Analysis of vulnerabilities in the network of second-tier banks and development of a methodology for their identification and elimination
DOI:
https://doi.org/10.51301/ce.2024.i2.04Keywords:
information security, banking systems, auditing, vulnerabilities, cyber threats, protection methods, security systems, organi-zational measuresAbstract
This report analyzes the vulnerabilities of information systems of second-tier banks, with an emphasis on identifying and eliminating weaknesses in their protection. The main attention is paid to the audit of existing security systems and key threats affecting the work of banking institutions. The methodology for eliminating the identified vulnerabilities is presented, as well as recommendations for improving security procedures and organizational measures aimed at increasing the resilience of information systems to cyber-attacks
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Computing & Engineering

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
<div class="pkpfooter-son">
<a rel="license" href="http://creativecommons.org/licenses/by-nc/4.0/"><img alt="Creative Commons License" style="border-width:0" src="https://i.creativecommons.org/l/by-nc/4.0/80x15.png"></a><br>This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-nc/4.0/">Creative Commons Attribution-NonCommercial 4.0 International License</a>.
</div>
