International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 67 | Issue 7 | Year 2019 | Article Id. IJETT-V67I7P215 | DOI : https://doi.org/10.14445/22315381/IJETT-V67I7P215

Necessity of Dedicated Vulnerability Analysis and Data Centre Patch Management Process in Banking Sector in India


Vivek Tirodkar, Dr. Sonali Patil

Citation :

Vivek Tirodkar, Dr. Sonali Patil, "Necessity of Dedicated Vulnerability Analysis and Data Centre Patch Management Process in Banking Sector in India," International Journal of Engineering Trends and Technology (IJETT), vol. 67, no. 7, pp. 79-84, 2019. Crossref, https://doi.org/10.14445/22315381/IJETT-V67I7P215

Abstract

IT industries and banking sectors are incomplete without data centre for their day to day business but the growing threat and attacks create security issues. To protect the data centre from this security threat, vulnerability analysis and data centre patch management must be an integral part of the infrastructure. Even though many banks have patching practices but can’t achieve compliance requirements of security because of the lack of dedicated process. This paper presents the necessity of dedicated vulnerability analysis and data centre patch management process in the banking sector, Role and responsibility of the dedicated team and process outline. The paper focuses on asset protection by scanning vulnerability and mitigating those vulnerabilities. Even though Vulnerability analysis and Data Centre patching are two separates process but they must require work in coordination and cyclic order to continuously protect data centre from new security threats and to achieve compliance requirements.

Keywords

BANK Security, BANK Asset Management, Vulnerability Analysis, Data Centre Patch Management, Information Security.

References

[1]“Reserve Bank of India Department of Banking Supervision,Central Office,Mumbai.“Guidelines on Information Security,Electronic Banking, Technology Risk Management and Cyber Frauds.”[Online].Available: https://rbidocs.rbi.org.in/rdocs/content/PDFs/GBS300411F.pdf.
[2]"Automated Patching for IT Security & Compliance."Automated Patching for IT Security & Compliance-BMC Software.[Online]. Available:http://www.bmcsoftware.in/guides/security-automated-patching.html.
[3]“Get Started with Windows Server Update Services (WSUS).”Get Started with Windows Server Update Services (WSUS)|Microsoft Docs. [Online]. Available: https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus.
[4]“Red Hat Customer Portal."How to Create a Local Repository for Updates-Red Hat Customer Portal.”[Online].Available: https://access.redhat.com/solutions/9892.
[5]“AIX Technology Level Update Strategies.”IBM-United States. June 08, 2010.[Online].Available: https://www.ibm.com/developerworks/aix/library/au-aixtlupdate/index.html.
[6]“Welcome to the Patching Documentation Center.”Solaris Patching Documentation Center|Oracle Technology Network|Oracle. [Online].Available: http://www.oracle.com/technetwork/systems/patches/solaris/index.html.
[7]“22 Patching Oracle Database.”Patching Oracle Database. January 20, 2012. [Online].Available: https://docs.oracle.com/cd/E17559_01/em.111/e16599/pat_sidb.htm.
[8]“Nessus Professional.”Tenable™.April 04,2018.[Online].Available:https://www.tenable.com/products/nessus/nessus-professional.

Time: 0.0013 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB