• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 4
  • Tagged with
  • 23
  • 23
  • 15
  • 13
  • 9
  • 6
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Governance responses to hacking in the banking sector of South Africa : an exploratory study

Roos, Christiaan J. 20 November 2013 (has links)
D.Comm. (Auditing) / Organisations today are critically dependent on IT to enable business operations and ensure competitiveness in a growing international marketplace. At the same time, IT also introduces significant risks, such as hacking. The board of directors is ultimately responsible for mitigating IT risk as a component of business risk. This task is included in its corporate governance responsibilities, which, in the South African context, is underpinned by the King Code of Corporate Governance. The board of directors also plays a key role in identifying and enabling the most appropriate responses to IT risk, including hacking. This inevitably necessitates greater focus on and understanding of risks such as hacking. The determined and elusive nature of hackers makes them a significant threat to organisations today. Not only are hackers characterised by various profiles and motives, but they are also exceptionally skilled in exploiting weak security practices and software vulnerabilities, with attack techniques which range from non-technical social engineering to advanced technical attacks and exploits. Hackers are role-players in cybercrime and cyber warfare, as is evident from the media and information security survey results explored in this thesis, in particular within the banking sector, which is the financial backbone of the country. It is for this reason that the South African banking sector has been selected as the target population for this study. This study considers the meaning and nature of hacking, viewing it as either a risk or an event, which requires preventative or detective responses. The effect of hacking on business risks is explored next by identifying common business risks and common IT risks themes, where after the fundamental links between hacking and the IT risk themes are established. This study further argues that business risks are increased by IT risks, which implies that, by indirect association, business risks are increased by hacking. A response to this threat is required, in particular from a governance perspective, with the board of directors playing a fundamental role in supporting the appropriate responses. This study explores the advantages and disadvantages of various responses to hacking, highlighting the point that most traditional responses are not effective enough in fully mitigating the hacking threat. It is argued that ethical hacking is an effective response to the threat of hacking. The nature of ethical hacking is explored, including its objectives, motivation, advantages and disadvantages. The multi-faceted nature of the ethical hacking response is also considered. In order to explore the risks and responses to hacking in the banking sector in South Africa, an analysis of annual reports was conducted and two questionnaires were administered. The analysis of the annual reports of the 16 locally registered banks in South Africa highlighted differences in disclosure practices around IT risk, IT governance and hacking. This was followed by empirical testing in the local banking sector, by using a mixed-method approach in order to solicit mostly quantitative, but also qualitative, responses from company secretaries and individuals responsible for IT at the 16 locally registered banks. The results of the questionnaires indicated that the board of directors is not fully embracing its IT governance responsibilities and that IT matters are mostly dealt with by risk management committees at board level or IT steering committees at executive management level. The effect of IT risks on business risks such as human resource risk and physical risk is underestimated. Respondents were unclear about the effect of hacking on IT risks, such as IT human resource risk and lack of software development. The local banking sector is not fully aware of how hacking can affect organisations, and banks are not making enough use of ethical hacking as a response to the hacker threat. This is the first study of its kind to explore ethical hacking in the context of governance responses. The study breaks new ground by providing a unique in-depth analysis of the link between business risk, IT risk and hacking. It is also the first study into the various responses to hacking in the SA banking sector and will assist not only the banking industry but business at large in defining appropriate preventative and detective responses to hacking.
12

Information security in a distributed banking environment, with specific reference to security protocols.

Van Buuren, Suzi 22 August 2012 (has links)
M.Comm. / The principal aim of the present dissertation is to determine the nature of an electronicbanking environment, to determine the threats within such an environment and the security functionality needed to ward off these threats. Security solutions for each area at risk will be provided in short. The main focus of the dissertation will fall on the security protocols that can be used as solutions to protect a banking system. In the dissertation, indication will also be given of what the security protocols, in their turn, depend on to provide protection to a banking system. There are several security protocols that can be used to secure a banking system. The problem, however, is to determine which protocol will provide the best security for a bank in a specific application. This dissertation is also aimed at providing a general security framework that banks could use to evaluate various security protocols which could be implemented to secure a banking system. Such framework should indicate which security protocols will provide a bank in a certain banking environment with the best protection against security threats. It should also indicate which protocols could be used in combination with others to provide the best security.
13

Bezpečnost elektronického bankovnictví / Security of Electronic Banking

Pařil, Jan January 2014 (has links)
The main focus of the thesis is an electronic banking and security. The work includes evaluation the current state of security of electronic banking, the possible threats of attack on electronic banking and risks of security breaches. The next part focus on user satisfaction with e-banking security using a questionnaire. Are recommended new forms of security.
14

Bezpečnost elektronického bankovnictví / Security of Electronic Banking

Pařil, Jan January 2015 (has links)
The main focus of the thesis is an electronic banking and security. The work includes evaluation the current state of security of electronic banking, the possible threats of attack on electronic banking and risks of security breaches. The next part focus on user satisfaction with e-banking security using a questionnaire. Are recommended new forms of security.
15

