
 
conformity, concentrate of data. During the 
development of information technology, there are 
more and more threaten for information security. 
Their methods are changing all the time and now 
information security has been staring us in the face. 
2.2  Status of Bank Information 
Security 
Now the methods taken for information system 
security in China include the following: 
(1) In the security for storage of database, the 
operation system encrypt the key field and come into 
field storage in order to ensure the validity of the 
data changing and keep from nonlicet data changing. 
(2) Control accessing purview, foreground 
application and operation system set different 
purview for users in different levels when the users 
are trying to connect the database. 
(3) Use cryptographic check for all local 
transactions; through the designed program to shield 
the system. 
(4) When the application process is running, use 
the way of signing to identify the operator, and 
according to the operator's permission to control the 
operator’s right. However, current application lacks 
safety design and support issues. 
(5) Taking into network security issues, banks 
gradually using router and firewall products, these 
products have a relatively strong network security 
technology. But the products focus on local problem 
rather the whole safety problem. 
(6) Operations department develop and 
implement a series of management systems and 
operating rules, many of which related to computer 
security issues, standardize the behavior of staff at 
all levels. However, the safety management tools 
drops behind. 
2.3  Security Problems of Information 
Systems of China Banks 
China's information technology is not mature, first 
of all, from the national scale, the system facilities is 
not perfect, whether it is the completeness of the 
information system facilities, or the breadth of its 
application, diversity, the banking system has big 
gap with the developed countries; Second, it is the 
lack of qualified personnel, especially lack of 
maintenance talents for bank information security. 
The core issue has the following points. 
1. Network security technology exist biases. 
Many people believe that information security is 
network security or computer security, so we put 
pressure on the network making the network 
complex. We set various control cards on the 
information superhighway; however the result is less 
effective. The most important point to protect is 
information, we should be careful in the data 
collection, storage, operating and analyzing.  
2. Pay attention to the tools investment rather 
than management investment. Investment in network 
security is not entirely safe products investment and 
tools investment, it should also include policies, 
operating procedures and emergency handling 
mechanism and other aspects of investment. The use 
of security products and tools should have 
appropriate environment of supporting process 
management.  
3. Application software in bank is very weak. 
Bank's application software is the carrier of 
information. Safety and quality of software is very 
important including software development life cycle 
and project management system. Nowadays more 
and more holes in safety including technical and 
management come from the quality of the 
production of software. 
4. Bank’s information and data management 
contains safety holes. Most of the applications of 
large banks are in the host application, the operating 
system is relatively closed, and the information 
storage is relatively safe. But the data and 
information have risk in management, these data 
include a variety of core business reports, customer 
relationship data, office functions, risk control 
information, etc., the information on the system 
transfer through an open IP network transmission, 
because the system's security holes, it is easily 
penetrated by virus, loss of management information 
is sometimes more dangerous than the loss of 
business data.  
5. Disaster prevention is a priority. With the 
centralization of data, security risks are also 
concentrated, often a data controls more than one 
financial information processing, directly related to 
the network's normal business, whether it is 
software, host or network, it will have a huge 
negative impact on society. In addition a variety of 
disaster may lead to the data center does not work, 
or even the loss of financial information. How to 
design information security from the angle of 
disaster, how to balance the investment and 
information security is a problem that we must face. 
Previous research shows that the current 
researches in this area are from two aspects: 
management and information technology. This is a 
further research of previous research done by these 
two aspects in order to get a secure system solution. 
STUDY ON THE INFORMATION SECURITY SYSTEM FOR BANK IN CHINA
191