Enhancing Cyber Security Measures Against Advanced Persistent Threats
CHAPTER ONE
Objective of theย Study
Generalย Objective
The general objective of this study is proposing a cybersecurity auditing framework that enables bank industries to perform effective and efficient cyber security measures.
Specificย Objectives
Theย specificย objectiveย ofย theย research included:
- assess the existing practices and process of cyber security measures systems and the methods and techniques used in selected Nigerian banks
- identify variations in cyber security systems and process and major causes of their
- identify the predominant problems that impedes the cyber security measures process in the banking sector in
- assess different cyber security frameworks which are done by different scholars across the world.
- propose a cyber-security auditing framework that can address the current challenges and, standardize the process of cyber security management, this can be applied in Nigerian bank
- validate the framework based on the actual environment
CHAPTERย TWO
REVIEWย OFย LITERATUREย ANDย RELATEDย WORKS
Introduction
Inย thisย chapter,ย theย researcherย hasย triedย toย reviewย theย Overviewย ofย Cyber security measures and its theoretical and empirical framework in a bank sector. The reviewed pointsย are: Overview of Cyber Security, Auditing Activities and implication process, Cyber security measuresย (CSA), Steps and procedures for security Audit, Cyber security measures Standards and regulations,ย Cyberย securityย Auditย Frameworksย (CSAF),ย Cyber security measuresย Tool.
Overview ofย Cyberย Securityย (CS)
Cyber security has become the heart of modern banking in our world today, and information has come to be the most valuable asset to protect from insiders, outsiders and competitors. The application of information technology has brought about significant changes in the way the institutions in the banking sector process and store data. This sector is now composed to face various developments such as internet banking, mobile banking, e-money, e-cheque, e-commerce etc., as the most modern methods of delivery of services to the customers. However, Customers are very concerned about privacy and identity of theft. Business partners, suppliers, and vendors are seeing security as the top requirement, particularly when providing mutual network and data access. Banksโ ability to take advantage of new opportunities often depends on their ability to provide open, accessible, available, and secure network services.
Having a good reputation for safeguarding dataโs and informationโs will increase market share and profit. Banks are clearly responsible for compromised data in their possession that results in fraud. Therefore, banks have to be responsible for fraudulent activity perpetrated via the internet channel.
Telecommunication networks have played a catalytic roleย in the expansion andย integration of theย Cyber Security (CS), within and between the institutions, facilitating data accessibility to differentย users. In view of the critical importance of Cyber Security (CS), there is a need to exercise constantย vigilance for the safety of the financial systems. Structured, well defined and documented securityย polices,ย standardsย andย guideย linesย layย theย foundationย forย goodย cyberย security.
Advertisements
CyberSecurityย Management
Cyber Security management is the process of protecting electronic and non-electronic information assets against the risks of loss, misuse, damage, and disclosure or corruption.
ISO/IEC 27002:2005 is an international standard, refers to a code of practice for cyber security management, and is intended as a common basis and practical guideline for developing organizational security standards and effective management practices. According to this standard contains guidelines and best practices recommendations for these 10 security domains. Implementing a Cyber Security Management System involves with 3 key aspects of an organization; physical and environmental aspect, Management aspect and Operational aspect. Hence, the concept denotes those 3key aspects in the bank related to the direction and control of the cyber security over information assets.
CHAPTERย THREEย
RESEARCHย DESIGNย ANDย METHODOLOGY
This chapter presents what research design and method was used to answer the research questions designed. Overview of the research methods: which includes qualitative, quantitative and mixed research methods are made and choice of the research methods and the reasons for that is stated. Questions answered in this part are: What research paradigm is used? How samples for the study are selected and why? What data collection techniques are employed? How data is analyzed? What instrument is used for data analysis?
Researchย Design
The research design was comprised by the result of the literature review. The study was conductedย using survey questionnaire, documentย analysis, andย interview as a method of data collection andย mixedย researchย methodย as aย researchย paradigm
A mixed research method which combines both quantitative and qualitative method was employed toย identify theย existingย cyberย security auditย system.ย Theย researchย beginsย withย literatureย reviewย byย assessing previous researches conducted by different scholars and experts on cyber security in generalย and in the banking industry in particular in Nigeria context. [40]. For the purpose of data collection,ย survey questionnaires and interviewย which are validated by selected expertise were employedย toย gathered relevant information that goes with the research study problems. Data were encoded andย analyzed by using SPSS version 20 and MS-excel programs, and the findings were discussed andย interpreted. Finally, a workable framework was being proposed, in order to mitigate the existing cyber security measuresย problems.
