Skip to main content

Security Issues for Banking Systems

  • Conference paper
  • First Online:
Computational Intelligence, Data Analytics and Applications (ICCIDA 2022)

Abstract

It's no secret that businesses of all sizes and types rely on IT to carry out their day-to-day operations and provide the best possible service to their clientele and constituents. Since the early 2000s, banks and other financial institutions have grown increasingly reliant on computers and the internet to manage day-to-day operations, client interactions, and market activity. Damage to a bank's reputation and bottom line can result from security breaches and other dangers. Businesses throughout the world have lost billions of dollars each year due to a variety of insider and outsider assaults. When it comes to a financial institution's competitive edge, money flow, legal compliance, and commercial rules and regulations compliance, the three pillars of information security are very critical. (confidentiality, integrity and availability).This has made it necessary for financial institutes and banks to put adequate security controls and information security governance frameworks (ISGF) to ensure data accessibility to all the authorized users, and prevent intruders to gain access to the banking information system. Security measures strengthen the safeguards against all types of threats across the bank and guarantee information systems safety. The potential threats of information security banking system are discussed in this research. It proposes a framework for information security governance (ISGF). ISO 27002 is one example of a widely-accepted framework for governing information security. ISSA; FFIEC; PCI-DSS; COBIT and others are explained in this paper. The comprehensive information security governance framework (ISG) categorized into three levels which are strategic, tactical operational level and technical level. All components of the suggested ISG are listed in table. The banking system will actually use this framework. It explains the importance of each part of the ISG and how they work together to make the ISGF as strong as possible. Recommendations would be included to prevent all intrusions. In this study has been made and suggestions have included gaining robust information security governance frameworks to achieve better real banking system environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kumar, M., Gupta, S.: Security perception of e-banking users in India: an analytical hierarchy process. Banks Bank Syst. 15(1), 11 (2020)

    Article  Google Scholar 

  2. Das, S.V.A., Ravi, N.: A study on the impact of e-banking service quality on customer satisfaction. Asian J. Econ. Finance Manag. 2021, 48–56 (2021)

    Google Scholar 

  3. Hassana, M.K., Hassanb, A., Khodayerc, A.M., Khodayerd, O.M.: Internet security impact on e-banking users (2022)

    Google Scholar 

  4. Bah, C.U., Seyal, A.H., Yahya, U.: Combining PIN and biometric identifications as enhancement to user authentication in internet banking. arXiv Prepr arXiv210509496 (2021)

    Google Scholar 

  5. Tang, Z., Qin, Y., Jiang, Z., Krawec, W.O., Zhang, P.: Quantum-secure microgrid. IEEE Trans. Power Syst. 36(2), 1250–1263 (2020)

    Article  Google Scholar 

  6. Hayashi, V.T., Ruggiero, W.V.: Hands-free authentication for virtual assistants with trusted IoT device and machine learning. Sensors 22(4), 1325 (2022)

    Article  Google Scholar 

  7. Abass, I.A.M.: Social engineering threat and defense: a literature survey. J. Inf. Secur. 9(04), 257 (2018)

    Google Scholar 

  8. Karagiannis, S., Papaioannou, T., Magkos, E., Tsohou, A.: Game-based information security/privacy education and awareness: theory and practice. In: Themistocleous, M., Papadaki, M., Kamal, M.M. (eds.) EMCIS 2020. LNBIP, vol. 402, pp. 509–525. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-63396-7_34

    Chapter  Google Scholar 

  9. Vohra, A., Bhardwaj, N.: Customer engagement in an e-commerce brand community: an empirical comparison of alternate models. J. Res. Interact. Mark. (2019)

    Google Scholar 

  10. Ullah, F., Qayyum, S., Thaheem, M.J., Al-Turjman, F., Sepasgozar, S.M.E.: Risk management in sustainable smart cities governance: a TOE framework. Technol. Forecast. Soc. Change 167, 120743 (2021)

    Article  Google Scholar 

  11. Kaur, J., Syan, A.S., Kaur, S., Sharma, R.R.: Understanding the factors influencing actual usage of payments banks: an empirical investigation using the extended information systems success model. FIIB Bus Rev. (2022). 23197145221099096

    Google Scholar 

  12. Louw, L.B., Esterhuyzen, E.: Disaster risk reduction: Integrating sustainable development goals and occupational safety and health in festival and event management. Jàmbá J. Disaster Risk Stud. 14(1), 10 (2022)

    Article  Google Scholar 

  13. Mounia Z, Bouchaib N. A new comprehensive solution to handle information security Governance in organizations. In: Proceedings of the 2nd International Conference on Networking, Information Systems & Security. ; 2019:1–5

    Google Scholar 

  14. Cindana, A., Ruldeviyani, Y.: Measuring information security awareness on employee using HAIS-Q: Case study at XYZ firm. In: 2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS). IEEE, pp. 289–294 (2018)

    Google Scholar 

  15. Chaimaa, B., Najib, E., Rachid, H.: E-banking overview: concepts, challenges and solutions. Wirel. Pers. Commun. 117(2), 1059–1078 (2021)

    Article  Google Scholar 

  16. Daka, C.G., Phiri, J.: Factors driving the adoption of e-banking services based on the UTAUT model. Int. J. Bus. Manag. 14(6), 43–52 (2019)

    Article  Google Scholar 

  17. Aboobucker, I., Bao, Y.: What obstruct customer acceptance of internet banking? Security and privacy, risk, trust and website usability and the role of moderators. J. High Technol. Manag. Res. 29(1), 109–123 (2018)

    Article  Google Scholar 

  18. Moudoubah, L., Mansouri, K., Qbadou, M.: COBIT 5 concepts: towards the development of an ontology model. In: Maleh, Y., Alazab, M., Gherabi, N., Tawalbeh, L., Abd El-Latif, A.A. (eds.) Advances in Information, Communication and Cybersecurity. ICI2C 2021. Lecture Notes in Networks and Systems, vol. 357, pp. 247–256. Springer, Cham. https://doi.org/10.1007/978-3-030-91738-8_24

  19. AlGhamdi, S., Win, K.T., Vlahu-Gjorgievska, E.: Information security governance challenges and critical success factors: systematic review. Comput. Secur. 99, 102030 (2020)

    Article  Google Scholar 

  20. Garas, S., ElMassah, S.: Corporate governance and corporate social responsibility disclosures: the case of GCC countries. Crit. Perspect. Int. Bus. (2018)

    Google Scholar 

  21. Ahmad, S., Bhatti, S.H., Hwang, Y.: E-service quality and actual use of e-banking: explanation through the technology acceptance model. Inf. Dev. 36(4), 503–519 (2020)

    Article  Google Scholar 

  22. Chepkwony, F.C.: the influence of selected factors on the behaviour of share prices of commercial banks listed at the Nairobi securities exchange (2021)

    Google Scholar 

  23. Hijji, M., Alam, G.: A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic: challenges and prospective solutions. IEEE Access 9, 7152–7169 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Khodayer Hassan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hassan, M.K., Khodayer, A.M., Hassan, A., Khodayer, O.M., Mahmood, M. (2023). Security Issues for Banking Systems. In: García Márquez, F.P., Jamil, A., Eken, S., Hameed, A.A. (eds) Computational Intelligence, Data Analytics and Applications. ICCIDA 2022. Lecture Notes in Networks and Systems, vol 643. Springer, Cham. https://doi.org/10.1007/978-3-031-27099-4_10

Download citation

Publish with us

Policies and ethics