SlideShare a Scribd company logo
1 of 1
ABSTRACT
Every organization in the world determines to keep a standard level of information
security measures to protect their information assets, since it lays the foundation for day today
business functions. Social engineering is one of the main information security concerns, since the
impact from such attacks are immeasurable. Internet banking systems consist of the most
lucrative information assets, which attackers look forward to steal by performing social
engineering attacks. Social, Human, Organizational, and Cultural are the main aspects of the
information security. Social engineering belongs to social aspects for the information security,
and therefore this study was conducted in order to understand the impact of social aspects on the
information security of internet banking in Seylan Bank PLC.
Based on the previous literature, a conceptual framework was developed to determine the
impact of social engineering on the information security of internet banking in Seylan Bank
PLC. The conceptual framework enabled to understand the behaviour of all variables determined
for the study.
The study was focused on the employees of Seylan Bank PLC and a close-ended
questionnaire, consisting of multiple choice and likert scale questions were used to collect
primary data from the sample of 338 employees in the bank. The study adopted the deductive
research approach with quantitative research methodologies. Descriptive statistics and
Correlation analysis methods were used as statistical tools to analyse primary data collected
through the questionnaire.
The results of the study reflected that social engineering threats and vulnerabilities of
internet banking have a significant and negative relationship with information security of internet
banking. Thus, the interpretations of the relationships were, if the bank increases the information
security measures in the internet banking service Social engineering threats and Vulnerabilities
of internet banking could be reduced. On the other hand, awareness of social engineering has a
significant positive relationship with the information security of internet banking system; i.e. the
improvements in the awareness of social engineering increase the security of internet banking.
Further analysis described that awareness of social engineering can be explained as the most
influential factor for the Information security of internet banking than Vulnerabilities and Social
engineering threats. Therefore, awareness of the social engineering is the key to protect
information assets from the social engineering attacks.

More Related Content

What's hot

ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEIAEME Publication
 
rpaper
rpaperrpaper
rpaperimu409
 
Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection AM Publications,India
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threatmilliemill
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentEditor IJCATR
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisSherif Zahran
 
Top 10 intrusion detection system papes
Top 10 intrusion detection system papesTop 10 intrusion detection system papes
Top 10 intrusion detection system papesIJNSA Journal
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
Taming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyTaming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyAnsgar Koene
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialistfernando_bruaj
 
Ethics of computer
Ethics of computerEthics of computer
Ethics of computerPrakash Ata
 
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET Journal
 

What's hot (20)

ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
 
rpaper
rpaperrpaper
rpaper
 
CV
CVCV
CV
 
Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection Study on Exploring Data Mining Techniques for Network Intrusion Detection
Study on Exploring Data Mining Techniques for Network Intrusion Detection
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-government
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive Analysis
 
Top 10 intrusion detection system papes
Top 10 intrusion detection system papesTop 10 intrusion detection system papes
Top 10 intrusion detection system papes
 
50 51
50 5150 51
50 51
 
Forensics
ForensicsForensics
Forensics
 
PhD project description English
PhD project description EnglishPhD project description English
PhD project description English
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
Taming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and PolicyTaming AI Engineering Ethics and Policy
Taming AI Engineering Ethics and Policy
 
Mary hankins fernando br ua
Mary hankins fernando br uaMary hankins fernando br ua
Mary hankins fernando br ua
 
Brua computer forensics specialist
Brua computer forensics specialistBrua computer forensics specialist
Brua computer forensics specialist
 
Cataluña mary hapkins
Cataluña mary hapkinsCataluña mary hapkins
Cataluña mary hapkins
 
Ethics of computer
Ethics of computerEthics of computer
Ethics of computer
 
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in Industries
 

Similar to Social Engineering Impacts on Banking Security

Is security model by dawit mekonnen
Is security model by dawit mekonnenIs security model by dawit mekonnen
Is security model by dawit mekonnenDawit Mekonnen
 
Application of Soft Systems Methodology (SSM) to develop Information Systems ...
Application of Soft Systems Methodology (SSM) to develop Information Systems ...Application of Soft Systems Methodology (SSM) to develop Information Systems ...
Application of Soft Systems Methodology (SSM) to develop Information Systems ...Dawit Mekonnen
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...IJNSA Journal
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...IJECEIAES
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Edwin A1 poster (2)
Edwin A1 poster (2)Edwin A1 poster (2)
Edwin A1 poster (2)Edwin Mmako
 
