Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks
In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1089501Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2487
 Jae-Deok Lim, ETRI, Daejeon, Young-Ho Kim ; Bo-Heung Jung ; Ki-Young Kim, ”Implementation of multi-thread based intrusion prevention system for IPv6 ", pp.10.1109/ICCAS.2007.4406938, ISBN:978-89-950038-6-2.
 Tahir, H.M., "Implementation of IPv4 Over IPv6 using Dual Stack Transition Mechanism (DSTM) on 6iNet”, 10.1109/ICTTA.2006.1684921, INSPEC Accession Number: 9075857, Print ISBN:0-7803-9521-2.
 Huajun Huang , Browser-Side Countermeasures for Deceptive Phishing Attack, Print ISBN:978-0-7695-3687-3 ,10.1109/NISS.2009.80,INSPEC AccessionNo:10891791.
 Huajun Huang, Junshan Tan, "Countermeasure Techniques for Deceptive Phishing Attack” IEEE Conference, NISS 2009, June 30 2009-July 2 2009.
 Dan Boneh,D. Pointcheval, "How to encrypt properly with rsa,” Crypto-Bytes, vol. 5, no. 1, pp. 10–19, 2002. http://www.rsa.com/rsalabs/ cryptobytes/CryptoBytes_January_2002_final.pdf.
 Huajun Huang, Countermeasure Techniques for Deceptive Phishing Attack, doi>10.1109/NISS.2009.80 http://dl.acm.org/ citation.cfm?id=1073009 , ISBN:1-59593-178-3, ISBN: 978-0-7695-3687-3.
 Douglas Rodrigues, USA ©2011, H. Liu, S. Pallickara, and G. Fox, "Performance of web service security,” in Proceedings of 13th Annual Mardi Gras Conference, Baton Rouge, Louisiana, 2005, pp. 1-8. ISBN: 978-1-4503-0784-0.
 N. Gruschka, M. Jensen, L.Iacono, and N. Luttenberger, "Server-side streaming processing of ws-security,” IEEE Transactions on Services Computing, vol. PP, no. 99, pp. 1–14, 2011.
 R. Engelen and W. Zhang, "An overview and evaluation of web services security performance optimizations,” in IEEE International Conference on Web Services, 2008. ICWS ’08, 2008, pp. 137–144.
 Yang-Seo Choi , 10.1109/ICACT.2005.245948, "Web services security (wss)tc,” 2006, http://docs.oasis-open.org/wss-m/wss/v1.1.1/os/wss-SOAPMessageSecurity-v...