Banking System Have Applications
Banking System Have Applications
Loop holes:
o Tunneling can be used by hackers to bypass firewalls and make a security breach at
application level.
o Insecure coding practices, SQL or script injections can be used to attack a web
application (Taylor, David.,2002).
o Usage of unused ports, FTP, telnet weakens security.
o Awareness by public in using passwords and applications etc is less.
Solutions:
Security policies must test application code for vulnerabilities and find way to counter
any attacks.
ARP attacks can be kept away from this attack by utilizing the 'port-security' summon
accessible to most top of the line Catalyst switches, for example, the 4000, 4500, 5000
Keep track of critical activities and softwares and gives notification to the
B.,2015).
If there is no need of ICMP then stop using them over the network. Routers must be
deployed so as they drop junk packets. Eg: dont allow UDP port 53 packets heading for
server.
Deploy firewall and intrusion detection system such that exchanges at the bank's
framework first experience an IPS that searches for weird organization requests and
actually denies anything taking after an Internet-based ambush. Your bank can work with
its IPS merchant to minimize unsettling influences of true blue framework development.
Once past the IPS, your Internet action encounters the firewall. We set these devices to
deny about with or without drawing closer action from answers to dynamic sales and an
obliged decision of organizations, for instance, site development and drawing closer email.
At long last, from within the bank's framework, I recommend an immense arrangement of
IDS sensors to screen the framework for strange action. This last line of assurance alerts
bank staff to extraordinary action samples and after that makes sense of if further action is
needed
Banks must impart awareness to customers regarding application, passwords and certain
safe guard techniques.
References:
FAQ.
Retrieved
Online
URL:
http://www.sans.org/newlook/resources/IDFAQ/vlan.htm.