Language:EN
Pages: 15
Words: 4174
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
resourcing estimates

Resourcing estimates

Table 1 Components Cost Estimation

Enterprise Architecture Design
ITNET202A Enterprise Security
Bank Cloud Security Architecture Design: Case Study

Contents

Legal Standards 1

National Institute of Standards and Technology (NIST) 1

Tools 2

Network Design 2

Security Services 6

Management tools 6

Software as a Service (SaaS) 9

Infrastructure as a Service (IaaS) 9

Switches 9

Cables 9

CCTV cameras 10

SABSA Framework Approach 10

Introduction

  1. The data must be secured and network should make data available whenever accessed. It should be confidential and restricted to outsider access.

  2. Customer information should be primarily secured.

  3. Connectivity for ATM and EFTPOS systems at the bank offices.

Outline

This enterprise security case study presents a cloud architectural and security planning for bank located at Sydney, Australia. The network designed in this report is for connecting bank branches and customers as well. Furthermore, customers are allowed to access their accounts and perform transactions with utmost security. The bank managers are willing to pay for concrete network and security design rather than dealing with weakness and risks later.

Legal Standards

National Institute of Standards and Technology (NIST)

Cloud Security Alliance (CSA)

Security Architecture

Banking sector is very sensitive domain where protecting data and transaction is crucial (Daron, et al., 2013). Some security recommendations are as listed below.

Network

For wireless access, network uses firewall, encryption schemes for authentication, data and financial transactions (Franklin et al., 2009).

Applications

To secure applications in the network, authentication should be of prime importance. AAA, audit loggings and SAML are employed in the network.

To offer data security some important applications such as SDSLC, IDA, Proxy servers, DAM, FAM, URL filtering are applied.

Tools

Network Design

Figure 1 Network Security Architecture

  • Bank counters and EFTPOS

  • ATM for CCTV and surveillance

  • Firewalls

  • Routers

  • Personal Computers

  • Servers

Dedicated server is used for storing sensitive bank, customer and transaction data. Server projected to use are SQL Server with 100 GB storage so that any concurrent users within the bank can access data stored in the server.

Management tools

  • eXtensible Access Control (XACML)

  • Software Configuration and Library Management (SCLM)

  • Common Event Expression (CEE)

Operational Components

  • Advanced Encryption Standard (AES)

  • Secure Hash Algorithm (SHA)

  • Database Activity Monitoring (DAM)

  • File Alteration Monitoring (FAM)

Cost Estimation

Implementation Cost Estimates

Component Price per unit Nos of units Total cost
Personal Computers with Licensed OS $264 15 $3960
Switch at Head Branch $144 1 $144
Router $97.84 2 $196.68
Firewall with Router $156 1 $156
CCTV Camera $184 set of 4 $184
Backbone Cables $150 approximate $150
ATM Cables $60 approximate $60
Online Banking Application $750 approximate $750
Tools $300 $300
TOTAL $5900.68

Operational Cost Estimates

Resourcing estimates

Servers Mode price / month
Application Server on rent $99
Domain Name Server on rent $59
Database Server on rent $60
Storage and Maintenance Server on rent $99
Backup Server on rent $89
TOTAL $406

Security Services

Management tools

Identity and Access Management Tools

Role-Based Access Control (RBAC)

Access control is important feature of network as it provides access to authorized access only. RBAC offers access to the network and data as per user’s role. The roles decide the access of user in the network based on their roles in the bank. Administration department staff is allowed to view, modify or create data used for administration purpose (Hammond, 2012).

There are many factors that affect roles in bank. Consider at an instance, a manager can have access to every piece of data even the most sensitive ones other than customer and employee login details. On the other hand, clerk is allowed to access information related to account summary and current balance. A clerk is not allowed to create or modify new data. RBAC allows access to information as per roles of people in their organization. Similarly, customers are allowed to access their accounts only. RBAC can help network to secure network and bank data by allowing access as per user roles.

