Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometric based Public Key Infrastructure (PKI) with the Help of Digital Certification

  • Rifat Tasnim Anannya
  • Sifat Rahman Ahona
Keywords: Biometric, Cyber Security, Cyber Crime, Digital Signature, Electronic Fund Transfer, Public Key Infrastructure

Abstract

Information is such a thing which if misused, leaked or breached can lead to undesirable consequences. Financial institutions have a lot of data of their customers. These data’s are regarding customers’ personal information, transactions and many more which are highly sensitive. The entire system by which financial institutions such as – banks run, are required to be secured from cyber breach. As by breaching these systems’ can lead to financial disaster.   The rapid growth of IT infrastructure is not only considered a convenient way for customers in many perspectives but also it point out the lack of skilled manpower in our country. In banking sector, ATM, E-money laundering are the domain where crime occurred most of the time. So, this paper focuses on developing a conceptual framework based on secondary sources which included publications, journal, books etc. regarding the problem of cyber-threat happening in Bangladesh. It describes how a financial institute can make safe transaction using biometric based public key infrastructure with the help of digital certificate.

References

[1] Mahbub Rahman, Nilanjan Kumar Saha, Md. Nazirul Islam Sarker, Arifin Sultana, & A. Z. M. Shafiullah Prodhan. (2017). Problems and prospects of electronic banking in Bangladesh: A case study on Dutch-Bangla bank limited. American Journal of Operations Management and Information Systems, 2(1), 42-53. doi: 10.11648/j.ajomis.20170201.17.
[2] J.A. Unar, Woo Chaw Seng, & Almas Abbasi. (2014). A review of biometric technology along with trends and prospects. Pattern Recognition, 47(8), 2673-2688.
[3] Sultana Sharmeen Karim. (2016). Cyber-crime scenario in banking sector of Bangladesh: An overview. Available at: https://slidex.tips/download/cyber-crime-scenario-in-banking-sector-of-bangladesh-an-overview.
[4] Cyber-attacks continue to rise in Bangladesh. (2019). Available at: https://thefinancialexpress.com.bd/sci-tech/cyber-attacks-continue-to-rise-in-bangladesh-1549427552.
[5] Joyanta Saha. (2019). Bangladesh turning focus to cyber security, ICT state minister. Available at: https://bdnews24.com/technology/2019/01/25/bangladesh-turning-focus-to-cyber-security-ict-state-minister.
[6] Hackers steal $1.8m from 2 private banks. (2019). Available at:
https://www.dhakatribune.com/business/banks/2019/06/22/hackers-steal-1-8m-from-2-private-banks.
[7] Common vulnerabilities in cyber space of Bangladesh. (2019). Available at: https://www.cirt.gov.bd/common-vulnerabilities-in-cyber-space-of-bangladesh/.
[8] One-way function. (2019). Available at: http://www.crypto-it.net/eng/theory/one-way-function.html
[9] Three banks hit by cyber attacks. (2019). Available at: https://www.thedailystar.net/frontpage/news/three-banks-hit-cyberattacks-1760629.
[10] Bangladesh bank ready to sue filipino bank for failing to return $66.46m of heist money. (2018). Available at: https://www.dhakatribune.com/business/banks/2018/02/07/bb-file-case-rcbc-fail-return-heist-money.
[11] Cryptography digital signatures. (2019). Available at: https://www.tutorialspoint.com/cryptography/cryptography_digital_signatures.htm.
[12] Public-key cryptography. (2019). Available at: https://en.wikipedia.org/wiki/Public-key_cryptography.
[13] Ransomware. (2019). Available at: https://en.wikipedia.org/wiki/Ransomware.
[14] Know the types of cyber threats. (2019). Available at: https://www.mass.gov/service-details/know-the-types-of-cyber-threats.
[15] What is a supply chain attack? Why you should be wary of third-party providers. (2019). Available at: https://www.csoonline.com/article/3191947/what-is-a-supply-chain-attack-why-you-should-be-wary-of-third-party-providers.html.
[16] State-sponsored cyber attacks. (2018). Available at: https://www.mwrinfosecurity.com/our-thinking/state-sponsored-cyber-attacks/.
[17] Pearson IT certification. (2019). Available at: http://www.pearsonitcertification.com/articles/article.aspx?p=2218577&seqNum=3.
[18] One-way function. (2018). Available at: http://www.crypto-it.net/eng/theory/one-way-function.html.
[19] What is endpoint security?. (2019). Available at: https://www.forcepoint.com/cyber-edu/endpoint-security.
[20] Fingerprints biometric technologies whitepaper 2017. (2017). Available at:
https://www.fingerprints.com/asset/assets/downloads/fingerprints-biometric-technologies-whitepaper-2017-revb.pdf.
[21] Shafi Goldwasser, Silvio Micali, & Ronald L.Rivest, A digital signature scheme secure against adaptive chosen-massage attacks. (1988 Apr). Available at: https://people.csail.mit.edu/rivest/GoldwasserMicaliRivest-ADigitalSignatureSchemeSecureAgainstAdaptiveChosenMessageAttacks.pdf.
Published
2020-02-28
How to Cite
Rifat Tasnim Anannya, & Sifat Rahman Ahona. (2020). Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometric based Public Key Infrastructure (PKI) with the Help of Digital Certification. International Journal of Engineering and Management Research, 10(1), 1-6. https://doi.org/10.31033/ijemr.10.1.1