CFP last date
20 May 2024
Reseach Article

Building Security Perimeters to Protect Banking Sector in Libyan

by Salima Benqdara, Almabruk Sultan, Awad Elfergani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 12
Year of Publication: 2020
Authors: Salima Benqdara, Almabruk Sultan, Awad Elfergani
10.5120/ijca2020920050

Salima Benqdara, Almabruk Sultan, Awad Elfergani . Building Security Perimeters to Protect Banking Sector in Libyan. International Journal of Computer Applications. 176, 12 ( Apr 2020), 18-25. DOI=10.5120/ijca2020920050

@article{ 10.5120/ijca2020920050,
author = { Salima Benqdara, Almabruk Sultan, Awad Elfergani },
title = { Building Security Perimeters to Protect Banking Sector in Libyan },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2020 },
volume = { 176 },
number = { 12 },
month = { Apr },
year = { 2020 },
issn = { 0975-8887 },
pages = { 18-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number12/31253-2020920050/ },
doi = { 10.5120/ijca2020920050 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:42:19.476284+05:30
%A Salima Benqdara
%A Almabruk Sultan
%A Awad Elfergani
%T Building Security Perimeters to Protect Banking Sector in Libyan
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 12
%P 18-25
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security in the banking sector is heavily controlled as banks store and manage their clients’ private information. Information security has always been the responsibility of the information technology (IT) department in organizations. Banks have become a component of the internet and daily lives. It is a real task to protect these bank procedures, systems from the attackers and minimize the security threats. With this Cyber-attacks increasing day by day, and this is the challenge facing by countries and organizations like banking where data is critical. These banks should be built networks using secure strategies to protect their components. However, the performance of the network is affected by applying security rules. Network security is an essential priority for protecting applications, data, and network resources. Applying resource isolation rules are very important to prevent any possible attack. This isolation can be achieved by applying the DMZ (Demilitarized Zone) design. A DMZ extremely enhances the security of a network. In this paper perimeter network security framework is proposed to the protection and minimize the cybersecurity issue that exists in Libyan banks effectively.

References
  1. G.Gopalakrishna. "Report of the Working Group on information security, electronic banking, technology risk management, and tackling cyber frauds", RBI, Mumbai, Maharashtra, January 2011 Available: https://rbi.org.in/ scripts/ Notification User.aspx?Mode=0&Id=6366.
  2. Zahoor, Z., Ud-din, M., and Sunami, K, "Challenges in privacy and security in banking sector and related countermeasures", International Journal of Computer Applications, 144(3), 2016, 24-35. .
  3. Maharjan, R., and Chatterjee, J. M," Framework for Minimizing Cyber Security Issues in Banking Sector of Nepal", LBEF Research Journal of Science, Technology and Management, 1(1), 2019.
  4. Boland, H. and Mousavi, H., Security issues of the IEEE 802.11 b wireless LAN. In Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No. 04CH37513) (Vol. 1, pp. 333-336). IEEE.
  5. Elmadani, M. (2015). The Study of Service Quality in Libyan Commercial Banks (Doctoral dissertation, University of Huddersfield).
  6. Ibrahim, A. (2017). Cash crisis pushes Libyans to virtual payments. Accessed Nov, 2018. In Australia Conference, Edith Cowan University, 75-82.
  7. Pack, J. (2017). Libya’s Liquidity Crunch and the Dinar’s Demise: Psychological and Macroeconomic Dimensions of the Current Crisis." US-LIBYA Business association Washington. Accessed Sep, 2018. http://www.us-lba.org.
  8. Elgahwash, F., Freeman, M. and Freeman, A.E., 2014. Improving online banking quality in developing nations: A Libyan case.
  9. Microsoft, "Security Threats", Microsoft Corporation, 2018. Accessed Feb, 2018 https://msdn.microsoft.com/en-us/library/cc723507.
  10. Angelakopoulos, G. and Mihiotis, A., 2011. E-banking: challenges and opportunities in the Greek banking sector. Electronic Commerce Research, 11(3), pp.297-319.
  11. Alabed, S.H. and Hanandeh, R., 2013. The Impact of Implementing Information Security Management Systems on E-Business Firms: Case Study in Jordanian Banking Sector. Middle East University.
  12. Ogunwobi, Z.O., Folorunso, S.O. and Alebiosu, O., 2016. Evaluation of Computer and Network Security Strategies: A Case Study of Nigerian Banks. In OcRI (pp. 85-90).
  13. Tytarenko, O., 2017. Selection of the best security controls for rapid development of enterprise-level cyber security. Naval Postgraduate School Monterey United States.
  14. Dart, E., Rotman, L., Tierney, B., Hester, M. and Zurawski, J., 2014. The science dmz: A network design pattern for data-intensive science. Scientific Programming, 22(2), pp.173-185.
  15. Rababah, B., Zhou, S. and Bader, M., 2018. Evaluation the Performance of DMZ. Assoc. Mod. Educ. Comput. Sci, pp.0-13.
  16. Madje, Uma. "Design And Analysis Of Network Security Model." In Proceedings of the International Conference 69th IRF International Conference, Pune, India, 19th March, 2017.
  17. Puthal, D., Mohanty, S.P., Nanda, P. and Choppali, U., 2017. Building security perimeters to protect network systems against cyber threats [future directions]. IEEE Consumer Electronics Magazine, 6(4), pp.24-27.
  18. ISO/IEC 27033-4. "Information Technology - Security Techniques - Network Security - Part 4: Securing Communications Between Networks Using Security Gateways" , 2014, Single user license, ISO Store Order: OP-177008.
  19. - Byres, E.J., J. "Automation IT: Defense in Depth - ISA". 2012. Accessed June,2018. https://ww2.isa.org/standards-publications/isa-publications/intech-magazine/2012/december/automation-it-defense-depth/
  20. Launius, S., 2009. Securing the Network Perimeter Of A Community Bank'. SANS Institute, pp.1-41.
  21. Shrimali, S., 2017. DeMilitarized Zone: Network Architecture for Information Security. Int. J. Comput. Appl, 174(5), pp.16-19.
Index Terms

Computer Science
Information Sciences

Keywords

Keywords: Information Security DMZ Firewall Network Security Network Performance OpNet perimeter defense.