
Nowadays, computer and  internet are very common to everyone. We will rely on computer to save our  personal data and using online financial services to do financial transactions  such as online banking in order to safe time. Therefore, the  safeguards that you make are not sufficient enough to protect your confidential  data. Other than that,in the dynamic financial sector, people have to differentiate themselves with innovative technologies that improve customer service, streamline back-office operations, and strengthen risk management. Unfortunately, these same technologies often open doors to a variety of malicious attacks.
Today’s threats are significantly more dangerous than those of just a few years ago.
Financial institutions have become prime targets for cyber attacks by organized crime
with the sole objective of profiting at customers’ expense.
Here have few tips to keep your personal and financial data safe:
Encryption
Encryption refers to algorithmic schemes that encode plain  text into non-readable form or cyphertext, providing privacy. The receiver of  the encrypted text uses a "key" to decrypt the message, returning it to its  original plain text form. The key is the trigger mechanism to the algorithm.
Until the advent of the Internet,  encryption was rarely used by the public, but was largely a military tool.  Today, with online marketing, banking, health care and other services, even the  average householder is aware of encryption.
As more people realize the open nature of the Internet, email  and instant messaging, encryption will undoubtedly become more popular. Without  encryption, information passed on the Internet is not only available for  virtually anyone to snag and read, but is often stored for years on servers that  can change hands or become compromised in any number of ways. For all of these  reasons encryption is a goal worth pursuing.
Firewall
A system designed to prevent unauthorized access to or from a  private network.  Firewalls can be implemented in both hardware and software, or a  combination of both. Firewalls are frequently used to prevent unauthorized Internet users from  accessing private networks connected to the Internet, especially intranets. All  messages entering or leaving the intranet pass through the firewall, which  examines each message and blocks those that do not meet the specified security criteria.
intrusion detective system
Intrusion detective system tries to identify attempts to hack or break into a computer system  or to misuse it. IDSs may monitor packets passing over the network, monitor  system files, monitor log files, or set up deception systems that attempt to  trap hackers. While a firewall  should always be your first line of defense, an IDS should be next.
For example:Think of your network as a prison. The outside is protected by a  large wall (firewall), while the inside is protected by cameras and corrections  officers (an IDS). There are several types of IDSs, the most common types work the same. They  analyze network traffic and log files for certain patterns.  While a firewall will continually block a hacker from  connecting to a network, most firewalls never alert an administrator. An IDS will flag the events and alert an administrator.  The administrator can then see what is happening right after or even while the  attacks are still taking place. This gives an administrator the advantage of  being able to analyze the techniques being used, source of attacks, and methods  used by the hacker.
Biometric security
It is the automated methods for uniquely recognizing humans based on one or more intrinsic physical or behavioral traits . There are 2 characteristic, physical (fingerprints, irises,retinas, facial partterns, and hand measurements) and behavioral (gait, signature, and typing patterns)
Biometric system have the potential to identify individuals with very high degree of certainty. Physical attributes are much harder to fake than identify cards. Biometric system are personal recognition based on "who you are" as opposed to conjunction with "what you know" (pin) or "what you have" (ID card). Recognition of a person by his body, then linking that body to an externally established “identity”, forms a very powerful tool for identity management


0 comments:
Post a Comment