z-logo
open-access-imgOpen Access
Building Security Perimeters to Protect Banking Sector in Libyan
Author(s) -
Salima Benqdara,
Almabruk Sultan,
Awad Elfergani
Publication year - 2020
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2020920050
Subject(s) - computer science , computer security
Information security in the banking sector is heavily controlled as banks store and manage their clients’ private information. Information security has always been the responsibility of the information technology (IT) department in organizations. Banks have become a component of the internet and daily lives. It is a real task to protect these bank procedures, systems from the attackers and minimize the security threats. With this Cyber-attacks increasing day by day, and this is the challenge facing by countries and organizations like banking where data is critical. These banks should be built networks using secure strategies to protect their components. However, the performance of the network is affected by applying security rules. Network security is an essential priority for protecting applications, data, and network resources. Applying resource isolation rules are very important to prevent any possible attack. This isolation can be achieved by applying the DMZ (Demilitarized Zone) design. A DMZ extremely enhances the security of a network. In this paper perimeter network security framework is proposed to the protection and minimize the cybersecurity issue that exists in Libyan banks effectively.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom