Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometric based Public Key Infrastructure (PKI) with the Help of Digital Certification

  • Rifat Tasnim Anannya
  • Sifat Rahman Ahona
Keywords: Biometric, Cyber Security, Cyber Crime, Digital Signature, Electronic Fund Transfer, Public Key Infrastructure


Information is such a thing which if misused, leaked or breached can lead to undesirable consequences. Financial institutions have a lot of data of their customers. These data’s are regarding customers’ personal information, transactions and many more which are highly sensitive. The entire system by which financial institutions such as – banks run, are required to be secured from cyber breach. As by breaching these systems’ can lead to financial disaster.   The rapid growth of IT infrastructure is not only considered a convenient way for customers in many perspectives but also it point out the lack of skilled manpower in our country. In banking sector, ATM, E-money laundering are the domain where crime occurred most of the time. So, this paper focuses on developing a conceptual framework based on secondary sources which included publications, journal, books etc. regarding the problem of cyber-threat happening in Bangladesh. It describes how a financial institute can make safe transaction using biometric based public key infrastructure with the help of digital certificate.


[1] Mahbub Rahman, Nilanjan Kumar Saha, Md. Nazirul Islam Sarker, Arifin Sultana, & A. Z. M. Shafiullah Prodhan. (2017). Problems and prospects of electronic banking in Bangladesh: A case study on Dutch-Bangla bank limited. American Journal of Operations Management and Information Systems, 2(1), 42-53. doi: 10.11648/j.ajomis.20170201.17.
[2] J.A. Unar, Woo Chaw Seng, & Almas Abbasi. (2014). A review of biometric technology along with trends and prospects. Pattern Recognition, 47(8), 2673-2688.
[3] Sultana Sharmeen Karim. (2016). Cyber-crime scenario in banking sector of Bangladesh: An overview. Available at:
[4] Cyber-attacks continue to rise in Bangladesh. (2019). Available at:
[5] Joyanta Saha. (2019). Bangladesh turning focus to cyber security, ICT state minister. Available at:
[6] Hackers steal $1.8m from 2 private banks. (2019). Available at:
[7] Common vulnerabilities in cyber space of Bangladesh. (2019). Available at:
[8] One-way function. (2019). Available at:
[9] Three banks hit by cyber attacks. (2019). Available at:
[10] Bangladesh bank ready to sue filipino bank for failing to return $66.46m of heist money. (2018). Available at:
[11] Cryptography digital signatures. (2019). Available at:
[12] Public-key cryptography. (2019). Available at:
[13] Ransomware. (2019). Available at:
[14] Know the types of cyber threats. (2019). Available at:
[15] What is a supply chain attack? Why you should be wary of third-party providers. (2019). Available at:
[16] State-sponsored cyber attacks. (2018). Available at:
[17] Pearson IT certification. (2019). Available at:
[18] One-way function. (2018). Available at:
[19] What is endpoint security?. (2019). Available at:
[20] Fingerprints biometric technologies whitepaper 2017. (2017). Available at:
[21] Shafi Goldwasser, Silvio Micali, & Ronald L.Rivest, A digital signature scheme secure against adaptive chosen-massage attacks. (1988 Apr). Available at:
How to Cite
Rifat Tasnim Anannya, & Sifat Rahman Ahona. (2020). Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometric based Public Key Infrastructure (PKI) with the Help of Digital Certification. International Journal of Engineering and Management Research, 10(1), 1-6.