The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship

Kleynhans, Stefan Anton. 12 1900 (has links)
The Internet has had and will continue to have a major impact in the way in which banking business is conducted. This dissertation primarily considers the allocation of risks associated with Internet banking and in doing so considers the role of trade usage in Internet banking. The question of what the Internet is and more specifically what constitutes Internet banking is addressed. In order to have an understanding of the allocation of risks in Internet banking a good understanding of the traditional bank-customer relationship is necessary. The contractual basis for this relationship is discussed. The duties of the bank and the customer are discussed. In this regard the duty of a bank to act in terms of its customers mandate, the banks duty of confidentiality and the customers duty to exercise reasonable care are considered. The concept of a customer is briefly discussed. As trade usage plays a significant role in the contract between the bank and its customer, attention is given to the requirement for the recognition of a trade usage generally and more particularly in South Africa. The effect of Internet banking on the traditional bank-customer relationship is considered. The fact that a bank is still required to act in terms of its customer's mandate but is unable to identify is examined. As most Internet banking contracts impose an obligation on the customer to take security precautions and also limit the liability of banks, consideration is finally given to the possibility that the practices of banks in regard to Internet banking may have acquired the status of trade usage in this particular sphere of banking. / LL.M. (Banking Law)
16

Computer security and the bank security officer : "You are required to render it secure"

Glavin, Howard E. 03 June 2011 (has links)
This thesis has taken an in-depth look into bank computer security, the bank security officer, and "The 1968 Bank Protection Act."To accomplish this, a questionnaire was developed and furnished to all bank members of the Indiana Bankers Association to be responded to by the bank security officers. This document was based on the premise that this bank officer is ill-trained, overworked by unrelated duties, and generally not interested in security."The 1968 Bank Protection Act" made this officer's position a legal requirement to maintain its banking operation and charged this officer with certain duties.The resultant responses verified the original hypothesis and showed a need for future training.This thesis shows the profile of, a computer criminal and also some cases to illustrate the type and scope of criminal ventures related to bank computer facilities. This was all coupled with an analysis of the law as it applies and offers a training vehicle to bring this officer up to a level of competency in this field.Ball State UniversityMuncie, IN 47306
17

The role of trade usage and the allocation of risk for unauthorized transactions in internet banking : a re-evaluation of the traditional bank-customer relationship

Kleynhans, Stefan Anton. 12 1900 (has links)
The Internet has had and will continue to have a major impact in the way in which banking business is conducted. This dissertation primarily considers the allocation of risks associated with Internet banking and in doing so considers the role of trade usage in Internet banking. The question of what the Internet is and more specifically what constitutes Internet banking is addressed. In order to have an understanding of the allocation of risks in Internet banking a good understanding of the traditional bank-customer relationship is necessary. The contractual basis for this relationship is discussed. The duties of the bank and the customer are discussed. In this regard the duty of a bank to act in terms of its customers mandate, the banks duty of confidentiality and the customers duty to exercise reasonable care are considered. The concept of a customer is briefly discussed. As trade usage plays a significant role in the contract between the bank and its customer, attention is given to the requirement for the recognition of a trade usage generally and more particularly in South Africa. The effect of Internet banking on the traditional bank-customer relationship is considered. The fact that a bank is still required to act in terms of its customer's mandate but is unable to identify is examined. As most Internet banking contracts impose an obligation on the customer to take security precautions and also limit the liability of banks, consideration is finally given to the possibility that the practices of banks in regard to Internet banking may have acquired the status of trade usage in this particular sphere of banking. / LL.M. (Banking Law)
18

A framework for secure human computer interaction.

Johnston, James 02 June 2008 (has links)
This research is concerned with the development of a framework for the analysis and design of interfaces found in a security environment. An example of such an interface is a firewall. The purpose of this research is to use the framework as a method to improve the usability of an interface, thus aiding the user to implement the correct security features. The purpose is also to use the framework to assist in the development of trust between a user and a computer system. In this research the framework comprises six criteria which are used to analyse interfaces found in the traditional software environment, Internet banking environment and e-commerce environment. In order to develop the framework an overview of the fields of information security and human computer interfaces (HCI) is given. The overview provides background information and also establishes the existing research which has been done in these fields. Due to its popularity, the Windows Internet Connection Firewall is analysed in this research. Based on the criteria a level of trust fostered between the user and interface is calculated for the firewall. It is then shown how this level of trust can be improved by modifying the interface. A proposed interface for the firewall is presented according to the criteria. Interfaces found in the online Internet environment are discussed. This is important in order to identify the similarities and differences between traditional software interfaces and web interfaces. Due to these differences the criteria are modified to be relevant in the analysis and design of security interfaces found on the Internet. Three South African online banking websites are analysed according to the modified framework. Each interface is broken down into a number of components which are then analysed individually. The results of the analysis are compared between the three banking sites to identify the elements which make up a successful interface in an online banking environment. Lastly, three interfaces of e-commerce websites are analysed. Recommendations are made on how the interfaces can be improved, thus leading to a higher level of trust. / Labuschagne, L., Prof.
19

White collar crime: major bank fraud cases inHong Kong

Wong, Yuk-see., 黃玉司. January 1990 (has links)
published_or_final_version / Sociology / Master / Master of Social Sciences
20

Návrh metodiky analýzy rizik kritických aplikací v bankovním sektoru / Proposing a Risk Analysis Methodology for Critical Applications in the Banking Sector

Zajíček, Juraj January 2018 (has links)
This diploma thesis deals with the problem of risk analysis of critical applications in banking. The sponsor is the bank operating in the Czech Republic. The thesis is based on the theoretical apparatus in the field of information security and legal normatives of the Czech Republic. The thesis analyzes the laws and directives related to the issue of risk analysis, the bank's internal regulations and the previous analyzes carried out in the bank.

Page generated in 0.0532 seconds