First Union Bank Security Plan
Designed by:
Rama Krishna Prasad Ravi IT Manager
Contents
1 Introduction 3
2 Who is attacking 4
3 Cyber criminals 4
4 Hackers 4
5 Type of hackers 4
6 Where are there from and motives 5
7 Bank policies 5
8 Identify reasons of inadequate policies 6
9 Changes in security and plan 7
10 Kerberos protocol 8
11 Additional protocol changes 10
12 Data breach in Mobile operating system 10
13 How to minimise the damage 10
14 How bank embrace future mobile application 12
15 Recommendations 12
16 Reference 15
1. Introduction:
Nowadays technologies increase day by day
…show more content…
2. Who is attacking the banking systems in industry today?
• Cyber criminals
• Hackers
3. Cyber criminals:
Cyber criminals are illegally access into others account. They are illegally accessed more than half of the world’s largest banking website. Nearly one billion losses for every year for banking industry for this criminal attacks.
4. Hackers:
Hackers search a way to breach most protected computer to hack the data. While frequent banks, retailers and grocery shops will attack by hackers by past few years. Banking Trojans and malicious code specifically created for banking attacks. They are seven types of hackers some are good and bad
5. Types of hackers:
1. White hat hackers: These are computer security experts who has good knowledge in penetrating testing and methodologies to secure the company information. They are good hackers.
2. Black hat hackers: Black hat hackers are search a weak path to enter a network or a computer server. Their motivation is usually to get paid. These are bad hackers.
3. Script kiddies: This is a critical term for black hat hackers who use barrowed programs to attack networks and websites in try to make name for themselves.
4. Hacktivists: Some hackers are motivated by politics or religion or taking revenge. These hackers are enjoy by harassing their target.
5. State sponsored hackers: These hackers have limitless time and funding to target civilians, organizations and
The word hacking, usually associated with information technology, is a term used for the development of creative solutions for a problem by someone in a non-professional environment. With the introduction of personal computers and the internet, anyone could create solutions to problems in computer science. This led to the emergence of “hacker culture”, leading to the decentralization of computer industry (Hicks, 2014).
Despite the numerous arrest and prosecutions of members of their networks, the hacktivists continued to be an integral internet activist within the international system.The state and other interested powers are keen to keep secrets of social injustice and hide the truth that may turn the masses against them. In this view, (Beck 3) observes that the widely supported legislative actions seeking to limit the operations and create a prosecution framework for hacktivists. On the same note,(Kelly) confirms that the despite the considerable use of the internet by individuals; it is still dominated by corporations. The internet is seen to provide a convenient meeting point for activists pushing for different interests to converge and come up with ways to fight against the government and influential businesses. Hacktivism provides a safe space for activists to breed and carry out their activities to the disadvantage of the state. As (Li 310) highlights, there are currently over forty statutes created for computer crimes. Principally, these legislations are
A white hat hacker’s purpose is to discover problems with computer systems thatwill give black hat hackers the opportunity to hack into victims computers. Their purpose is to create better more improved computer systems to prevent this from happening or to catch the black hat hackers. A black hat hacker is a person whose purpose is to steal, destroy or damage their victims. They use the computer system to commit a potential crime to fulfil a self-purpose such as money laundering, drug trafficking, blackmail, terrorism
What kind of a personality must a hacker have? It is obvious that someone who hacks
A malicious hacker’s motivation can be money, gain respect or reputation, denial of service, political gain, or for fun (Wilhelm, 2010, p. 65). For the penetration tester, the motivation and purpose is to find vulnerabilities in order to protect the computer systems that a malicious hacker would use to meet their agenda. Penetration testing is commonly referred to as ethical hacking and personnel that conduct penetration tests are also referred to as ethical hackers or white hat hackers (Wilhelm, 2010).
Computer hacking: Is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. The majority of hackers are technology buffs. They are self-motivated and learning about computers is their true passion. ("What Is Computer Hacking?" WiseGEEK. N.p., n.d. Web. 27 July 2013).
