Risk Assessment in Online Banking System

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-9 Number-6                          
Year of Publication : 2014
Authors : K.V.D. Kiran , P.Sruthi , P.S. Neema , G.V.S. Manju Vani , Rishikesh Sahu
DOI :  10.14445/22312803/IJCTT-V9P153

MLA

K.V.D. Kiran , P.Sruthi , P.S. Neema , G.V.S. Manju Vani , Rishikesh Sahu."Risk Assessment in Online Banking System". International Journal of Computer Trends and Technology (IJCTT) V9(6):279-285, March 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
With the development of information technology and the popular use of the information network system, the security of the information system becomes particularly important. To ensure the security of the information system, it is a key point to have risk assessment. This paper deals with the risk assessment in information security of distributed banking sector. The process of identification and analysis of various assets (both hardware and software), vulnerabilities, threats and risks in distributed banking sector has assumed utmost importance. This paper also presents collective information regarding various risk assessment methodologies like qualitative, quantitative and hybrid methods and tools such as OCTAVE and IRAM that are being employed in order to perform risk assessment in information security.

References
[1] http://www.cs.ucl.ac.uk/staff/ucacwxe/lectures/ds98-99/dsee3.pdf
[2] http://www.csc.villanova.edu/~schragge/CSC8530/Intro. html
[3] http://www.icoe.org/webfm_send/1936
[4] http://secunia.com/advisories/21499
[5] http://securitytracker.com/alerts/2006/Aug/1016698. html
[6] http://www.frsirt.com/english/advisories/2006/3291
[7] http://www.securityfocus.com/bid/19535
[8] http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00746980
[9] http://marc.theaimsgroup.com/?l=bugtraq&m=11080510520047&w=2
[10] http://xforce.iss.net/xforce/xfdb/19276
[11] http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
[12] http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
[13] http://secunia.com/advisories/55537
[14] http://www.sybase.com/detail?id=1099371
[15] http://osvdb.org/95311
[16] http://www.securityfocus.com/bid/61247
[17] http://xforce.iss.net/xforce/xfdb/85698
[18] http://www.securityfocus.com/bid/53134
[19] http://rhn.redhat.com/errata/RHSA-2013-1779. html
[20] http://lists.opensuse.org/opensuse-updates/2013-12/msg00118.html
[21] http://rhn.redhat.com/errata/RHSA-2013-1752.html
[22] http://rhn.redhat.com/errata/RHSA-2013-1753.html
[23] http://www.cvedetails.com/product/16924/IBM-Z-os.html?vendor_id=14
[24] http://www.cvedetails.com/vulnerability-ist/vendor_id-14/product_id-17/cvssscoremin-6/cvssscoremax-6.99/IBM-AIX.html

Keywords
assets, authentication, concurrency, distributed computing, quantitative and qualitative methodologies, risk assessment, security, threat, vulnerabilities.