the field of standardization of the Bank of Russia
were put into effect: "Methodology for assessing the
risks of violation of information security" (Bank of
Russia, 2009). Credit institutions are constantly faced
with information security risks associated with the
implementation of information security threats, they
can be caused by shortcomings in the processes of
ensuring information security by banks, which is
associated with technological and other events,
shortcomings in the application software of
automated systems and applications, as well as with
possible inconsistency of these processes of the
bank's activities (Regulation the Bank of Russia from
04/08/2020 № 716-P, 2020).
The ISO 31000 standard provides the following
risk assessment: it is a process that is a continuous
systematic action to apply strategic and tactical
actions, procedures, tools to form communications,
advice, identification, assessment, analysis, risk
monitoring (ISO 31000, 2018.).
First of all, it is necessary to identify the main
crimes in the field of information security that
threaten banks. The most dangerous in financial
institutions are attacks on the payment infrastructure.
In this case, the credit institution incurs large-scale
direct financial losses.
Further, attacks on bank processing centers with
withdrawal of funds through ATMs can be
distinguished. These attacks can be conditionally
divided into two categories. The first category
includes the infection of the ATM management
subsystem or through it the ATMs themselves, with
the subsequent submission of a command to issue
cash. The second category includes hacking of
processing with subsequent crediting to previously
received cards of significant amounts. Then these
funds are cashed through ATMs of various banks.
Attacks on remote banking systems should also be
highlighted. As a rule, they are implemented through
infection of devices from which clients remotely
manage accounts. Of course, many banks have
introduced transaction confirmation technologies
with one-time codes obtained, for example, through
SMS, but various social engineering methods are
actively used to lure these codes from customers.
Fraud using social engineering methods is gaining
momentum, mainly used to lure people into their
payment card data and one-time transaction
confirmation codes. Initial ringing is usually done
programmatically.
There are also internal threats, these are abuses by
employees of the financial organization itself.
The elements of the information security system
in banks can be divided into two categories:
protection of the perimeter of the organization's
computer network and protection of internal hosts.
Perimetre protective equipment included:
firewall systems;
attack detection/prevention systems;
DLP system modules for mail and web traffic
control;
content filtering systems when employees of
the organization access the Internet;
antivirus tools on the mail server and Internet
access proxy server and a number of other
tools.
Host Protection Uses:
antivirus tools;
Personal firewall systems;
system host modules - Intrusion Detection
Systems and Intrusion Prevention Systems;
-DLP System Host Modules (Data Loss
Prevention) - as protection against accidental
data leaks;
means of controlling employee's use of
peripheral devices, primarily USB drives.
Many endpoint security solutions have begun to
combine a significant portion of the listed
functionality.
Now, more and more often in the perimeter and in
the host part began to add protection against targeted
attacks. These are attacks aimed at specific banking
organizations. They are not massive and prepare for a
long time. Attackers study the information systems of
the attacked object, find out which software is used
for various purposes. The targets of the attack are
very limited by any scope or objectives of specific
information systems and/or people. Malicious
software is specifically developed for attack so that
standard antivirus and security tools used by the
object and sufficiently well studied by intruders
cannot detect a threat. Most often, these are zero-day
vulnerabilities and special communication algorithms
with the perpetrators/customers of the attack
(TAdviser, 2021).
Recently, as part of information security, software
developers have been paying attention to the
interaction of perimeter and host security tools to
increase the effectiveness of detecting and countering
modern cyberattacks.
Banks widely practice a process, systematic
approach based on the interconnection of managerial,
technological, legal, information. Business processes.
A specific security tool is a tool built into the bank's
general information security system. The following
processes are distinguished:
malware protection;
data leakage protection;
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security
82