Enhancing Cyber Defenses in Indian Banking Industry

Authors

  •  Saurabh Bhattacharya Chitkara Business School, Chitkara University, Rajpura – 140401, Punjab

DOI:

https://doi.org/10.53739/samvad/2024/v28/173776

Keywords:

Cybersecurity, Digital Banking, Cybercrime, Cyberattack, Machine Learning, Artificial Intelligence.

Abstract

The banking industry is greatly threatened by cybercrime, which makes it necessary to do a thorough investigation to comprehend its effects and forthcoming developments for cybersecurity. Research highlights the constant evolution of cyber risks and the disastrous effects of cyberattacks on Indian banking systems. The study explores the rise in cybercrime, the difficulties that the financial services industry faces, and the pressing demand for creative approaches to cybersecurity. Following cyber regulations and being up to date with new developments is essential for reducing risks and protecting the banking sector as cyberattacks are becoming more complex. The author suggests new-age technology and methods that can be used to tackle cyberattacks in the banking industry.

Downloads

Download data is not yet available.

Downloads

Published

2024-05-30

How to Cite

(1)
Bhattacharya, S. Enhancing Cyber Defenses in Indian Banking Industry. samvad 2024, 28, 01-06.

Issue

Section

Articles

References

AAG IT Support. (n.d.). The latest cyber crime statistics. https:// aag-it.com/the-latest-cyber-crime-statistics/

Agrafiotis, I., Nurse, J. R. C., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 4(1), Article tyy006. https://doi.org/10.1093/cybsec/tyy006

Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future Internet, 12(10), Article 10. https://doi.org/10.3390/fi12100168

Asiri, S., Xiao, Y., Alzahrani, S., Li, S., & Li, T. (2023). A survey of intelligent detection designs of HTML URL phishing attacks. IEEE Access, 11, 6421–6443. https://doi. org/10.1109/ACCESS.2023.3237798

Awasthi, S., Srivastava, A. P., Srivastava, S., & Narayan, V. (2019). A comparative study of various CAPTCHA methods for securing web pages. 2019 International Conference on Automation, Computational and Technology Management (ICACTM) (pp. 217-223). https://doi.org/10.1109/ ICACTM.2019.8776832

Bamrara, A., Singh, G., & Bhatt, M. (2013). Cyber attacks and defense strategies in India: An empirical assessment of banking sector. SSRN Electronic Journal. https://doi. org/10.2139/ssrn.2488413

Berjawi, O., Attar, A. E., Chbib, F., Khatoun, R., & Fahs, W. (2023). Cyberattacks detection through behavior analysis of internet traffic. Procedia Computer Science, 224, 52-59. https://doi.org/10.1016/j.procs.2023.09.010

Blaze. (2023). Biggest cyber threats for financial institutions in 2023. https://www.blazeinfosec.com/post/cyber-threatsfor- finance-2023/

Brooks, C. (n.d.). Cybersecurity Trends and Statistics For 2023; What You Need To Know. Forbes. https://www.forbes. com/sites/chuckbrooks/2023/03/05/cybersecurity-trends- -statistics-for-2023-more-treachery-and-risk-ahead-asattack- surface-and-hacker-capabilities-grow/

Cavelty, M. D., Eriksen, C., & Scharte, B. (2023). Making cyber security more resilient: Adding social considerations to technological fixes. Journal of Risk Research, 26(7), 801-814. https://doi.org/10.1080/13669877.2023.2208146

Cherqi, O., Moukafih, Y., Ghogho, M., & Benbrahim, H. (2023). Enhancing cyber threat identification in open-source intelligence feeds through an improved semi-supervised generative adversarial learning approach with contrastive learning. IEEE Access, 11, 84440-84452. https://doi. org/10.1109/ACCESS.2023.3299604

Crane, C. (2023). A look at 30 key cyber crime statistics. Hashed Out by The SSL StoreTM. https://www.thesslstore.com/blog/ cyber-crime-statistics/

Debas, E. A., Alajlan, R. S., & Hafizur Rahman, M. M. (2023). Biometric in cyber security: A mini review. 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 570-574. https://doi.org/10.1109/ICAIIC57133.2023.10067017

Demirkan, S., Demirkan, I., & McKee, A. (2020). Blockchain technology in the future of business cyber security and accounting. Journal of Management Analytics, 7(2), 189- 208. https://doi.org/10.1080/23270012.2020.1731721

Donalds, C., & Osei-Bryson, K.-M. (2020). Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. International Journal of Information Management, 51, Article 102056. https://doi. org/10.1016/j.ijinfomgt.2019.102056

Dwyer, A. C., Stevens, C., Muller, L. P., Cavelty, M. D., Coles- Kemp, L., & Thornton, P. (2022). What can a critical cybersecurity do? International Political Sociology, 16(3), Article olac013. https://doi.org/10.1093/ips/olac013

