Information Systems Protection in Financial Institutions
-
2018-10-13 https://doi.org/10.14419/ijet.v7i4.8.28136 -
information security, information technology, financial institution, fraud unauthorized access. -
Abstract
Information security is of great importance for the vital interests of any state. Creation of a developed and protected environment is an indispensable condition for the development of society and the state, which should be based on the latest automated technical means. Because for the prompt execution of transactions, all services may be carried out through the Internet.
Every day, the most pressing problem is the protection of information. Because the different areas of our lives are computerized, they have a wider range of viruses and unauthorized penetration. In order to counter external attacks, it is necessary not only to have effective protection tools, but also to know their system of work, settings and weaknesses of operating systems.
Knowledge of the basics of information security, the ability to effectively prevent the leakage of information is particularly valuable at present due to the fact that there is an acute shortage of skilled professionals in the market.
The basic concepts, structure and features of information technologies functioning in financial institutions operating are investigated. Unauthorized access possible types analysis to the institution information carried out. Methods and mechanisms financial institution information systems effective protection analysis is carried out.
Â
Â
 -
References
[1] Pro zakhyst informatsii v informatsiino-telekomunikatsiinykh systemakhâ€, Zakon Ukrainy, available online: http://zakon.rada.gov.ua/laws/show/80/94-%D0%B2%D1%80
[2] “Pro tekhnichnyi zakhyst informatsii v Ukrainiâ€, Polozhennia, available online: http://zakon3.rada.gov.ua/laws/show/1229/99
[3] Kryminalnyi kodeks Ukrainy, available online: http://zakon5.rada.gov.ua/laws/show/2341-14
[4] Vinnytskyi apeliatsiinyi administratyvnyi sud, available online: http://www.vaas.gov.ua/news/zaxist-informacijnix-sistem-vazhlive-zavdannya-sogodennya/
[5] “Multymediina platforma inomovlennia Ukrainyâ€, Ukrinform, available online: https://www.ukrinform.ua/rubric-technology/2418011-kilkist-hakerskih-atak-v-ukraini-za-rik-zrosla-vdesatero.html
[6] Kavun S.V., Holubiev V.O. “Analiz kiberzlochynnosti u sferi ekonomichnoi bezpekyâ€, Naukovi pratsi. Kompiuterni tekhnolohii, Vol 229, (2013), pp. 9-13
[7] Kozachenko I.P., Holubiev V.O. “Zahalni pryntsypy zakhystu informatsii v bankivskykh avtomatyzovanykh systemakhâ€, Information Security Center, available online: http://www.bezpeka.com/ru/lib/spec/infsys/art92.html
[8] Metody zakhystu informatsii v korporatyvnykh IS, available online: http://www.rusnauka.com/16_NPRT_2014/Tecnic/12_171491.doc.htm.
[9] Antivirus programs and their types, available online: http://vadimkoshka.blogspot.com
[10] ESET researchers unmask sophisticated "greyenergy" cyber-espionage group, available online: https://www.eset.com/us/about/newsroom/corporate-blog/petya-ransomware-what-we-know-now/
[11] Bezshtanko D.V. “Informatsiina bezpeka banku v systemi upravlinnia informatsiinym ryzykomâ€, (2012), available online: http://fkd.org.ua/article/download/28875/25883.
[12] Bernaz-Lukavetska O. M. “Informatsiina bezpeka finansovykh ustanov available online: http://dspace.onua.edu.ua/bitstream/ handle/11300/9896/Bernath-Lukavezka%20Tom%202_2017-196.pdf?sequence=1&isAllowed=y.
[13] The Statistics Portal, Ñ https://www.statista.com/statistics/784590/cyber-attacks-on-industries-worldwide-2017/.
[14] “On the Doctrine of Information Security of Ukraineâ€, Decree of the President of Ukraine, available online: http://zakon.rada.gov.ua/laws/show/514/2009
[15] Onishchenko, S., Matkovskyi, A., & Puhach, A. (2014). Analysis of threats to economic security of ukraine in conditions of innovative economic development. Economic Annals-XXI, 1-2(2), 8-11.
-
Downloads
-
How to Cite
Onyshshenko, S., Sivitska, S., Shapovalova, O., & Cherviak, A. (2018). Information Systems Protection in Financial Institutions. International Journal of Engineering & Technology, 7(4.8), 856-859. https://doi.org/10.14419/ijet.v7i4.8.28136Received date: 2019-03-03
Accepted date: 2019-03-03
Published date: 2018-10-13