Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometric based Public Key Infrastructure (PKI) with the Help of Digital Certification

  • Rifat Tasnim Anannya
  • Sifat Rahman Ahona
Keywords: Biometric, Cyber Security, Cyber Crime, Digital Signature, Electronic Fund Transfer, Public Key Infrastructure

Abstract

Information is such a thing which if misused, leaked or breached can lead to undesirable consequences. Financial institutions have a lot of data of their customers. These data’s are regarding customers’ personal information, transactions and many more which are highly sensitive. The entire system by which financial institutions such as – banks run, are required to be secured from cyber breach. As by breaching these systems’ can lead to financial disaster.   The rapid growth of IT infrastructure is not only considered a convenient way for customers in many perspectives but also it point out the lack of skilled manpower in our country. In banking sector, ATM, E-money laundering are the domain where crime occurred most of the time. So, this paper focuses on developing a conceptual framework based on secondary sources which included publications, journal, books etc. regarding the problem of cyber-threat happening in Bangladesh. It describes how a financial institute can make safe transaction using biometric based public key infrastructure with the help of digital certificate.

Downloads

Download data is not yet available.

References

Mahbub Rahman, Nilanjan Kumar Saha, Md. Nazirul Islam Sarker, Arifin Sultana, & A. Z. M. Shafiullah Prodhan. (2017). Problems and prospects of electronic banking in Bangladesh: A case study on Dutch-Bangla bank limited. American Journal of Operations Management and Information Systems, 2(1), 42-53. doi: 10.11648/j.ajomis.20170201.17.

J.A. Unar, Woo Chaw Seng, & Almas Abbasi. (2014). A review of biometric technology along with trends and prospects. Pattern Recognition, 47(8), 2673-2688.

Sultana Sharmeen Karim. (2016). Cyber-crime scenario in banking sector of Bangladesh: An overview. Available at: https://slidex.tips/download/cyber-crime-scenario-in-banking-sector-of-bangladesh-an-overview.

Cyber-attacks continue to rise in Bangladesh. (2019). Available at: https://thefinancialexpress.com.bd/sci-tech/cyber-attacks-continue-to-rise-in-bangladesh-1549427552.

Joyanta Saha. (2019). Bangladesh turning focus to cyber security, ICT state minister. Available at: https://bdnews24.com/technology/2019/01/25/bangladesh-turning-focus-to-cyber-security-ict-state-minister.

Hackers steal $1.8m from 2 private banks. (2019). Available at: https://www.dhakatribune.com/business/banks/2019/06/22/hackers-steal-1-8m-from-2-private-banks.

Common vulnerabilities in cyber space of Bangladesh. (2019). Available at: https://www.cirt.gov.bd/common-vulnerabilities-in-cyber-space-of-bangladesh/.

One-way function. (2019). Available at: http://www.crypto-it.net/eng/theory/one-way-function.html

Three banks hit by cyber attacks. (2019). Available at: https://www.thedailystar.net/frontpage/news/three-banks-hit-cyberattacks-1760629.

Bangladesh bank ready to sue filipino bank for failing to return $66.46m of heist money. (2018). Available at: https://www.dhakatribune.com/business/banks/2018/02/07/bb-file-case-rcbc-fail-return-heist-money.

Cryptography digital signatures. (2019). Available at: https://www.tutorialspoint.com/cryptography/cryptography_digital_signatures.htm.

Public-key cryptography. (2019). Available at: https://en.wikipedia.org/wiki/Public-key_cryptography.

Ransomware. (2019). Available at: https://en.wikipedia.org/wiki/Ransomware.

Know the types of cyber threats. (2019). Available at: https://www.mass.gov/service-details/know-the-types-of-cyber-threats.

What is a supply chain attack? Why you should be wary of third-party providers. (2019). Available at: https://www.csoonline.com/article/3191947/what-is-a-supply-chain-attack-why-you-should-be-wary-of-third-party-providers.html.

State-sponsored cyber attacks. (2018). Available at: https://www.mwrinfosecurity.com/our-thinking/state-sponsored-cyber-attacks/.

Pearson IT certification. (2019). Available at: http://www.pearsonitcertification.com/articles/article.aspx?p=2218577&seqNum=3.

One-way function. (2018). Available at: http://www.crypto-it.net/eng/theory/one-way-function.html.

What is endpoint security?. (2019). Available at: https://www.forcepoint.com/cyber-edu/endpoint-security.

Fingerprints biometric technologies whitepaper 2017. (2017). Available at:

https://www.fingerprints.com/asset/assets/downloads/fingerprints-biometric-technologies-whitepaper-2017-revb.pdf.

Shafi Goldwasser, Silvio Micali, & Ronald L.Rivest, A digital signature scheme secure against adaptive chosen-massage attacks. (1988 Apr). Available at: https://people.csail.mit.edu/rivest/GoldwasserMicaliRivest-ADigitalSignatureSchemeSecureAgainstAdaptiveChosenMessageAttacks.pdf.

Published
2020-02-28
How to Cite
Rifat Tasnim Anannya, & Sifat Rahman Ahona. (2020). Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometric based Public Key Infrastructure (PKI) with the Help of Digital Certification. International Journal of Engineering and Management Research, 10(1), 1-6. https://doi.org/10.31033/ijemr.10.1.1