Cyber Attacks and Defense Strategies in India: An Empirical Assessment of Banking Sector

被引:0
作者
Bamrara, Atul [1 ]
Singh, Gajendra [2 ]
Bhatt, Mamta [3 ]
机构
[1] HNB Garhwal Univ, Dept Management Studies, BFIT Tech Campus, Srinagar 246174, Uttarakhand, India
[2] Doon Univ, Sch Management, Dehra Dun 248001, Uttarakhand, India
[3] HNB Garhwal Univ, Sch Commerce, Srinagar 246174, Uttarakhand, India
来源
INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY | 2013年 / 7卷 / 01期
关键词
Cyber criminals; Banking sector; PHP remote file inclusion; Cross site scripting; Brute force attack; SQL injection vulnerability; Buffer overflow;
D O I
暂无
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Organizations cannot sustain without communication networks linking the vast sources of information spread all over the globe and information technology experts are struggling to design the high performance hardware and software which can cater the needs of today's' hi tech firms. The potential threat to secure enormous volume of data with a varied community of cyber criminals is a challenge in the current digital era. The present study is an attempt to reveal the varied cyber attack strategies adopted by cyber criminals to target the selected banks in India where spoofing, brute force attack, buffer overflow and cross side scripting are found positively correlated with public and private sector banks. Further, the findings show a positive correlation between Intruder Detection and cyber attacks, i.e., online identify theft, hacking, malicious code, DOS attack and credit card/ATM frauds as well as online identify theft, DOS attack & credit card/ATM fraud are found positively correlated with System Monitoring.
引用
收藏
页码:49 / 61
页数:13
相关论文
共 18 条
[1]  
Akhter F, 2008, APPLIED COMPUTING 2008, VOLS 1-3, P1474
[2]  
[Anonymous], 802 IEEE STAND
[3]  
Armstrong I., 2000, SC MAGAZINE
[4]  
Cashell B., 2004, CRS REP C, P1
[5]  
Choo K. R., 2009, INFORM SECURITY TECH, VXXX, P1
[6]   Computer hacking and cyber terrorism: The real threats in the new millennium? [J].
Furnell, SM ;
Warren, MJ .
COMPUTERS & SECURITY, 1999, 18 (01) :28-34
[7]   A taxonomy of networks and computer attacks [J].
Hansman, S ;
Hunt, R .
COMPUTERS & SECURITY, 2005, 24 (01) :31-43
[8]  
Hertzum M., 2004, Australian Journal of Information Systems, P52
[9]  
Hibbs J., 2008, CYBERCRIME CYBERTERR
[10]   Case study: Online banking security [J].
Hole, KJ ;
Moen, V ;
Tjostheim, T .
IEEE SECURITY & PRIVACY, 2006, 4 (02) :14-20