Is There Impact of Worst-Managed Corporate Governance on Cyber Attacks in Indonesian Biggest Banking Sector Organization: Literature Review Perspective (A Case Study at XYZtbk.)
Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 1)Publication Date: 2017-01-05
Authors : Ach Maulidi;
Page : 51-60
Keywords : corporate governance; cyber-attacks; viruses; awareness; firewall;
Abstract
The aim of this study is to theoretically analyze impact of corporate governance on cyber attacks in Indonesia biggest banking sector organization. It is very interesting to study this matter, because Bank XYZ is broadly known as one of leading companies getting involved in financing system in Asia regions, but it is to be regular victim from outsider attackers. This study confirms that poor corporate governance is the presumably the main causes of cybercrime occurring in this bank. Security awareness and training are critical point to the success of a security implementation because they have strong influences on improving and maintaining security level. Such efforts need to be ongoing (well-rounded training programs), and they at least include understanding of policies, procedures and red flag (current threats) to both users and all employees. Raising awareness from users towards symptoms of intrusion probably can enhance prevention and enforcement. The more routine meeting taken place in this bank to communicate the issues related to the technical aspects of the system and networks, the more likely employees will internalize the fact that security is everybodys responsibility. It is also better if this bank hires outside trainers to provide education and training about special knowledge in relation to the methods, implementations, and capabilities of the systems used to manage security. If users especially IT department staffs have already obtained advanced knowledge regarding how to deal with phishing, how to identify symptoms of a virus infection and types of attack strategy to access to network, how to manage spam to avoid malicious viruses, how to make proper written rules/protocol for sophisticated firewall to circumvent software exploitation, the unexpected system behavior attacking this Bank can be terminated as soon as possible.
Other Latest Articles
- Evaluation of the Impact of the Clearing Practice on Vegetation for Sustainable Cacao Culture in Cote dIvoire
- Radiological Assessment of Post Surfactant Changes in Respiratory Distress Syndrome
- Acute Toxicity of Methanolic Extract of Anabasis articulata Stems
- Role of C-Reactive Protein (CRP) in the Prediction of Anastomotic Leakage Following Gastrointestinal Surgery
- Multi-hop Adaptive Link State Optimal Routing in Wireless Ad hoc Network
Last modified: 2021-06-30 17:35:27