CISC 849 : Applications in Fintech Jin Gu Dept of Computer & Information Sciences University of Delaware Cyber-security & Finance.

Slides:



Advertisements
Similar presentations
Bug Fix of Mobile Terminal Software using Download OTA NTT DoCoMo, Inc. Multimedia Development Department Consumer Equipment Development Department 3-5.
Advertisements

Service Oriented Architecture for Mobile Applications Swarupsingh Baran University of North Carolina Charlotte.
OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
NSFdeposit.com Telephone Checks. NSFdeposit.com Telephone Checks New Automated On-line Payment System One time sign-up; intelligent engine Unique file.
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
Breaking Trust On The Internet
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
PYP002 Intro.to Computer Science Introduction to Networks1 Networks Chapter 17.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Chapter 12 Strategies for Managing the Technology Infrastructure.
Workshop on Cyber Infrastructure in Combustion Science April 19-20, 2006 Subrata Bhattacharjee and Christopher Paolini Mechanical.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Geoinfosys Technologies New Delhi 9 th February 2012 Development of ‘Geographical Information System’ (GIS) based “Decision Support System for Transport”
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols.
Jed Woodhouse, Ben Lovatt, Chris Turnock & Erik Bohemia Open ICT Boundaries.
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
A Study of Wireless Virtual Network Computing Kiran Erra.
TECHONOLOGY experts INDUSTRY Some of our clients Link Translation’s extensive experience includes translation for some of the world's largest and leading.
Dale Smith COSC 4010 Computer Security Authentication & Security in the.NET environment.
Dr. Rebhi S. Baraka Advanced Topics in Information Technology (SICT 4310) Department of Computer Science Faculty of Information Technology.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Resource Manager for Distance Education Systems Goran Kimovski Vladimir Trajkovik Danco Davcev Faculty of Electrical Engineering and Computer Science,
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
1 Java applications reverse engineering Antoni Bertel AUGUST 4, 2015.
ECI – electronic Commerce Infrastructure “ An application to the Shares Market ” Demetris Zeinalipour ( Melinos Kyriacou
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
Investigation on the Library Robot “Alice” in an enterprise Lin Yuan.
Jini Architectural Overview Li Ping
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Sarvajanik college of engineering and technology. Created by:- Keshvi Khambhati (co-m) Ria Bhatia (co-m) Meghavi Gandhi (co-m) Jarul Mehta(co-m) Topic.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware iCARE : A Framework for Big Data Based.
ARCH-04 Before You Begin Your Transformation Project… Phillip Magnay Architect – Applied Technology.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
CISC 849 : Applications in Fintech Vaishnavi Gandra Dept of Computer & Information Sciences University of Delaware Extracting Cybersecurity Related Linked.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
SOA-19: Combining the Power of Sonic ™, DataXtend ® Semantic Integrator, and Actional ® for SOA Operations Joining forces … Jiri De Jagere Senior Solution.
Web Services. Web Service: Simple definition : “ Service Offered On the Web “ Technically : “ A Web Service is a programmable application component that.
1 LM 6 Database Applications Dr. Lei Li. Learning Objectives Explain three components of a client-server system Describe differences between a 2-tiered.
Website Update and Use of Official accounts Dr.Lasantha Ranwala ( MBBS,MSc-Biomedical Informatics) Medical Officer - Health Informatics RDHS Office.
Saahithi Chillara Radhika Goyal ECE Fall Senior Design Project.
GROUPROCKET - Choose Collaboration Software for Your Company.
Jenny Knackmuß, Thomas Möller, Wilfried Pommerien & Reiner Creutzburg Brandenburg University of Applied Sciences, IT- and Media Forensics Lab, P.O.Box.
5G Wireless Technology.
Data and database administration
A Study of Wireless Virtual Network Computing
KrypC Technologies Accelerated Blockchain Adoption.
BY GAWARE S.R. DEPT.OF COMP.SCI
Introduction to Operating Systems
CyberPaths Interdisciplinary Modules
An N-tier web application
A mobile single sign-on system
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Web Information Systems Engineering (WISE)
CyberPaths Interdisciplinary Modules
Presentation transcript:

CISC 849 : Applications in Fintech Jin Gu Dept of Computer & Information Sciences University of Delaware Cyber-security & Finance

CISC 849 : Applications in Fintech Part-1 Prototyping a Computer-Based Simulation of the Finance Sector

CISC 849 : Applications in Fintech Part-1 1. build a FSM (financial sector model) prototype based on a tool, Web*DECIDE 2. The anticipate outcome: various dynamic models helpful with risk management

CISC 849 : Applications in Fintech Purpose of prototyping 1. enable a business to perform integrated risk management of cyber and physical threat 2. offer the capacity to simulate a business organization in relationship to a number of communities 3. Enable firms to map their system’s architectures within a secure environment.

CISC 849 : Applications in Fintech Major Components The major components of the prototype are: 1.Enterprises 2.Views 3.Equities Market 4.Transactions 5.Scenario 6.Injects 7.Simulation Engine

CISC 849 : Applications in Fintech Major Components

CISC 849 : Applications in Fintech Findings 1. Developing a simulation that affords direct and easy interface 2. Making it easy to maintain - ensuring the data that supports it is easily updated; 3. Ensuring that it meets a set of research and development priorities, as defined by sector officials.

CISC 849 : Applications in Fintech Doubt 1. No experiment 2. The seven components are set in the tool mentioned above in which way?

CISC 849 : Applications in Fintech Part-2 Cybersecurity in Banking and Financial Sector: Security Analysis of a Mobile Banking Application

CISC 849 : Applications in Fintech Introduction 1. the convenience of mobile banking is apparent 2. any information either stored or transmitted is encrypted. 3. Disassemble and analyze an existing banking application

CISC 849 : Applications in Fintech Existing works 1. About the attacks intercepting the data exchange between the end user and the bank 2. About the software attacks

CISC 849 : Applications in Fintech Existing works 3. Use the dynamic password (OTP) 4. Use of declarative security enhancement to HTTP protocol

CISC 849 : Applications in Fintech Experimental Security Analysis Chase Mobile banking application: 1. Data over the network 2. Code in the phone

CISC 849 : Applications in Fintech Network Communication Employ a network sniffer & study the application’s traffic.

CISC 849 : Applications in Fintech Network Communication

CISC 849 : Applications in Fintech Network Communication

CISC 849 : Applications in Fintech Network Communication

CISC 849 : Applications in Fintech Source Code Dex2jar: transform apk to jar

CISC 849 : Applications in Fintech Source Code JD-GUI: reverse the Java bytecode back to source

CISC 849 : Applications in Fintech Conclusion & Future Work 1. Have yet find any security issues in either network communication or its source code. (but not complete) 2. Investigation at the system level

CISC 849 : Applications in Fintech Thank you !