Cyber Security for Financial Institutions

CEO at Karachi Computer Services em Karachi Computer Services
23 de Aug de 2016
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
Cyber Security for Financial Institutions
1 de 58

Mais conteúdo relacionado

Mais procurados

Security system in banksSecurity system in banks
Security system in banksuniversity of education,Lahore
Cyber TerrorismCyber Terrorism
Cyber TerrorismShivam Lohiya
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorOlivier Busolini
Cyber securityCyber security
Cyber securityBhavin Shah
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock

Destaque

NExT Schlumberger Drilling Engineer Program Course OutlineNExT Schlumberger Drilling Engineer Program Course Outline
NExT Schlumberger Drilling Engineer Program Course OutlineBirigeni Preye [IADC Wellcap, CPM]
Ghayas Final project ReportGhayas Final project Report
Ghayas Final project ReportGhayas Qamar
Complete Draft 1_24BC_2_13Complete Draft 1_24BC_2_13
Complete Draft 1_24BC_2_13Andrew Cleary
ADVANCED  PRODUCTION LOGGING, CASED HOLE & PRODUCTION LOG EVALUATIONADVANCED  PRODUCTION LOGGING, CASED HOLE & PRODUCTION LOG EVALUATION
ADVANCED PRODUCTION LOGGING, CASED HOLE & PRODUCTION LOG EVALUATIONpetroEDGE
Secondary cementingSecondary cementing
Secondary cementingkareem Hassan
Nodal analysis summaryNodal analysis summary
Nodal analysis summaryDessy S. Ayu

Similar a Cyber Security for Financial Institutions

Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?Osei Fortune

Similar a Cyber Security for Financial Institutions(20)

Mais de Khawar Nehal khawar.nehal@atrc.net.pk

Linux class 15   26 oct 2021Linux class 15   26 oct 2021
Linux class 15 26 oct 2021Khawar Nehal khawar.nehal@atrc.net.pk
Linux class 10   15 oct 2021-6Linux class 10   15 oct 2021-6
Linux class 10 15 oct 2021-6Khawar Nehal khawar.nehal@atrc.net.pk
Linux class 9   15 oct 2021-5Linux class 9   15 oct 2021-5
Linux class 9 15 oct 2021-5Khawar Nehal khawar.nehal@atrc.net.pk
Linux class 8   tar  Linux class 8   tar
Linux class 8 tar Khawar Nehal khawar.nehal@atrc.net.pk
File systems linux class 8File systems linux class 8
File systems linux class 8Khawar Nehal khawar.nehal@atrc.net.pk
Linux commands Class 5 - 8 oct 2021Linux commands Class 5 - 8 oct 2021
Linux commands Class 5 - 8 oct 2021Khawar Nehal khawar.nehal@atrc.net.pk

Mais de Khawar Nehal khawar.nehal@atrc.net.pk(20)

Último

Tiger Talk: A Roaring Dialogue on Tiger Conservation - Mobius FoundationTiger Talk: A Roaring Dialogue on Tiger Conservation - Mobius Foundation
Tiger Talk: A Roaring Dialogue on Tiger Conservation - Mobius FoundationAmanHanda11
_NRES_July_2023_FINAL_EN.pdf_NRES_July_2023_FINAL_EN.pdf
_NRES_July_2023_FINAL_EN.pdfІнститут економічних досліджень та політичних консультацій
MEMU_July2023_222 en.pdfMEMU_July2023_222 en.pdf
MEMU_July2023_222 en.pdfІнститут економічних досліджень та політичних консультацій
BTC Dubai Daily Report Sept 13-ENG.pdfBTC Dubai Daily Report Sept 13-ENG.pdf
BTC Dubai Daily Report Sept 13-ENG.pdfBTC
Unlock the Secrets to Forex Fortune: Your Ultimate Guide to Mastering the Mar...Unlock the Secrets to Forex Fortune: Your Ultimate Guide to Mastering the Mar...
Unlock the Secrets to Forex Fortune: Your Ultimate Guide to Mastering the Mar...Gio Ferrandino
Problematic issues with Indian start-ups and its socioeconomic impacts.pptxProblematic issues with Indian start-ups and its socioeconomic impacts.pptx
Problematic issues with Indian start-ups and its socioeconomic impacts.pptxSwami Vivekanand Night College

Último(20)

Cyber Security for Financial Institutions

Notas do Editor

  1. Accept that we need to prepare better Services need to be offered due to market demands Self reliance and taking ownership shall work.
  2. Changes shall keep happening Attacks are very likely to rise in complexity and severity. Security is possible taken responsibility of.
  3. Develop a security policy Implement it Monitor it Control it Eliminate all weak elements in the system.
  4. Here are the trends in attacks over the past few years.
  5. The top 4 from the trends Insider misuse Errors Denial of service Crime ware
  6. Insider misuse is when a person inside the organization does something bad. To solve this you need A security policy Make sure everyone knows the policy exists and is active Implement the policy Have a system to monitor actions so the policy can be implemented
  7. Errors Errors in configuration by the administrator managing the system. Errors in the software development of the system which prevents administrators from implementing their configuration correctly.
  8. Errors A LOT of issues can be solved by fixing the software bugs and having the correct configurations by the administrator. This requires bug free software and well trained and experienced administrators.
  9. Depending on vendors to supply bug free systems has not worked so far very well. So monitor for product quality and replace all components of the system which cause more attacks to become successful.
  10. Learn from the airforce. They check everything before takeoff. For the financial industry it means stop offering services if you do not have the systems ready for it.