In the beginning of the age of the modern computer, programmers worked around the clock, creating code for their employers for use in proprietary computer systems. These elite programmers enjoyed challenging one another and frequently enjoyed stretching modern systems to their limits. These programmers became know as "hackers" for their talents at dissecting and working around difficult problems, often searching for the most elegant or most efficient solution possible. Unlike the vision of hackers as portrayed by the 1990's media., these hackers refrained from any illegal activities. The best hackers viewed such things as breaking into computer systems as immature and childish. The media derives their definition of a hacker
Cyber Terrorism is an attack executed by Cyber Terrorists via information systems to significantly interfere with the political, social or economic functioning of a groups or organizations of a nation or induces physical violence and creates panic. We define hackers as individuals who wish to access, modify data, files and resources without having the necessary authorization to do so, and/or wish to block services to authorized users. Cyber Terrorists are individuals or groups to utilize computer and networking technologies to terrorize. In this paper, we study the behavior of two groups of hackers: Cyber Terrorists and Common Hackers. Cyber Terrorism and Cyber Terrorists is generally considered classified information which cannot be released to the public, we can usually only interfere that Cyber Terrorism and Cyber Terrorists exits. However in 2010 federal bureau of investigation chief, Robert Mueller, told an RSA conference of computer security professionals, “The Cyber Terrorism threat is real and rapidly expanding”. He indicated that terrorists have shown a clear interest in hacking skills and combining real attacks with Cyber-attacks. [8]
The term computer hacking describes the process of seeking and exploiting weaknesses in a computer system or computer network to breach the security of computers in order to theft the unauthorized and confidential information. “Hacker” is a special term that is used for the person who attempts to bypass way past the system security to perform the hacking. Hacking is of two types:
Most people when they here the term hacker automatically think of a person of questionable morals and intentions. This is not always necessarily thecase. If you do your homework and find a reputable white hat to add to your security team you would be moving your company toward stability in securing your systems. Although when dealing with hackers you always run the risk of infilitration; maybe you end up letting the individual go or they become unhappy for whatevever reason, but I think the rewards far outweigh the risks. Get yourself a white hat at the earliest opportunity.
In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network (Wiki).
In today’s society, the term hacker is very well known across the world. It is scary to know that you are being a victim of any individual who works with remote computers. People who use unauthorized entries to other computers through communication networks such as the Internet, are known as hacker. Since the technology has improved, all people should have information about hackers and how we can protect our systems against them.
The act of hacking is carried out by powerful and highly skilled programmers known as hackers who possess advanced knowledge about the systems. They do it because they are confident about their skills and succeeding in their hacking attempts. These proficient individuals are extremely inquisitive who are in pursuit of private information that is not publicly available. Accessing confidential or private information is just one small part of hacking. They are capable of controlling, modifying and denying the system from any kind of connections or cripple the system entirely bringing it
Black hat, grey hay, white hat, all terms to identify different classes or cyber criminals, all tied together under the label of hacker. Whether it is for the greater good or for pure evil, cyber security seems to be breached every day as the media puts out headlines of major retailers, governments, and social media sites being broken into for personal information, mockery, or even to instigate real physical war. The recent surge of technological advances has brought attention to a deadly force once overlooked by all, the hackers. These individuals commit cyber-crimes because they can retain anonymity, it is easier and less dangerous than a physical crime, and it makes it easy to draw attention on whatever it is they are attacking, which is why we as a society need to be educated on their motives and means of attack to protect us from their criminal actions. Criminals seem to be evolving at a quicker rate than technology, learning lessons from past criminals being caught and/or killed and adapting to the changing “smart” society.
Hackers fall into three general categories, black hat, grey hat, and white hat. The major difference between these categories is not their skill, but instead their own morals. Black hat hackers are cyber criminals that hackers that accept money to break the law. These violations could span from stealing credit card information to selling consumer data from large businesses. Grey hat hackers are what most hackers are classified as. These hackers are individuals that not use their hacking skills to break the law, but instead use it with innocent intentions, like young and budding hackers. White hat hackers are individuals who use their skills to help businesses and governments patch the holes in their security and most times, do this as a profession.