Karshi branch of tashkent university of information technologies named after mukhammad al-khorezmi
Adopt Advanced Authentication Techniques
Download 1.05 Mb. Pdf ko'rish
|
MAIN DIPLOMA WORK (2)....
- Bu sahifa navigatsiya:
- Use a combined approach
- Increase Customer Awareness
- Microsoft Baseline security analyzer.
Adopt Advanced Authentication Techniques
• Ensure that an advanced level of authentication is required to secure financial transactions. Merely setting complex usernames and passwords is not enough as hackers are constantly innovating means to crack confidential credentials. • Banks should deploy advanced techniques that detect cybercrime on the basis of the patterns detected in website navigation or transactions. These could include smart cards, a pin, facial recognition, fingerprint sensors. • As more and more consumers are using mobile devices, banks must also deploy verification techniques like mobile-based transaction verification and dynamic device authentication. Use a combined approach No single security technology is sufficient to foolproof a bank’s IT system. Hence, banks need to implement a combination of various techniques to fortify their IT infrastructure. Each technology has its own strength — selecting an appropriate combination of the right technologies will supply benefits like strong authentication, behavioral fraud detection, and out-of-band transaction verification. This combined approach is regarded as one of the best technique for combating cybercrimes.[6] Increase Customer Awareness • Cyber threats must be fought at all levels and it is crucial that consumers be made aware of any unscrupulous activity related to their bank accounts. • Each bank must send out alerts and automatic messages to consumers confirming the validity of a transaction. • Consumers must be provided with guidelines for checking the authenticity of any sources that are asking for account details. Consumers must also be supplied with guidelines for taking precautions while using the bank’s websites. Building up a bank’s cyber security is not a one-time exercise but a continuous process. Systems need to be continuously monitored through surveillance technologies 67 to identify any loophole that has been generated. Risk management plans need to be continuously updated by conducting risk assessments and identifying new risks. Software and hardware need to be updated and upgraded as new and improved versions often address the vulnerabilities present in previous ones. Patch management must be given prime importance and security patches must be installed frequently. Substantial gaps will continue to exist between the promises made and the services delivered due to the vulnerability in a bank’s IT security. It is suggested to have a risk committee that reviews the cybersecurity measures on a frequent basis. Eventually, each bank must have a crisis management plan in place to recover from a cyberattack and mitigate its harmful effects. But, how do the banks confront these issues? How do the banks deal with this ever- changing cyberthreats? Let’s have a look at the potential solutions Communication and Intelligence The cybersecurity and fraud have nowadays shifted from a walled-garden approach to a holistic one, and this has brought a better communication and intelligence sharing. This comes down to not just technology, but people and process. It helps to shift cybersecurity analyst that is very much focused on technology and cyber controls, to an analyst that understands the business and can have a conversation with the consumer in the payments space. This approach can also be seen in the language of modern cybersecurity vendors. Scenario-based Testing Structure exercises and scenario testing are also one of the best ways for the banking and financial sector to protect from cyber threats, specifically when they are conducted across the industry. Doing exercises, like getting everybody around the table and you recreate various scenarios to understand where your gaps are and what you do well, it also gives an understanding about what needs to be built into your cyber process and resiliency process. It is important to do that with everybody within the organization: 68 legal, compliance, the business, cyber, the operations staffs, the technology staffs and even with peers.” Cross-industry Collaboration In order to progress in combating today’s cyber threats, banks need to stop keeping the cyber strategy a closely guarded secret with banks staffs only.In today’s time threats exploiting the ecosystem, don’t look for an individual link in the chain, while they look for weak points in the end-to-end chain. So the response means we have to work together as an ecosystem. In addition, as soon as you make it more challenging, start sharing and taking away the various avenues to target any bank and increase awareness, you making it a less alluring environment for adversaries to engage in. Actionable Awareness Financial and banking Sector is seeking to get more actionable insights not just for their security analysts but also for the people within the business units. It allows intelligence to quickly turn into a response by the most relevant people, particularly vital in a landscape where breaches happen in a heartbeat. It is vital in the payments system, to create intelligence inside the bank and publish it out and circulate that fast and somebody needs to receive it and do something with it, so actionable intelligence. That more likely to speak a common language. So being able to say, here is a set of accounts and a volume of transactions that you should be mindful of so that they can set alerts. 