IJISC
  • Indexed in

  • Latest News

    December 30, 2020
    Volume 9, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 25, 2020
    Associate Professor dr. Pradeep Kumar SINGH from Jaypee University of Information Technology, India, become Deputy Editor-in-Chief of IJISC
    June 22, 2020
    Volume 9, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Infection Vectors – Risk Factors for Financial Transactions


    Author(s): ŞCHEAU, Mircea-Constantin; ARSENE, Liviu; DINCĂ, Gerald

    Quick view | Full article | Citations | Views: 1,343


    Author(s) keywords: , , , ,


    Reference keywords: ,


    Abstract:

    With the proliferation of internet-enabled services and data availability, cyberattacks have become in the past decade. Relying on various techniques to either penetrate critical network infrastructures or deliver malicious payloads to unsuspecting victims, the main motivation behind most attacks is not just money but information. From banks to vendors and end users, the communication and transmission medium used for implementing safe transactions has become both complex and more prone to intrusions.



    References:

    [1]. Bitdefender, (2015, 09 July), Un nou val de mesaje ce conțin un virus bancar vizează clienții băncilor din România, [Online]. Available:
    http://www.bitdefender.ro/news/un-nou-val-de-mesaje-ce-contin-un-virus-bancar-vizeaza-clientii-bancilor-din-romania-3058.html

    [2]. Federal Bureau of Investigation, Financial Services Information Sharing and Analysis Center (FS-ISAC), Internet Crime Complaint Center (IC3), Fraud Alert – Cyber Criminals Targeting Financial Institution Employee Credentials to Conduct Wire Transfer Fraud, 2012, [Online]. Available:
    http://www.ic3.gov/media/2012/FraudAlertFinancialInstitutionEmployeeCredentials Targeted.pdf

    [3]. FISMA, Annual Report to Congress: Federal Information Security Management Act, 2013, [Online]. Available: https://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/fy_2013 _fisma_report_05.01.2014.pdf

    [4]. Kaspersky, (2015, February 18), Carbanak APT The Great Robbery, [Online]. Available:
    http://krebsonsecurity.com/wp-content/uploads/2015/02/Carbanak_APT_eng.pdf

    [5]. Kaspersky, (2015, February 21), Carbanak APT The Great Bank Robbery, [Online]. Available:
    http://25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com/files/2015/02/ Carbanak_APT_eng.pdf

    [6]. Limburger, Bedrijfsspionage bij DSM via usb-sticks, 2012, [Online]. Available: http://www.limburger.nl/article/20120707/REGIONIEUWS01/120709723

    [7]. NIST, Framework for Improving Critical Infrastructure Cybersecurity, 2014, [Online]. Available: http://www.nist.gov/cyberframework/

    [8]. PCI Security Standards Council, Payment Card Industry (PCI) Data Security Standard, 2015, [Online]. Available:
    https://www.pcisecuritystandards.org/documents/PCI_DSS_v3.pdf

    [9]. Ponemon Institute, The Challenge of Preventing Browser-Borne Malware, 2015, [Online]. Available:
    http://learn.spikes.com/rs/spikessecurity/images/Ponemon-Spikes-Report.pdf

    [10]. Radicati Group Inc, E-mail Statistics Report, 2015, [Online]. Available: http://www.radicati.com/wp/wp-content/uploads/2015/02/Email-Statistics-Report -2015-2019-Executive-Summary.pdf

    [11]. SANS, Security Spending and Preparedness in the Financial Sector: A SANS Survey, 2015, [Online]. Available:
    https://www.sans.org/reading-room/whitepapers/analyst/security-spending-preparedness-financial-sector-survey-36032

    [12]. SANS, Critical Security Controls for Effective Cyber Defense, [Online]. Available: https://www.sans.org/critical-security-controls/

    [13]. The Intercept, Secret Malware in European Union Attack Linked to U.S. and British Intelligence, 2014, [Online]. Available: https://firstlook.org/theintercept /2014/11/24/secret-regin-malware-belgacom-nsa-gchq/

    [14]. Trend Micro Incorporated, Russian Underground 101, 2012, [Online]. Available: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-russian-underground-101.pdf

    [15]. Verizon, 2015 Data Breach Investigations Report, 2015, , [Online]. Available: http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigation-report-2015_en_xg.pdf

    [16]. Wired, (2015, February 16), Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet, [Online]. Available: http://www.wired.com/2015/02/kapersky-discovers-equation-group/

    [17]. Romanian National Computer Security Incident Response Team, Security Reports, [Online]. Available: http://www.cert.ro



    Additional Information

    Article Title: Infection Vectors – Risk Factors for Financial Transactions
    Author(s): ŞCHEAU, Mircea-Constantin; ARSENE, Liviu; DINCĂ, Gerald
    Date of Publication: 2015-12-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2015.02.07
    Issue: Volume 4, Issue 2, Year 2015
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 73-85 (13 pages)



    Copyright ©2012-2021
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.