The Effects of Information and Communication Technology to the Growth and Dev...
The Effects of Information and Communication Technology to the Growth and Dev...The Effects of Information and Communication Technology to the Growth and Dev...
The Effects of Information and Communication Technology to the Growth and Dev...IOSR Journals
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizationsijtsrd
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docxrosemariebrayshaw
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
 
Feedback from Lee Smith-Dennis250320 1941You have produced .docx
Feedback from Lee Smith-Dennis250320 1941You have produced .docxFeedback from Lee Smith-Dennis250320 1941You have produced .docx
Feedback from Lee Smith-Dennis250320 1941You have produced .docxmglenn3
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALJoseph White MPA CPM
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...ijcsit
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...AIRCC Publishing Corporation
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...IJCNCJournal
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...IJCNCJournal
 

Similar to Social Engineering Impacts on Banking Security (20)

Is security model by dawit mekonnen
Is security model by dawit mekonnenIs security model by dawit mekonnen
Is security model by dawit mekonnen
 
Application of Soft Systems Methodology (SSM) to develop Information Systems ...
Application of Soft Systems Methodology (SSM) to develop Information Systems ...Application of Soft Systems Methodology (SSM) to develop Information Systems ...
Application of Soft Systems Methodology (SSM) to develop Information Systems ...
 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Edwin A1 poster (2)
Edwin A1 poster (2)Edwin A1 poster (2)
Edwin A1 poster (2)
 
The Effects of Information and Communication Technology to the Growth and Dev...
The Effects of Information and Communication Technology to the Growth and Dev...The Effects of Information and Communication Technology to the Growth and Dev...
The Effects of Information and Communication Technology to the Growth and Dev...
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docx
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
Feedback from Lee Smith-Dennis250320 1941You have produced .docx
Feedback from Lee Smith-Dennis250320 1941You have produced .docxFeedback from Lee Smith-Dennis250320 1941You have produced .docx
Feedback from Lee Smith-Dennis250320 1941You have produced .docx
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...Security Culture, Top Management, and Training on Security Effectiveness: A C...
Security Culture, Top Management, and Training on Security Effectiveness: A C...
 
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
SECURITY CULTURE, TOP MANAGEMENT, AND TRAINING ON SECURITY EFFECTIVENESS: A C...
 

Social Engineering Impacts on Banking Security

  • 1. ABSTRACT Every organization in the world determines to keep a standard level of information security measures to protect their information assets, since it lays the foundation for day today business functions. Social engineering is one of the main information security concerns, since the impact from such attacks are immeasurable. Internet banking systems consist of the most lucrative information assets, which attackers look forward to steal by performing social engineering attacks. Social, Human, Organizational, and Cultural are the main aspects of the information security. Social engineering belongs to social aspects for the information security, and therefore this study was conducted in order to understand the impact of social aspects on the information security of internet banking in Seylan Bank PLC. Based on the previous literature, a conceptual framework was developed to determine the impact of social engineering on the information security of internet banking in Seylan Bank PLC. The conceptual framework enabled to understand the behaviour of all variables determined for the study. The study was focused on the employees of Seylan Bank PLC and a close-ended questionnaire, consisting of multiple choice and likert scale questions were used to collect primary data from the sample of 338 employees in the bank. The study adopted the deductive research approach with quantitative research methodologies. Descriptive statistics and Correlation analysis methods were used as statistical tools to analyse primary data collected through the questionnaire. The results of the study reflected that social engineering threats and vulnerabilities of internet banking have a significant and negative relationship with information security of internet banking. Thus, the interpretations of the relationships were, if the bank increases the information security measures in the internet banking service Social engineering threats and Vulnerabilities of internet banking could be reduced. On the other hand, awareness of social engineering has a significant positive relationship with the information security of internet banking system; i.e. the improvements in the awareness of social engineering increase the security of internet banking. Further analysis described that awareness of social engineering can be explained as the most influential factor for the Information security of internet banking than Vulnerabilities and Social engineering threats. Therefore, awareness of the social engineering is the key to protect information assets from the social engineering attacks.