Fortifying Financial Fortresses: A Comprehensive Guide to Cybersecurity in Indian Banking System

Authors

  • Subhra Prosun Paul Chandigarh University
  • Dipayan Ghosh Indian Institute of Technology (IIT), Kanpur
  • Mohammad Nazmul Alam Guru Kashi University

Keywords:

Indian Banking System, Cybersecurity, Distributed denial-of-service (DDoS) attacks,

Abstract

This abstract provides an overview of cybersecurity in the banking sector, focusing on its importance, challenges, and preventive measures in the context of Indian banks. Cybersecurity involves protecting digital assets from unauthorized access, encompassing disciplines such as network security, application security, and information security. Indian banks face a diverse range of cyber threats, including phishing scams, data theft, and ransomware attacks, which necessitate robust preventive measures like multi-factor authentication, regular security audits, and employee training programs. Collaboration within the industry and with government bodies is emphasized as crucial for effectively combating cyber threats. Overall, cybersecurity is deemed essential for maintaining trust, reputation, and stability in the banking sector amidst a rapidly evolving digital landscape.

References

Priyadarshini, I., 2019. Introduction on cybersecurity. Cyber security in parallel and distributed computing: Concepts, techniques, applications and case studies, pp.1-37.

Tsochev, G., Trifonov, R., Nakov, O., Manolov, S. and Pavlova, G., 2020, October. Cyber security: Threats and Challenges. In 2020 International Conference Automatics and Informatics (ICAI) (pp. 1-6). IEEE.

Ahmad, A., Desouza, K.C., Maynard, S.B., Naseer, H. and Baskerville, R.L., 2020. How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), pp.939-953.

Cheminod, M., Durante, L. and Valenzano, A., 2012. Review of security issues in industrial networks. IEEE transactions on industrial informatics, 9(1), pp.277-293.

Paul, S.P. and Vetrithangam, D., 2023. Design and Analysis of an Efficient and Load-Balanced Multipath Routing Algorithm for Energy-Effective Wireless Sensor Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), pp.601-617.

Khan, R.A., Khan, S.U., Akbar, M.A. and Alzahrani, M., 2022. Security risks of global software development life cycle: Industry practitioner's perspective. Journal of Software: Evolution and Process, p.e2521.

Khan, R.A., Khan, S.U., Khan, H.U. and Ilyas, M., 2022. Systematic literature review on security risks and its practices in secure software development. ieee Access, 10, pp.5456-5481.

Tao, H., Bhuiyan, M.Z.A., Rahman, M.A., Wang, G., Wang, T., Ahmed, M.M. and Li, J., 2019. Economic perspective analysis of protecting big data security and privacy. Future Generation Computer Systems, 98, pp.660-671.

Paul, S.P. and Vetrithangam, D., 2023. A Full-Scale Analysis on Challenges and Issues of Next Generation (5G) Communication in Heterogeneous Wireless Network Based Enterprise Applications. Journal of Theoretical and Applied Information Technology, 101(11).

Alsmadi, I., 2023. Cyber operational planning. In The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics (pp. 131-178). Cham: Springer International Publishing.

Sawalha, I.H., 2021. Views on business continuity and disaster recovery. International Journal of Emergency Services, 10(3), pp.351-365.

Paul, S.P. and Vetrithangam, D., 2023, June. A Thorough Assessment on Orthogonal Frequency Division Multiplexing (OFDM) based Wireless Communication: Challenges and Interpretation. In 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS) (pp. 1145-1151). IEEE.

Korovessis, P., Furnell, S., Papadaki, M. and Haskell-Dowland, P., 2017. A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), p.5.

Pomerleau, P.L. and Lowery, D.L., 2020. Countering Cyber Threats to Financial Institutions. In A Private and Public Partnership Approach to Critical Infrastructure Protection. Springer.

Servidio, J.S. and Taylor, R.D., 2015. Safe and Sound: Cybersecurity for Community Banks. Journal of Taxation & Regulation of Financial Institutions, 28(4).