Population andย Sampling
According to the reportย from the National Bank of Nigeria, there are about 20 banks foundย inย Nigeria owned by both Public and Private. All of these banks are currently engaged in financialย transaction that includes, currency exchange, providing loan; depositing public moneys etc. Theseย major activities are currently highly supported by information technologies. Among the existing banksย the researcherย usedย purposive samplingย inย orderย toย selectย the banks.
CHAPTER FOUR
DATAย PRESENTATIONย ANDย ANALYSIS
Introduction
Data analysis involves critical thinking. The data analysis is done after collecting all the data from theย respondents. Thus, the analysis of the study follows the objective of the research. The findings areย organizedย inย toย threeย basicย categoriesย namely,ย Administrative,ย Technical,ย andย physicalย &ย Environmental security. Each category has list of security domains. In this section the findings of theย study and its interpretations are presented under each question items whereas suggestions are stated atย the end of each security category. Moreover, the data were analyzed using statistical tools, such asย graphs, tabulation and percentage using Microsoftย Excel.ย Whereas, the data from interviews andย observations were presented using thematic coding to assess the existing cyber security measuresย forย bankingย sectorย in Nigerian.ย The responses obtainedย through questionnaires wereย integratedย with interviewย resultsย andย physicalย observation inย orderย toย addressย theย researchย questions.
Studyย Sample
The following banks were included in the study. These are: Commercial Bank of Nigeria (CBE),ย Dashen Bank S.C. (DB), Abyssinia Bank S.C. (AB) and Nib International Bank S.C. (NIB). Theseย banksย wereย selectedย byย purposiveย samplingย method.
CHAPTERย FIVEย
CONCLUSIONS,ย RECOMMENDATIONSย ANDย FUTUREย WORKS
Thisย chapterย presentsย recommendationsย forย theย bankingย industryย inย generalย andย particularlyย forย Nigeria banking industry; based on conclusions of the research described in the thesis, the objectivesย of theย research,ย outlinedย in chapterย oneย areย reviewedย andย addressedย theirย achievement.ย Finally,ย proposalsย forย futureย workย areย suggested.
CONCLUSIONS
In todayโs technological and social environment, cyber security is a very important part of a bankingย system. Business partners, suppliers, customers, and vendors require high cyber security from one toย another, particularly when providing mutual network and data & information access. Banksโ ability toย take advantage of new opportunities often depends on its ability to provide open, accessible, available,ย andย secureย networkย connectivityย andย services.
The general objective of this research was to propose generic cyber security measures for banking sector in Nigeria. To achieve this objective, the researcher selected Nigeria banking sector to understand the current cyber security measures by investigating the readiness situation and identify factors that influence security audit implementation on the industry. After sharing experiences and knowledge from the survey study, then put it in to the existing knowledge on the subject matter, which identified from document analysis and literature reviews. Finally, a new framework has been developed to help the banking industry for exercising cyber security audit activity. The empirical study was done through mixed research method; questionnaire designed was based on ISO, NIST, and ICT security readiness checklist based on twelve minimum security requirements and data was conducted with professionals, having good experience on the subject, by using Fredric framework model. Therefore, based on the researches finding, Nigeria banking industries are at low level of readiness. The capability to conduct cyber security audit partly depends on the existence of policies, procedures and processes, which the majority of Nigeria banking industries are lacking. The existence trained man power in the area, consulting firms specialized in cyber security measures, IT staffs readiness, etc. also have low readiness in the country. The study shows it is in adequate. To solve the existing situation we recommend having cyber security measures. It enables organizations to have standardized approach of addressing cyber security measures by realizing the requirements: cyber security polices, standards, procedure and processes in the different security management domains.ย Therefore, the research proposes a workable cyber security measures that contributes for theย industryย as aย startingย pointย forย cyber security measures.
Recommendations
- The framework can be used as an initial effort for practitioners in the banking industry to manage their cyberย ย The results of the research also imply the need for further researches to make the framework more compressive and useful.
- The framework should also be inclusive through rigorous testing to minimize the limitation of the framework
- The framework should also be strong through upgrading it elements in different approaches
- There need continues follow up for its validation as per the dynamic cyber security challenges of the real-world.
