scispace - formally typeset
Search or ask a question
Author

Awad Elfergani

Bio: Awad Elfergani is an academic researcher. The author has an hindex of 2, co-authored 2 publications receiving 5 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A framework is proposed to assess the information security issue in Libyan banks and data collected by interview information security staff is used to evaluate the current security strategy in Libya banks to identify security gaps.
Abstract: Information security in the banking sector is heavily controlled as banks store and manage their clients’ private information. Information security has always been the responsibility of the information technology (IT) department in organizations. Banks have become a component of the internet and daily lives. Libyan banks facade limited cash due to the part up political circumstance since 2014, as a result of limited cash individuals incapable to get their salaries. To solve this problem, most of Libyan banks are set up online electronic installment arrangements to assist individuals in buying their day by day needs. However, Cyber-attacks increasing day by day, and this is the challenge facing by banking where data is critical. These incidents could be prevented by implementing adaptable countermeasures promptly and minimizing risk. In this paper, a framework is proposed to assess the information security issue in Libyan banks. The study aimed at the assessment of security strategy in Libyan banks to identify security gaps. To achieve the aim of this study data collected by interview information security staff to evaluate the current security strategy in Libyan banks. General Terms Security, Risk Assessment.

3 citations

Journal ArticleDOI
TL;DR: Perimeter network security framework is proposed to the protection and minimize the cybersecurity issue that exists in Libyan banks effectively.
Abstract: Information security in the banking sector is heavily controlled as banks store and manage their clients’ private information. Information security has always been the responsibility of the information technology (IT) department in organizations. Banks have become a component of the internet and daily lives. It is a real task to protect these bank procedures, systems from the attackers and minimize the security threats. With this Cyber-attacks increasing day by day, and this is the challenge facing by countries and organizations like banking where data is critical. These banks should be built networks using secure strategies to protect their components. However, the performance of the network is affected by applying security rules. Network security is an essential priority for protecting applications, data, and network resources. Applying resource isolation rules are very important to prevent any possible attack. This isolation can be achieved by applying the DMZ (Demilitarized Zone) design. A DMZ extremely enhances the security of a network. In this paper perimeter network security framework is proposed to the protection and minimize the cybersecurity issue that exists in Libyan banks effectively.

2 citations


Cited by
More filters
Dissertation
01 Dec 2013
TL;DR: In this article, the authors present a list of well-known comments in the context of knowledge-based communication. ___________________________________________ ______________________________________________________________________________________________________________ ___________________________________________________________________________
Abstract: .....................................................................................iii ÖZ..................................................................................................iv ACKNOWLEDGMENTS......................................................................vi LIST OFTABLES................................................................................x

3 citations

01 Jan 2016
TL;DR: The study findings revealed that Nigerian banks are implementing at least five computer security strategies CCS Concepts, and it was mentioned that the integrated banking systems used by Nigerian banks has a certain security level thereby aiding the computer systems security in general.
Abstract: It has been identified that financial institutions are one of the major users of Information Technology hence the need to evaluate effective use of the computer security strategies. This study aimed at evaluating the effectiveness of computer and network security strategies employed in Nigerian banks. This study was led by the following objectives; to determine and assess the security strategies that are put in place by Nigerian banks, to suggest solutions that would improve the effectiveness of the evaluated security strategies, to identify the effect of the various security strategies on the integrated banking system. This study employed the use of online questionnaires as a means of data collection. The study majorly focused on computer security strategies employed by the banks, and how effective the implemented security strategies have been. The strategies include passwords, antivirus, firewalls, encryption, intrusion detection systems and intrusion prevention systems, and it was mentioned that the integrated banking systems used by Nigerian banks has a certain security level thereby aiding the computer systems security in general, the study also revealed that Nigerian banks rarely experience malicious attacks of any form on their systems. The study findings revealed that Nigerian banks are implementing at least five computer security strategies CCS Concepts • General and reference ➝ Cross-computing tools and techniques ➝ Evaluation

2 citations