69 Here, a number of security tools which are used to help to avoid Cyberattacks on banking systems will be listed: 1.Microsoft Baseline security analyzer. The Microsoft Baseline Security Analyzer (MBSA) is a software tool that helps determine the security of your Windows computer based on Microsoft’s security suggestions. MBSA can be used to improve your security management process by analyzing a computer or a group of computers and detecting missing patches/updates and general security misconfigurations. After you run a MBSA scan, the tool will supply you with specific recommendations for remediating security vulnerabilities. An MBSA scan can reduce and eliminate possible threats caused by security configuration challenges and missing security updates. This document explains how to use MBSA from the graphical user interface (GUI). The MBSA is an easy-to-use tool designed for IT professionals and helps small and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. It is a standalone security and vulnerability scanner designed to supply a streamlined method for identifying common security misconfigurations and missing security updates. MBSA is used by many leading third-party security vendors and security auditors and, on average, scans over 3 million computers each week.[7] SECURITY CONSIDERATIONS Internet banking Mobile banking Wallet transactions ATM security UPI(Unified Payment Interface) Security Controls like multi factor authentication, creation of strong passwords, adaptive authentication, image authentication, etc, can be considered. It should be ensured that mobile applications are up to date and should be tested. Latest hardening standards could be implemented. Awareness material on Phishing, Malware attacks, vishing and social engineering, Password security etc, should be incorporated. Biometrics like eye-retina, voice scan or fingerprint scan should be introduced by Banks. Banks and PSPs need to think through their security strategies, governance models and predictive controls to build a secure UPI environment that ensures a seamless user experience and at the same time balanced security risks. 70 The MBSA supplies built-in checks to determine if Windows administrative vulnerabilities are present, if weak passwords are being used on Windows accounts, the presence of known IIS and SQL administrative vulnerabilities, and which security updates are required on each individual system. The MBSA supplies dynamic assessment of missing security updates. The MBSA can scan one or more computers by domain, IP address range or other grouping. Once complete, the MBSA supplies a detailed report and instructions on how to help turn your system into a more secure working environment. The MBSA will create and store personal XML security reports for each computer scanned and will display the reports in the graphical user interface in HTML. To use the MBSA tool, clients will need either Windows Server 2008 R2, Windows 7, Server 2003, Server 2008, Vista, XP or Windows 2000 and will need administrator privileges sufficient to scan the target computers. After installing MBSA and running the tool, clients are taken to the screen seen below which supplies quick access to three different sides of the application. Clients can scan a computer using its name or IP address, scan multiple computers within a domain name or a range of IP addresses, or view existing security scan reports. There are even more options available through the command-line interface to support scripting and fine-tuned control over MBSA’s scanning and reporting features. From the MBSA scan menu, users have the option to select some or all of the following, which are all checked by default: • Windows administrative vulnerabilities: the MBSA checks for Windows account- related issues, such as an open Guest account or too many administrative accounts. It also looks at the number of file shares and the PC’s file system to make sure you’re using NTFS instead of FAT for better security. ▪ Weak passwords: the MBSA looks for blank or weak passwords throughout all Windows accounts. 71 ▪ IIS administrative vulnerabilities: for machines running IIS 5.0 or 6.0, MBSA scans to make sure all the important default security options and hotfixes have been run. The tool does not support IIS 7. ▪ SQL Server administrative vulnerabilities: the MBSA scans for any versions of SQL Server or Microsoft Data Engine (MSDE) on the machine, looking at the authentication mode to see if you’re using Windows authentication or Mixed Mode (Windows and SQL authentication). It also checks the status of the system administrator account password. ▪ Security updates: the MBSA checks the status of all updates with security implications – which include security updates, service packs and update rollups to determine if any are missing. If you’re unsure whether your target computer is correctly configured to check for Microsoft Updates, you can use the option to automatically install and configure the Microsoft Update service on a client. The MBSA scans Windows and all Microsoft applications installed on the target computers to determine if there are risks from missing security updates. You can tell the MBSA whether to use the Microsoft Update live service, a Windows Server Update Services (WSUS) server or an offline catalog as the source for missing security updates.[7] Download 1.05 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling