Book Image

Hands-On Cybersecurity for Finance

By : Dr. Erdal Ozkaya, Milad Aslaner
Book Image

Hands-On Cybersecurity for Finance

By: Dr. Erdal Ozkaya, Milad Aslaner

Overview of this book

Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services. By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures.
Table of Contents (20 chapters)

Network models

Before diving deep into endpoint security, let's first understand the different network models that are available. As pointed out earlier, most organizations today will have a single trust network model but, throughout the last years, many organizations have started to move to dual trust and even zero-trust network models.

Single trust network model

The single trust network model is the most commonly used IT perimeter network model. It's based on the assumption that a number of firewalls can control the network from outside to the inside of the environment:

The problem with the single trust network boundary that many organizations use today is that it has very little protection against external threats...