One Time Password (OTP)

eXtensible Access Control Markup Language (XACML)

Software Configuration and Library Management (SCLM)

Incident Management Tools

Service Level Agreement (SLA)

Incident Object Description Exchange (IODEF)

IODEF is a secured format designed with intention of computer security. The format is readable and compatible with IDMEF, Intrusion Detection Message Exchange Format designed for IDS for hosts.

Real-time Inter-network Defense (RID)

RID offers communication between networks with responsibility of incident handling, management, identification and mitigation properties. It supports inter-network communication without security flaws. RID is most useful to offer communication between branches and head office.

Common Event Expression (CEE)

Operational Components

Secure Socket Layer (SSL)

Virtual Private Network (VPN)

Secure Shell (SSH)

Authentication, Authorization, Accounting (AAA)

The network administrator can find it difficult to manage bank network if he is at remote location from the network is installed. The same goes for bank employees and customers. In order to secure network and people related to it, AAA three factors are considered as most important. Authentication is the process through which user in the network is provided access on the basis of login credentials and OTP passwords entered during login. Authorization ensures access control and provides access to resources only if the user is authorized to use services. As a simple example, customers cannot be provided access to bank administration data. This is guaranteed by authorization schemes used in network. Accounting deals with profiling behaviour of network user on the basis of their roles. Actions of the users are recorded and logged into the system for accounting purpose.

Advanced Encryption Standard (AES)

AES is symmetric encryption scheme to secure network data transactions. It is found that it is six times faster than triple DES. AES uses symmetric block cipher for stronger encryption. It needs to be implemented in C or Java. Web application developers of bank, takes care of implementation of AES in the application itself.

Secure Hash Algorithm (SHA)

Audit Logging

Security Assertion Markup Language (SAML)

Database Activity Monitoring (DAM)

DAM is a set of tools to identify malicious activity on network that affect bank operations and productivity. It offers data discovery, analysis, classification, risk management, intrusion prevention and data security. All the activities related to database are managed and monitored by DAM tools.

File Alteration Monitoring (FAM)

FAM closely monitors file systems of the network and raises a flag whenever a file is modified even for small changes. All the file related tasks are managed and monitored to prevent unauthorised or malicious access.

Cloud Services

Software as a Service (SaaS)

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

Networking devices

Firewalls

A firewall filters unauthorised access to the private network. The proposed network for bank is a private cloud which needs to be protected from outsider attacks. All the VPN accessed are diagnosed at firewall first and then allowed for accessing network resources.

Routers

Router is a networking device used to forward data within the network. It maintains routing table that contains information of next hop on the basis of interface it is connected to. Data reaches to the correct destination only by use of routers (Ula et al., 2011). The routers in bank network are employed to use RIP (Routing Information Protocol).

Switches

Cables

Equipment

Personal Computers

Servers

EFTPOS device

Electronic Fund Transfer at Point of Sale device is prevalent these days for its fast pace service in managing transactions. This device allows customers to deposit amount and perform amount transfer transactions within seconds without needing them to fill deposit or transaction forms.

CCTV cameras

Closed Circuit Televisions are the most important unit of banking network. All the activities are recorded in CCTV for security purpose. The cameras are connected via ATM cables discussed above.

SABSA Framework Approach

The designed cloud network for bank offers security to network, devices, storage, application and data (customer and transaction). The cloud service employed is SaaS, PaaS and IaaS. The type of cloud architecture designed in network is public and private. The people involved in this architecture are staff of bank and customers (online and offline). These people are cloud users.

Where – Location

References

Gusev, A. M. (2001). ‘E-Banking – Developing Future With Advanced Technologies’, Proceedings of the Second International Conference on Informatics and Information Technology, 2, pp.154-164.

Hamed, A. Rama, C. and Minca, A. (2013). ‘Resilience to Contagion in Financial Net-works’, Mathematical Finance. doi:10.111/mafi.12051.

Rogito, P. K. (2017). ‘Multi-Tiered Security Architecture For Information Infrastructure Protection in Selected Commercial Banks in Kenya’, Master’s Thesis, United States International University, Africa.

SABSA Institute. (2017). SABSA. Retrieved from The SABSA Institute: www.sabsa.org

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Jesse Walters

PageId: DOC1716709