.com/rsalabs/ cryptobytes/CryptoBytes_January_2002_final.pdf.
[6] Huajun Huang, Countermeasure Techniques for Deceptive Phishing Attack, doi>10.1109/NISS.2009.80 http://dl.acm.org/ citation.cfm?id=1073009 , ISBN:1-59593-178-3, ISBN: 978-0-7695-3687-3.
[7] Douglas Rodrigues, USA ©2011, H. Liu, S. Pallickara, and G. Fox, "Performance of web service security,” in Proceedings of 13th Annual Mardi Gras Conference, Baton Rouge, Louisiana, 2005, pp. 1-8. ISBN: 978-1-4503-0784-0.
[8] N. Gruschka, M. Jensen, L.Iacono, and N. Luttenberger, "Server-side streaming processing of ws-security,” IEEE Transactions on Services Computing, vol. PP, no. 99, pp. 1–14, 2011.
[9] R. Engelen and W. Zhang, "An overview and evaluation of web services security performance optimizations,” in IEEE International Conference on Web Services, 2008. ICWS ’08, 2008, pp. 137–144.
[10] Yang-Seo Choi , 10.1109/ICACT.2005.245948, "Web services security (wss)tc,” 2006, http://docs.oasis-open.org/wss-m/wss/v1.1.1/os/wss-SOAPMessageSecurity-v...