A study and assessment of an organization's information technology infrastructure, applications, data usage and management, policies, procedures, and operational processes, compared to recognized standards or set norms, is what's known as an information technology audit.
Published in Chapter:
Contemporary Security Threats: Some Proposals for Banking Networks in Bangladesh
Md. Manzurul Hasan (American International University-Bangladesh, Bangladesh), Shahadat Hossain (City University, Bangladesh), Prioty Saha Trisha (American International University-Bangladesh, Bangladesh), Md. Mohsin Hossain (American International University-Bangladesh, Bangladesh), Abu Saleh Mohammad Rajuwan (American International University-Bangladesh, Bangladesh), and Md. Hasibur Rahman (American International University-Bangladesh, Bangladesh)
Copyright: © 2022
|Pages: 17
DOI: 10.4018/978-1-6684-3894-7.ch009
Abstract
Online transactions have increased abruptly during the COVID-19 pandemic. In recent years, the expansion of easy banking in Bangladesh has become necessary, particularly when banks do not have sufficient branches in Bangladesh's rural areas. This research provides a quick overview, a managerial framework of cybersecurity, and several potential threats that might significantly affect the security of online monetary transactions by giving some important ways. The authors explore contemporary scamming strategies used by cybercriminals and the impact of such scams on the financial sector. In addition, this chapter presents a way to mitigate these concerns by inflexible banking, provides a quick overview of the current automated teller machine (ATM) fraud, and offers potential solutions to avoid these attacks. Furthermore, the authors examine the consequences of banking fraud and identify possible research avenues where researchers could focus their efforts on benefit.