Georgiadou, A., Mouzakitis, S., & Askounis, D. (2022). Detecting insider threat via a cyber-security culture framework. Journal of Computer Information Systems, 62(4), 706-716. https://doi.org/10.1080/08874417.2021.1 903367

Goenka, R., Chawla, M., & Tiwari, N. (2023). A comprehensive survey of phishing: Mediums, intended targets, attack and defence techniques and a novel taxonomy. International Journal of Information Security, 23, 819-848. https://doi. org/10.1007/s10207-023-00768-x

Hasanova, H., Baek, U., Shin, M., Cho, K., & Kim, M.-S. (2019). A survey on blockchain cybersecurity vulnerabilities and possible countermeasures. International Journal of Network Management, 29(2), Article e2060. https://doi.org/10.1002/ nem.2060

Hassani, H., Huang, X., & Silva, E. (2018). Banking with blockchain-ed big data. Journal of Management Analytics, 5(4), 256-275. https://doi.org/10.1080/23270012.2018.1528900

Hindustan Times. (2023). Financial fraud top cyber crime in India; UPI, e-banking most targeted: Study. https:// www.hindustantimes.com/business/financial-fraud-topcyber- crime-in-india-upi-e-banking-most-targetedstudy- 101695036325725.html

Hussen, N., Elghamrawy, S. M., Salem, M., & El-Desouky, A. I. (2023). A fully streaming big data framework for cyber security based on optimized deep learning algorithm. IEEE Access, 11, 65675-65688. https://doi.org/10.1109/ACCESS.2023.3281893

Iscan, C., Kumas, O., Akbulut, F. P., & Akbulut, A. (2023). Wallet-based transaction fraud prevention through LightGBM with the focus on minimizing false alarms. IEEE Access, 1-1. https://doi.org/10.1109/ACCESS.2023.3321666

Khan, H. U., Malik, M. Z., Nazir, S., & Khan, F. (2023). Utilizing bio metric system for enhancing cyber security in banking sector: A systematic analysis. IEEE Access, 11, 80181-80198. https://doi.org/10.1109/ACCESS.2023.3298824

Kumar, A., & Om, H. (2018). An improved and secure multiserver authentication scheme based on biometrics and smartcard. Digital Communications and Networks, 4(1), 27–38. https://doi.org/10.1016/j.dcan.2017.09.004

Malinka, K., Hujňák, O., HanáÄek, P., & Hellebrandt, Luk. (2022). E-banking security study—10 years later. IEEE Access, 10, 16681-16699. https://doi.org/10.1109/ ACCESS.2022.3149475

Mijwil, M., Salem, I. E., & Ismaeel, M. M. (2023). The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review. Iraqi Journal For Computer Science and Mathematics, 4(1), Article 1. https:// doi.org/10.52866/ijcsm.2023.01.01.008

Mohammad, R. M., Thabtah, F., & McCluskey, L. (2015). Tutorial and critical analysis of phishing websites methods. Computer Science Review, 17, 1-24. https://doi. org/10.1016/j.cosrev.2015.04.001

Palatty, N. J. (2022). 90+ Cyber Crime Statistics 2023: Cost, Industries and Trends. https://www.getastra.com/blog/ security-audit/cyber-crime-statistics/

Pan, Y., Ge, X., Fang, C., & Fan, Y. (2020). A Systematic literature review of android malware detection using static analysis. IEEE Access, 8, 116363-116379. https://doi.org/10.1109/ ACCESS.2020.3002842

Porcedda, M. G. (2023). Sentencing data-driven cybercrime. How data crime with cascading effects is tackled by UK courts. Computer Law and Security Review, 48, Article 105793. https://doi.org/10.1016/j.clsr.2023.105793

Safi, A., & Singh, S. (2023). A systematic literature review on phishing website detection techniques. Journal of King Saud University - Computer and Information Sciences, 35(2), 590-611. https://doi.org/10.1016/j. jksuci.2023.01.004

Security Intelligence. (2023). Cost of a data breach 2023: Financial industry impacts. https://securityintelligence.com/articles/ cost-of-a-data-breach-2023-financial-industry/

Statista. (n.d.). Cost of a data breach in financial sector worldwide 2023. https://www.statista.com/ statistics/1324063/cost-of-data-breaches-in-financialindustry- worldwide/

Truong, V. T., Le, L., & Niyato, D. (2023). Blockchain meets metaverse and digital asset management: A comprehensive survey. IEEE Access, 11, 26258-26288. https://doi. org/10.1109/ACCESS.2023.3257029

Ullah, F., Naeem, H., Jabbar, S., Khalid, S., Latif, M. A., Al-turjman, F., & Mostarda, L. (2019). Cyber security threats detection in internet of things using deep learning approach. IEEE Access, 7, 124379-124389. https://doi. org/10.1109/ACCESS.2019.2937347

Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Å., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. https://doi.org/10.1080/ 08874417.2020.1712269

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.