Hardware and Software Technologies used in the Financial Industry
Author(s): PRICOPE, Ruxandra
Author(s) keywords: banking industry, encryption, security risks
Reference keywords: data encryption, risk management
Abstract:
This paper highlights the main technologies used in the financial business nowadays. The starting points for all these technologies are the disastrous attacks from the history and the well-known security risks. Nowadays sophisticated attacks in the banking industry are threatening both the customers and the banks, so intelligent solutions have to be found to diminish the risks.
References:
[1]. Pfleeger, Charles P. Security in Computing. Prentice Hall, 1997
[2]. http://csrc.nist.gov/nissc/1997/proceedings/041.pdf
[3]. http://www.hkma.gov.hk/media/eng/publication-and-research/quarterly-bulletin/qb9711/fa01.pdf
[4]. http://www.netpnb.com/web/L001/webpages/digicertuserguide.pdf
[5]. http://www.ijcsit.com/docs/vol1issue4/ijcsit2010010413.pdf
[6]. E-Banking in Bangladesh: The Future of Banking, Kamrul Hasan in Proceedings of Annual Paris Conference on Money Economy and Management Annual Paris Conference on Money Economy and Management (2011)
[7]. http://www.telecompaper.com/news/esd-hopes-for-success-with-mechip--95537
Article Title: Hardware and Software Technologies used in the Financial Industry
Author(s): PRICOPE, Ruxandra
Date of Publication: 2017-06-29
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2017.01.03
Issue: Volume 6, Issue 1, Year 2017
Section: Advances in Information Security Research
Page Range: 33-40 (8 pages)
Copyright ©2012-2025
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.