Details

Data Breaches in Internet Banking - Analysing the Key Influencers That Impact Data Violation and Adopting Measures of Curbing Data Violation

Vishal Duhan

Dept of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat Solan(Himachal Pradesh)

14-24

Vol: 8, Issue: 3, 2018

Receiving Date: 2018-04-25 Acceptance Date:

2018-07-02

Publication Date:

2018-07-11

Download PDF

Abstract

In information systems, Cloud computing is a popular theme of research. It has revolutionized the perspective of distributed computing from existing methods. Although cloud offers great benefits, it does introduce security threats to the information and data which is currently moved from on-premises to off-premises. Due to the openness of data, cloud computing has been experiencing security threats that must be overcome for this service to be fully utilised. One such threat is data breach, this is because data is stored in different places across the globe hence difficult for security to be monitored. Therefore, security and privacy of data are the two major concerns of users in the cloud technology. Internet banking applications have become popular within banks and almost each bank has got its own service. The login and signature security vary from user/static password authentication method (it is alleged as the weakest way to manage one’s accounts) to certificates and tokens. Considering the confidentiality of this information, for instance passwords and bank accounts, banks need to identify, evaluate and solve distinct risks to security in regard to cloud computing in their management information security system. This paper sought to establish the available security measures employed in curbing data breaches, their shortcomings and suggest possible solutions. The paper employed a descriptive survey research design; a pre-tested questionnaire was used to collect data from the 46 banks that use internet banking in india. The study found that the banks had employees who were certified in security matters but none was certified in cloud computing security and recommended Staff Training and certification on Cloud Computing Security, cloud computing and resource management. Since its inception Internet has become a driving force towards the different technologies that have been developed. However, over the past few years, cloud computing paradigm has witnessed an enormous shift towards its adoption and it has become a trend in information technology with its promises.. The advantages of using cloud computing include reduced hardware maintenance cost, easy accessibility across the globe and flexibility of highly automated processes.

Keywords: Curbing; Cloud computing; Cloud security; internet banking; data breaches

References

Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.