Risk Assessment in Online Banking System
K.V.D. Kiran , P.Sruthi , P.S. Neema , G.V.S. Manju Vani , Rishikesh Sahu."Risk Assessment in Online Banking System". International Journal of Computer Trends and Technology (IJCTT) V9(6):279-285, March 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
With the development of information technology and the popular use of the information network system, the security of the information system becomes particularly important. To ensure the security of the information system, it is a key point to have risk assessment. This paper deals with the risk assessment in information security of distributed banking sector. The process of identification and analysis of various assets (both hardware and software), vulnerabilities, threats and risks in distributed banking sector has assumed utmost importance. This paper also presents collective information regarding various risk assessment methodologies like qualitative, quantitative and hybrid methods and tools such as OCTAVE and IRAM that are being employed in order to perform risk assessment in information security.
References
[1] http://www.cs.ucl.ac.uk/staff/ucacwxe/lectures/ds98-99/dsee3.pdf
[2] http://www.csc.villanova.edu/~schragge/CSC8530/Intro. html
[3] http://www.icoe.org/webfm_send/1936
[4] http://secunia.com/advisories/21499
[5] http://securitytracker.com/alerts/2006/Aug/1016698. html
[6] http://www.frsirt.com/english/advisories/2006/3291
[7] http://www.securityfocus.com/bid/19535
[8] http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00746980
[9] http://marc.theaimsgroup.com/?l=bugtraq&m=11080510520047&w=2
[10] http://xforce.iss.net/xforce/xfdb/19276
[11] http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
[12] http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
[13] http://secunia.com/advisories/55537
[14] http://www.sybase.com/detail?id=1099371
[15] http://osvdb.org/95311
[16] http://www.securityfocus.com/bid/61247
[17] http://xforce.iss.net/xforce/xfdb/85698
[18] http://www.securityfocus.com/bid/53134
[19] http://rhn.redhat.com/errata/RHSA-2013-1779. html
[20] http://lists.opensuse.org/opensuse-updates/2013-12/msg00118.html
[21] http://rhn.redhat.com/errata/RHSA-2013-1752.html
[22] http://rhn.redhat.com/errata/RHSA-2013-1753.html
[23] http://www.cvedetails.com/product/16924/IBM-Z-os.html?vendor_id=14
[24] http://www.cvedetails.com/vulnerability-ist/vendor_id-14/product_id-17/cvssscoremin-6/cvssscoremax-6.99/IBM-AIX.html
Keywords
assets, authentication, concurrency, distributed computing, quantitative and qualitative methodologies, risk assessment, security, threat, vulnerabilities.