Advertisement

Financial Services Industry

  • Bernhard Hämmerli
Chapter
  • 2.6k Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7130)

Abstract

Critical infrastructure and services in financial industry are important for our society and the financial industry starts to understand the topic beyond the normal and well maintained Business Continuity Management and Disaster Recovery Plans (BCM & DRP). Today, the international backbone financial infrastructures operate pretty well, but in the infrastructure towards clients, two issues are utmost critical for the banks: Drive By Download and Phishing; both are related to steeling identity and money via e-banking. This is one of the results achieved by the EU project Parsifal (Protection and Trust in Financial Infrastructure (Parsifal-Team, 2010), for compositing a research agenda for the cyber security of the financial industry.

Keywords

Critical Information Infrastructure Protection Financial Industry Resilience and Robustness CIP CIIP 

References

  1. Comifin-Team. Communication Middleware for Monitoring Financial Critical Infrastructure (2008) Von, www.comifin.eu/abgerufen
  2. Detecon Consulting. Study - The Value of Information Security to European Banking Institutions. Zürich, Detecon (2001) Google Scholar
  3. Dick K., Nanto, C. S.: The Global Financial Crisis: Analysis and Policy Implications. Abgerufen am 26. 4 2011 (October 2, 2009) von, http://www.fas.org/sgp/crs/misc/RL34742.pdf
  4. FIX-Group. (kein Datum). Abgerufen am 2011. 7 31 von Request for Participation: FIX-FpML Collaboration Working Group, www.fixprotocol.org/discuss/read/5341e8a6
  5. FIX-Group, F. S. (kein Datum). FIX Protocol. Abgerufen am 2011. 7 31 von www.fixprotocol.org/what-is-fix.shtml
  6. Flatraaker, D.-I.: Sepa Standards – Sepa goes mobile. EPC Newsletter (January 2009) Google Scholar
  7. Gresser, J. Y.: Draft Ontology Of Financial Risks & Dependencies. Abgerufen am 26. 4 2011 von parsifal-project.eu (2009), http://www.parsifal-project.eu/images/PublicDeliverables/PARSIFAL%20D2.1%20Draft%20Ontology%20of%20Financial%20Risks%20Dependencies%20Within%20and%20outside%20the%20Financial%20Sector%20V3.0%20(Glossary).pdf Google Scholar
  8. Gresser, J. Y.: Ontology of Financial Risks & Dependencies: Vol 2 Glossary.Abgerufen am 26. 4 2011 von parsifal-project.eu (2009), http://www.parsifal-project.eu/images/PublicDeliverables/parsifal%20d2.1%20draft%20ontology%20of%20financial%20risks%20and%20dependencies%20within%20and%20outside%20the%20financial%20sector.pdf
  9. IdenTrust. (kein Datum). IdenTrust. Abgerufen am 31. 7 2011 von www.identrust.com/pdf/IdenTrust_Privacy_WhitePaper.pdf
  10. MEALNI. (31. 12 2010-2). Semi-annual report 2010/2. Abgerufen am 27. 04 2011 von, http://www.melani.admin.ch/dokumentation/00123/00124/01122/index.html?lang=en
  11. MELANI. (30. 6 2010-1). Semi-annual report 1/2010. Abgerufen am 27. 4 2011 von, http://www.melani.admin.ch/dokumentation/00123/00124/01119/index.html?lang=en
  12. Neumann, P. G. (kein Datum). ACM Digital Library. Abgerufen am 31. 7 2011 von, http://portal.acm.org/citation.cfm?id=505778&dl=ACM&coll=DL&CFID=37083720&CFTOKEN=98694083
  13. Parsifal-Team. Protection and Trust in Financial Infrastructures. Abgerufen am 2011. 7 31 von (2010), www.parsifal-project.eu
  14. Peppol-Team. (kein Datum). eProcurement without Bbroders in Europe. Abgerufen am 2011. 7 31 von www.peppol.eu
  15. SLTTGCC. Critical Infrastructure Data Taxonomy: Common Terminology for Describing Critical Infrastructure. Abgerufen am 26. 4 2011 von US Departement of Homeland Security (2005), http://www.dhs.gov/files/publications/gc_1226595934574.shtm
  16. Susan Morrow, G. J.-Y.: D3.4 Mapping of Research Challenges to CFI Scenarios.Abgerufen am 29. 4 2011 (October 13, 2009) von, http://www.parsifal-project.eu/index.php?option=com_content&view=article&id=73&Itemid=59
  17. Westbrook, N. M.: Bloomber Business Week. Abgerufen am 31. 7 2011 (2010) von, www.businessweek.com/news/2010-10-01/waddell-reed-trades-said-to-help-spur-may-6-crash.html
  18. Wikipedia on Bank for International Settlements. (kein Datum). Abgerufen am 26. 4 2011 von, http://en.wikipedia.org/wiki/Bank_for_International_Settlements
  19. Wikipedia on Basel II. (kein Datum). Abgerufen am 4 2011 von, http://en.wikipedia.org/wiki/Basel_II
  20. Wikipedia, S. r. Settlement risk. Abgerufen am 6. 5 2011 (August 26, 2010) von, http://en.wikipedia.org/wiki/Herstatt_Risk
  21. Wilcox, H.: Banking on the mobile - Mobile Banking, Strategies, Applications & Markets 2008-2013. Juniper Research White Paper, Basingstoke (January 2009)Google Scholar
  22. European Payment Council: Towards our single payment area (February 25, 2009), http://www.europeanpaymentscouncil.eu/index.cfm
  23. COSO - Enterprise Risk Management - Integrated Framework , Executive Summary (September 2004), http://www.coso.org/Publications/ERM/COSO_ERM_ExecutiveSummary.pdf
  24. Research and Development Committee, Financial Services Sector Coordinating Council for Critical Infrastructure Protection and Homeland Security (FSSCC), Research Agenda for the Banking and Finance Sector (September 2008)Google Scholar
  25. International Telecommunication Union, Information Society Statistical Profiles, 2009 – Africa, http://www.itu.int/dms_pub/itu-d/opb/ind/D-IND-RPM.AF-2009-PDF-E.pdf
  26. Committee on Payment and Settlement Systems (CPSS - Bank of International Settlement), The interdependencies of payment and settlement systems (June 2008)Google Scholar
  27. European Central Bank (ECB), Public consultation on glossary of terms related to payment, clearing and settlement systems (September 30, 2008)Google Scholar
  28. Federal Office for Information Security, BSI – Standard- 100-4, Business Continuity Management, version 1.0 (2009), http://www.bsi.bund.de/grundschutz
  29. British standard Institute, Information technology — Security techniques — Information security management systems — Code of practice for information security management, BS ISO/IEC 27001:2005, BS 7799-1:2005 (July 2007) Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Bernhard Hämmerli
    • 1
  1. 1.Norwegian Information Security Laboratory, Department of Computer ScienceGjøvik University CollageNorway

Personalised recommendations