Karshi branch of tashkent university of information technologies named after mukhammad al-khorezmi


Organizational and programmatic analysis of methods of protecting


Download 1.05 Mb.
Pdf ko'rish
bet17/21
Sana23.07.2023
Hajmi1.05 Mb.
#1661934
1   ...   13   14   15   16   17   18   19   20   21
Bog'liq
MAIN DIPLOMA WORK (2)....

2.3. Organizational and programmatic analysis of methods of protecting 
banking systems from cyberattacks. 
We’ll list out various ways to minimize the risk of a cyberattack below; 
1. Formulate Policies that Address Cybersecurity 
It is essential to implement internal corporate policies that help prevent any fraud or 
cybercrime. 
• 
Consumer data must be regularly secured and backed up. 
• 
Each employee should have a separate user account and with a policy that 
stipulates the changing of passwords every three months. 


65 
• 
Administrators have to ban employees from downloading and installing 
unauthorized software. 
• 
Bank policies must also set appropriate approval protocols. Any transaction that 
involves a wire transfer or an Automated Clearing House transfer must involve two 
approvers.[6] 
Educate Employees 
• 
All employees must be made aware of the dangers of opening or downloading 
email attachments from unknown sources. Employee awareness is particularly important 
because there have been many cases where a bank’s computer was infected by a 
malicious program after an employee clicked an attachment from an unknown source. 
• 
Employees must also be prohibited to share confidential information about the 
institution. 
• 
Employees working in a bank’s call center must always verify the details of a 
vendor or a consumer who has requested any changes to be made to the billing account. 
Harden the Machines Regularly 
• 
A bank’s IT department must make sure that each workstation and Internet-
enabled device used in the company has a firewall that is enabled. A firewall blocks all 
communication from unauthorized sources. 
• 
The Department must ensure that the operating system on all PC’s receives 
security updates on a regular basis. 
• 
All PC’s must be installed with anti-virus and anti-spyware software to detect any 
malware or malicious programs in the network. 
• 
All wireless networks must be secured and their passwords must be well-
protected. 


66 

Download 1.05 Mb.

Do'stlaringiz bilan baham:
1   ...   13   14   15   16   17   18   19   20   21




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling