Information security in the banking sector is heavily controlled as banks store and manage their clients' private information. Information security has always been the responsibility of the information technology (IT) department in organizations. Banks have become a component of the internet and daily lives. Libyan banks facade limited cash due to the part up political circumstance since 2014, as a result of limited cash individuals incapable to get their salaries. To solve this problem, most of Libyan banks are set up online electronic installment arrangements to assist individuals in buying their day by day needs. However, Cyber-attacks increasing day by day, and this is the challenge facing by banking where data is critical. These incidents could be prevented by implementing adaptable countermeasures promptly and minimizing risk. In this paper, a framework is proposed to assess the information security issue in Libyan banks. The study aimed at the assessment of security strategy in Libyan banks to identify security gaps. To achieve the aim of this study data collected by interview information security staff to evaluate the current security strategy in Libyan banks.
Information security in the banking sector is heavily controlled as banks store and manage their clients' private information. Information security has always been the responsibility of the information technology (IT) department in organizations. Banks have become a component of the internet and daily lives. It is a real task to protect these bank procedures, systems from the attackers and minimize the security threats. With this Cyber-attacks increasing day by day, and this is the challenge facing by countries and organizations like banking where data is critical. These banks should be built networks using secure strategies to protect their components. However, the performance of the network is affected by applying security rules. Network security is an essential priority for protecting applications, data, and network resources. Applying resource isolation rules are very important to prevent any possible attack. This isolation can be achieved by applying the DMZ (Demilitarized Zone) design. A DMZ extremely enhances the security of a network. In this paper perimeter network security framework is proposed to the protection and minimize the cybersecurity issue that exists in Libyan banks effectively. General TermsSecurity is one of the most critical challenges of computer and communication networks. The network design should accomplish three security aims: confidentiality, integrity, and availability. Protecting a network that is connected to the internet is a big challenge. To establish a secure network a defense-in-depth strategy where security measures are placed in many layers that create an entire network, from the enduser to the Internet, will be essential. The network perimeter layer has historically been the focus of protecting a private network and is still essential for keeping intruders at bay and providing detection of possible intrusions [3]. A DMZ is a network added between a protected network and an external network to provide an additional layer of security. A DMZ is the front line of a network that protects the valuables resources from untrusted environments. It is an example of the principle of defense in depth [4].
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.