- The Organizational management aspect, operational aspects and the physical and environmental aspect should fit to the best level of the current challenge, mitigation
- Beside the above listed recommendation there needs cyber security training for all employees in organization is important;
- Frequent workshops or seminars should be organized on cyber security on top of training;
- Government and other responsible organizations need to formulate ethical hackers team and cyber security audit firms by encouraging with some special benefit (like tax shield, office facility) up until the proper awareness about cyber security audit made to people and organizations in the country;
- Need to formulate security professions association for challenging things in group:
- Encourage researchers to work more on security and related areas to develop more personnel in the area.
- A national or regulatory bodies that manages and leads the countryโs cyber security needs to formulate a program and give training to different organizations in country about the use of cyber security and policies;
- Laws and policies must define what is right what is wrong as well as what penalties are put in place for violating security policy and prepare legal framework for security audit;
FutureWorks
Generally, cyber security is still a very complex field of research, with a lot of unexplored facts in theย areas. Therefore, we recommend that, the subject needs more researches to explore essentials. Butย particularly, as it is stated on scope and limitation section, the scope of this research was proposingย cyber security audit framework only for banking sectors. However, as a future work researchers needย toย address theย following:
- The situation in other financial institutions, governmental organizations and/or generally designs international or national approach that could benefit general public, organizations and individuals help to solve the real cyber security
- Although, in the banking sector, quality of services and technological adoption is their major focus but, there is a trade-off strong security implementation and internal control with theirย ย Therefore, it has to be considering for future research.
- Enhancing the same research by considering all branches of
- Due to time constraint the researcher couldnโt properly explore the proof of concepts in adequate testing environment and
- Determine the impact level of trust, ethical conduct, and culture on the process of CSRM development and implementation in banking
- To make users life easy , this research work shall be changed to research project based on model that was proposed by this research framework and better to create some mechanical or robotic techniques to implement quantitative measurement of judgments( to avoid some subjective decisions of High, Low, or Medium)
References
- Abiy, W., and Lemma, L. Information Security Culture in the Banking Sector. Nigeria.5th ICTย 2012ย Nigeria Conference.ย Venue:ย UN ECA,ย Abuja,ย Nigeria,ย (2012),
- Ana-maria,ย nizolย &ย F.ย Gheorghe,ย โAuditย forย informationย systemย securityโ,ย Informaticalย economicalย Vol,ย 14,ย no.ย 1/2010,ย pp5,ย 2010,ย retrievalย fromย http:ย //ย revistaie.ase.ro/content/53/049620 suduc, % 2013, 201, %20Filip.pdf, last accessed on Octoberย 2012.
- Anene, L. N., & Annette, L. S.. An Architectural and Process Model Approach to InformationSecurityย ย Lawrence Technologicalย University.ย (2007)
- AnonInternationalย Journalย ofย Electronicย Securityย andย Digitalย Forensicsย [Online]ย 2(3),ย 306โย 321Retrievedfrom:ย http://www.inderscience.metapress.com/openurl.asp?genre=article&issn=1751- 911X&volume=2&issue=3&spage=306.ย Accessedย Date:ย 12ย Sepย 2012ย 9:31ย AM,ย (2009).
- Catherine, D. โIntroduction to Research Methods a Practical guide for any one undertaking aResearchย Projectโ,ย Oxford,ย 2009,ย 4th
- Ettaul1, L. Rathod, V. โThe zachman framework, the ownerโs perspective & securityโ retrievedfromย http://www.mcs.csueastabl.e.Lastย accessedย onย March
- Franklin D. Kramer, An Integrated Governmental Strategy for Progress, IOSR โ JCE pp. 136-150,ย (2011),http://www.jstor.org/stable/43133822.
- J.ย B.ย Discoveringย informationย Securityย Management.ย Stockholm:ย Departmentย ofย Computerย andย Systemsย Sciencesย Stockholmย Universityย &ย Royalย Instituteย ofย Technology.ย (2005).
- George, S., Dawn, C., Andrew, M., Randall, T., Timothy, S., & Lori, F. Common Senseย Guideย to Mitigating Insiderย Threatsย 4thย Edition.ย Softwareย Engineering Institutes.ย (2012).
- Griffin L. K. โAnalysis & comparison of DODAF and ZACHMAN framework for use as theArchitecture ย ย for ย ย the ย ย united ย ย states ย ย coast ย ย guardโs ย ย Maritime ย ย patrol ย ย coastal ย ย (WPC)โ