Data encryption for bank management system

Data encryption for bank management system

Authors

  • Asst.Prof.Dr. Abdul Syukor Mohamad Faculty of Computer Science/Universiti Teknikal Malaysia Melaka (UTEM)/Malaysia

DOI:

https://doi.org/10.31185/wjcm.83

Keywords:

data encryption, bank management, database, ER

Abstract

Data breaches are perhaps the single most significant risk that banks face today. In the financial industry. Aside from the direct costs involved in these breaches, like lost funds, increased insurance expenses and fines, and penalties, institutions also must contend with the indirect costs. Loss of reputation and consumer trust are not easy to quantitatively measure, but it’s guaranteed the price is very high.

Unfortunately, banks need to face an ever-evolving set of threats because of the nature of their business. They hold sensitive financial records that bad actors are known to target, and with methods that are always shifting. Consequently, security cannot be static to meet these threats. It must be a continuous process to monitor and respond to new risks as they emerge. Also, compliance needs to be built into the overall process to meet the stringent privacy regulations for the financial industry. Data security for banks is undoubtedly a challenge, but a holistic approach may make it easier to manage.

References

G. Powell, “Beginning Database Design. s.l,” 2006. Wiley Publishing.

T. M. Connolly, “Database System, Design, Implementation Management,” 2005.

“Introduction to Database Models. TAFE NSW Sydney eLearning Moodle.” https://sielearning.tafensw.edu.au.

“Database Management System,” http://slideplayer.in.th. [Online] http://slideplayer.in.th/slide/ 2049285.

G. Verma and Mahapatra, “Database Management System,” 2005.

E. Biham and Shamir, “Adi Defferential cryptanalysis of the data encryption standard.” springer Verlag.

K. W. Campbell, J. Michael, and Wiener, DES is not a group. 1992.

A. F. Neamah, “Flexible Data Warehouse: Towards Building an Integrated Electronic Health Record Architecture,” 2020 International Conference on Smart Electronics and Communication (ICOSEC), pp. 1038–1042, 2020.

S. A. Diwan, S. Perumal, and D. S. Siber, “Smart e-service implementation as mobile agent in a smart e-government platform,” International Journal of Applied Engineering Research, vol. 11, no. 7, pp. 5250–5255, 2016.

Downloads

Published

2022-12-30

Issue

Section

Computer

How to Cite

[1]
Asst.Prof.Dr. Abdul Syukor Mohamad, “Data encryption for bank management system: Data encryption for bank management system”, WJCMS, vol. 1, no. 4, pp. 10–15, Dec. 2022, doi: 10.31185/wjcm.83.