Volume 9 , Issue 1 , PP: 8-17, 2022 | Cite this article as | XML | Html | PDF | Full Length Article
Mohammed I. Alghamdi 1 *
Doi: https://doi.org/10.54216/JCIM.090101
In the modern internet-connected society, technologies underpin almost every action in society. Although there have been positive effects of technologies in the organization, there have been forensic specialists indicating the issues and challenges with cyber security threats. The real-time conditions provide the capability of the organization in detecting, analyzing, and defending individuals against such threats. In this research project, the focus is on understanding the cyber security threats and the protection approaches to be utilized in safeguarding threats from financial institutions. With the Covid-19 pandemic, most of the financial firms, including Al Rajhi Bank, are utilizing technologies in their operations, and this has exposed them to cyber security threats. From the literature review conducted, the financial firms need to consider cyber security approaches including implementing triple DES, RSA, and blowfish algorithms in improving the security measures of the organizations.
Cyber security, DES, RSA, Blowfish, Perimeter defense, Access control mechanisms, accountability, Network
[1] Abomhara, M. & Koien, G. (2017). Cyber security and the Internet of Things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4(12), 65-88
[2] Ahmad, I., Niazy, M., Ziar, R. & Khan, S. (2021). Survey of IoT: Security threats and applications, Journal of Robotics and Control, 2(1), 42-47. DOI: 10.18196/jrc.2150
[3] Airehrour, D., Gutierrez, J., and Ray, S. K. (2016). Secure routing for internet of things: A survey, Journal of Network and Computer Applications 66, 198–213.
[4] Al Rajhi Bank. https://www.alrajhibank.com.sa/en/alrajhi-group/media-center/press-releases/al-rajhi-bank-delivers-sar-10734-million-in-net-profit-for-the-first-nine-months-of-2021
[5] Ani, U., He, H. & Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: Manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32-74. https://doi.org/10.1080/23742917.2016.1252211
[6] Atamli, A. W., and Martin, A. (2014). Threat-Based Security Analysis for the Internet of Things, International Workshop on Secure Internet of Things, 35–43
[7] Burton, J. & Lain, C. (2020). Desecuritising cyber security: Towards a societal approach. Journal of Cyber Policy, 5(3), 449-470. https://doi.org/10.1080/23738871.2020.1856903.
[8] Gupta, B. B., Tewari, A., Jain, A. K., & Agrawal, D. P. (2017). Fighting against phishing attacks: State of the art and future challenges. Neural Computing and Applications, 28(12), 3629-3654.
[9] Islam, M. and Aktheruzzaman, K. (2020) An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions. Journal of Computer and Communications, 12(8), 11-25. doi: 10.4236/jcc.2020.84002
[10] Jang, N. & Nepal, S. (2014). A survey of emerging threats in cyber security. Journal of Computer and System Sciences, 80(5), 973-993. https://doi.org/10.1016/j.jcss.2014.02.005
[11] Kaur, J. & Ramkumar, K. (2021). The recent trends in cyber security: A review. Journal of King Saud University-Computer and Information Sciences, 12(9), 21-27. https://doi.org/10.1016/j.jksuci.2021.01.018
[12] Kumar, S., Tiwari, P. & Zymbler, M. (2019). Internet of Things is a revolutionary approach for future technology enhancement: a review. Journal of Big Data, 6(2), 111-126. https://doi.org/10.1186/s40537-019-0268-2
[13] Liang, N., Biros, D. P., & Luse, A. (2016). An empirical validation of malicious insider characteristics. Journal of Management Information Systems, 33(2), 361-392.
[14] Loukaka, A. & Rahman, S. (2017) Discovering new cyber protection approaches from security professional prospective. International Journal of Computer Networks & Communications, 9(4), 13 -24. DOI: 10.5121/ijcnc.2017.9402
[15] Lu, Y. (2018). Cybersecurity research: A review of current research topics. Journal of Industrial Integration and Management, 3(4), 21-31. https://doi.org/10.1142/S2424862218500148.
[16] Malina, L., Hajny, J., Fujdiak, R., and Hosek, J. (2016). On perspective of security and privacy-preserving solutions in the internet of things. Computer Networks, 102, 83–95.
[17] O’Connell, N. (2020). Cyber security in the Saudi financial services sector: The SAMA cyber security framework. https://www.tamimi.com/law-update-articles/cyber-security-in-the-saudi-financial-services-sector-the-sama-cyber-security-framework/
[18] Ornes, S. (2016). Core Concept: The Internet of Things and the explosion of interconnectivity, Proceedings of the National Academy of Sciences, 113(40), 11059–11060.
[19] Ratnadewi et al (2018). Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC). Journal of Physics: Conference Series, 14(8). 1-19. doi :10.1088/1742-6596/954/1/012009.
[20] Renaud, K., Orgeron, C., Warkentin, M. & French, E. (2020). Cyber security responsibilization: An evaluation of the intervention approaches adopted by the five eyes countries and China. Public Administration Review, 2(1), 12-24
[21] Sadique. K., Rahmani, R. & Johannesson, P. (2018). Towards security on internet of things: applications and challenges in technology. Procedia Computer Science, 141(8), 199-206. https://doi.org/10.1016/j.procs.2018.10.168
[22] Sari, C., Rachmawanto, E. & Haryanto, C. (2018). Cryptography Triple Data encryption standard (3DES) for digital image security. Scientific Journal of Informatics, 5(2), 12-21
[23] Sawyer, B. D., & Hancock, P. A. (2018). Hacking the human: The prevalence paradox in cybersecurity. Human Factors, 60(5), 597-609
[24] Seemma, P. S., Nandhini, S., & Sowmiya, M. (2018). Overview of cyber security. International Journal of Advanced Research in Computer and Communication Engineering, 7(11), 125-128
[25] Senol, M. & Karacuha, E. (2020). Creating and Implementing an Effective and Deterrent National Cyber Security Strategy, Journal of Engineering, 12(4), 1-19. https://doi.org/10.1155/2020/5267564
[26] Simmonds, M. (2018). Instilling a culture of data security throughout the organisation. Network Security, 2018(6), 9-12.
[27] Singh, J., Pasquier, T., Bacon, J., Ko, H., and Eyers, D. (2016). Twenty Security Considerations for Cloud-Supported Internet of Things, IEEE Internet of Things Journal, 3(3), 269–284.
[28] Stewart, H., & Jürjens J. (2017). Information security management and the human aspect in organizations. Information and Computer Security 25(5), 494–534.
[29] Tashkandi, H. (2020). Online mask ads mystery revealed as Saudi banks launch cybersecurity campaign. Arab News. Retrieved from https://www.arabnews.com/node/1767466/saudi-arabia
[30] Wurm, J., Hoang, K., Arias, O., Sadeghi, A.-R., and Jin, Y. (2016). Security analysis on consumer and industrial IoT devices, 21st Asia and South Pacific Design Automation Conference (ASP-DAC), IEEE, 519–524.
[31] Zammani, M., & Razali, R. (2016). An empirical study of information security management success factors, International Journal of Advanced Science, Engineering and Information Technology, 6(6), 904-913.