Uddin, M.H., Ali, M.H. and Hassan, M.K., 2020. Cybersecurity hazards and financial system vulnerability: a synthesis of literature. Risk Management, 22(4), pp.239-309.

Abedin, M.Z., Hajek, P. and Shilpa, N.A., 2023. Cyber Security in Banking Sector. In Cyber Security and Business Intelligence (pp. 37-45). Routledge.

Paul, S.P. and Vetrithangam, D., 2023, March. A Scientometric Study of Research Development on Cloud Computing-Based Data Management Technique. In Doctoral Symposium on Computational Intelligence (pp. 617-625). Singapore: Springer Nature Singapore.

Cyriac, N.T. and Sadath, L., 2019, November. Is Cyber security enough-A study on big data security Breaches in financial institutions. In 2019 4th International Conference on Information Systems and Computer Networks (ISCON) (pp. 380-385). IEEE.

Paul, S.P. and Aggarwal, S., 2022, March. A Systematic Analysis of Research Trends on Network Control System in Wireless Sensor Network. In 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) (Vol. 1, pp. 1758-1763). IEEE.

Rao, S., 2019. Cyber crime in banking sector. International Journal of Research-Granthaalayah, 7(1), pp.148-161.

Malik, P., 2013. Governing big data: principles and practices. IBM Journal of Research and Development, 57(3/4), pp.1-1.

Paul, S.P. and Vetrithangam, D., 2022, November. A Comprehensive Analysis on Issues and Challenges of Wireless Sensor Network Communication in Commercial Applications. In 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) (pp. 377-382). IEEE.

Darwish, A., El Zarka, A. and Aloul, F., 2012, December. Towards understanding phishing victims' profile. In 2012 International Conference on Computer Systems and Industrial Informatics (pp. 1-5). IEEE.

Chang, E.S., Jain, A.K., Slade, D.M. and Tsao, S.L., 1999. Managing cyber security vulnerabilities in large networks. Bell Labs technical journal, 4(4), pp.252-272.

Abidin, M.A.Z., Nawawi, A. and Salin, A.S.A.P., 2019. Customer data security and theft: a Malaysian organization’s experience. Information & Computer Security, 27(1), pp.81-100.

Kasanda, E.N. and Phiri, J., 2018. ATM Security: A case study of Emerging Threats. International Journal of Advanced Studies in Computers, Science and Engineering, 7(10), p.1.

Wangen, G., Shalaginov, A. and Hallstensen, C., 2016. Cyber security risk assessment of a ddos attack. In Information Security: 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings 19 (pp. 183-202). Springer International Publishing.

Paul, S.P. and Aggarwal, D.S., 2021. A cognitive research tendency in data management of sensor network. International Journal of Wireless and Ad Hoc Communication, 3(1), pp.26-36.

Paul, S.P., Aggarwal, S. and Chawla, S., 2022, September. Research Trends in Routing Protocol for Wireless Sensor Network. In International Conference on Innovative Computing and Communications: Proceedings of ICICC 2022, Volume 2 (pp. 601-612). Singapore: Springer Nature Singapore.

Dutta, A. and McCrohan, K., 2002. Management's role in information security in a cyber economy. California Management Review, 45(1), pp.67-87.

Ambore, S., Richardson, C., Dogan, H., Apeh, E. and Osselton, D., 2017. A resilient cybersecurity framework for Mobile Financial Services (MFS). Journal of Cyber Security Technology, 1(3-4), pp.202-224.

Published

13-03-2024

How to Cite

Subhra Prosun Paul, Dipayan Ghosh, & Mohammad Nazmul Alam. (2024). Fortifying Financial Fortresses: A Comprehensive Guide to Cybersecurity in Indian Banking System. Journal of Applied Optics, 38–48. Retrieved from https://appliedopticsjournal.net/index.php/JAO/article/view/85

Issue

Section

Conference Paper

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.