Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometric based Public Key Infrastructure (PKI) with the Help of Digital Certification
Information is such a thing which if misused, leaked or breached can lead to undesirable consequences. Financial institutions have a lot of data of their customers. These data’s are regarding customers’ personal information, transactions and many more which are highly sensitive. The entire system by which financial institutions such as – banks run, are required to be secured from cyber breach. As by breaching these systems’ can lead to financial disaster. The rapid growth of IT infrastructure is not only considered a convenient way for customers in many perspectives but also it point out the lack of skilled manpower in our country. In banking sector, ATM, E-money laundering are the domain where crime occurred most of the time. So, this paper focuses on developing a conceptual framework based on secondary sources which included publications, journal, books etc. regarding the problem of cyber-threat happening in Bangladesh. It describes how a financial institute can make safe transaction using biometric based public key infrastructure with the help of digital certificate.
 J.A. Unar, Woo Chaw Seng, & Almas Abbasi. (2014). A review of biometric technology along with trends and prospects. Pattern Recognition, 47(8), 2673-2688.
 Sultana Sharmeen Karim. (2016). Cyber-crime scenario in banking sector of Bangladesh: An overview. Available at: https://slidex.tips/download/cyber-crime-scenario-in-banking-sector-of-bangladesh-an-overview.
 Cyber-attacks continue to rise in Bangladesh. (2019). Available at: https://thefinancialexpress.com.bd/sci-tech/cyber-attacks-continue-to-rise-in-bangladesh-1549427552.
 Joyanta Saha. (2019). Bangladesh turning focus to cyber security, ICT state minister. Available at: https://bdnews24.com/technology/2019/01/25/bangladesh-turning-focus-to-cyber-security-ict-state-minister.
 Hackers steal $1.8m from 2 private banks. (2019). Available at:
 Common vulnerabilities in cyber space of Bangladesh. (2019). Available at: https://www.cirt.gov.bd/common-vulnerabilities-in-cyber-space-of-bangladesh/.
 One-way function. (2019). Available at: http://www.crypto-it.net/eng/theory/one-way-function.html
 Three banks hit by cyber attacks. (2019). Available at: https://www.thedailystar.net/frontpage/news/three-banks-hit-cyberattacks-1760629.
 Bangladesh bank ready to sue filipino bank for failing to return $66.46m of heist money. (2018). Available at: https://www.dhakatribune.com/business/banks/2018/02/07/bb-file-case-rcbc-fail-return-heist-money.
 Cryptography digital signatures. (2019). Available at: https://www.tutorialspoint.com/cryptography/cryptography_digital_signatures.htm.
 Public-key cryptography. (2019). Available at: https://en.wikipedia.org/wiki/Public-key_cryptography.
 Ransomware. (2019). Available at: https://en.wikipedia.org/wiki/Ransomware.
 Know the types of cyber threats. (2019). Available at: https://www.mass.gov/service-details/know-the-types-of-cyber-threats.
 What is a supply chain attack? Why you should be wary of third-party providers. (2019). Available at: https://www.csoonline.com/article/3191947/what-is-a-supply-chain-attack-why-you-should-be-wary-of-third-party-providers.html.
 State-sponsored cyber attacks. (2018). Available at: https://www.mwrinfosecurity.com/our-thinking/state-sponsored-cyber-attacks/.
 Pearson IT certification. (2019). Available at: http://www.pearsonitcertification.com/articles/article.aspx?p=2218577&seqNum=3.
 One-way function. (2018). Available at: http://www.crypto-it.net/eng/theory/one-way-function.html.
 What is endpoint security?. (2019). Available at: https://www.forcepoint.com/cyber-edu/endpoint-security.
 Fingerprints biometric technologies whitepaper 2017. (2017). Available at:
 Shafi Goldwasser, Silvio Micali, & Ronald L.Rivest, A digital signature scheme secure against adaptive chosen-massage attacks. (1988 Apr). Available at: https://people.csail.mit.edu/rivest/GoldwasserMicaliRivest-ADigitalSignatureSchemeSecureAgainstAdaptiveChosenMessageAttacks.pdf.
Copyright (c) 2020 International Journal of Engineering and Management Research
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.