Question

The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of...

The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of several banks that are a part of the SWIFT network. The case is an example of the importance of information system controls. Explain some of the security risks associated with information systems as well as some security and control measures that can be implemented to protect against these security risks.

Hackers Attack the SWIFT Global Banking Network

SWIFT, which stands for Society for Worldwide Interbank Financial Telecommunication, is considered the Rolls-Royce of payment networks. It is a system used by more than 11,000 financial institutions worldwide to authorize payments from one account to another. SWIFT’s secure messaging system sends about 25 million messages on a typical day, including orders and confirmations for payments, securities settlements, and currency exchanges. Obviously, this is a very important system for global finance. If you receive a message from SWIFT, you can be sure it’s legitimate and move the money as expected.

SWIFT is a highly secure system, but apparently not secure enough. In early 2016 revelations surfaced about multiple attempts to use SWIFT messaging to rob financial institutions. Bangladesh’s central bank disclosed that in February 2016 it had lost $81 million to hackers who breached its security, accessed SWIFT, and tricked the Federal Reserve Bank of New York into sending funds it held for the bank to hacker-controlled accounts in the Philippines.

Each bank in the SWIFT network is identified by a set of codes. Hackers somehow managed to steal the Bangladesh bank’s credentials to transmit the messages and used malware targeting a PDF reader for checking statements. SWIFT’s core messaging system was not compromised. Security breaches occurred in the computers of individual institutions that interact with the system, and these computers remain the responsibility of individual SWIFT members. The hackers had access only to the compromised banks’ funds but not to the funds of the thousands of other institutions that use SWIFT. However, investigators have identified breaches at 12 other banks, including Vietnam’s Tien Phong Commercial Joint Stock Bank and Ecuador’s Banco del Austro.

How could this have happened? SWIFT isn’t regulated like a bank because it doesn’t hold funds or manage accounts. It’s overseen by the National Bank of Belgium and representatives from the U.S. Federal Reserve, the Bank of England, the European Central Bank, the Bank of Japan, and other major banks. Experts point out that the SWIFT system is based on flexibility and trust. A bank can choose to let employees open SWIFT’s main interface right from their desktop browser. That same feature that makes SWIFT easy to use also makes the system susceptible to hacking. Hackers apparently were able to obtain the banks’ SWIFT access codes, send authenticated but fraudulent requests to transfer funds, and cover their tracks with malware surreptitiously placed onto bank computer systems. These attacks showed a deep and sophisticated knowledge of specific controls at the targeted banks, which may have been acquired from insiders, cyberattacks, or both.

Most banks in the United States take special precautions with their SWIFT-linked computers, including multiple firewalls to isolate SWIFT from the bank’s other networks and even operating the machines in separate locked rooms. Unfortunately some banks in other countries take fewer precautions. The Bangladesh bank may have been especially vulnerable, using $10 routers and no firewalls, according to experts.

Security firms and intelligence agencies are still trying to learn who is behind the attacks. Symantec Corp, a leading security company, says the attacks resemble earlier hacking efforts attributed to North Korea.

SWIFT plans to toughen software requirements, expand the use of two-factor authentication (which provides additional identity checking), monitor compliance more rigorously, and provide more information about fraud detection. Ultimately, however, SWIFT can only do so much. The real solution must come from the participating banks themselves. And according to SWIFT CEO Gottfried Leibbrandt, fully armoring the network’s defenses is likely to take years.

The problems created by the $81 million theft resulting from break-ins to the SWIFT global banking network illustrate some of the reasons businesses need to pay special attention to information system security. The SWIFT system is a critical tool for global business. But from a security standpoint, as this case illustrates, the system was vulnerable to hackers who were able to access supposedly protected user authentication data.

The chapter-opening diagram calls attention to important points raised by this case and this chapter. The SWIFT system is flexible and easy to use and does not require the same high level of security among its participating institutions. Although major banks in the United States using the SWIFT network have strong information system security in place, the security used by other SWIFT network members for protecting global banking transactions was weak. Despite the strong security safeguards of the SWIFT network itself, criminals were able to break into the systems of SWIFT member banks and send false instructions over the SWIFT system to illicitly transfer funds to their accounts. SWIFT is now working with member institutions to upgrade their security, but it will take years before all participants in the network are fully protected.


0 0
Add a comment Improve this question Transcribed image text
Answer #1

Risk –
The major risk with the operation of SWIFT is that the privacy can be compromised as happened with Bangladesh. Hackers may get access to the network and crack the country’s bank code which can be eventually used to serve illegal purposes. SWIFT itself suggest banks to follow extra measures in order to secure the funds and the transactions.
Though SWIFT is one of the best payment gateways globally but the recent security breaches have put up a number of legitimate questions on the privacy. Hackers can get access to the funds of banks and transactions performed which is a serious threat to finance of any nation.
Solutions –
“Prevention is better than cure”, this statement is the only solution to this problem. US has taken extra measures by putting in the additional firewall security to protect the transactions and funds. Each and every bank/country should proceed like that. It was predicted that $10 router and no firewall security by Bangladesh was the major reason behind this security breach. Hence each and every organization should act in this manner to protect the data.
SWIFT itself suggests the organizations to use additional security measures for protection however SWIFT should also work on to strengthen the security of the network to avoid any further breaches.

Add a comment
Know the answer?
Add Answer to:
The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Read the attached article. Do you feel one style of banking control is more stable than...

    Read the attached article. Do you feel one style of banking control is more stable than the other? Why? Does one banking method minimize market volatility and risk better or is it just packaged differently? Do you feel the US (Western) Banking system can better control the patterns of behavior going forward that have caused economic damage in the past? Should the Fed continue its stimulus policy, reduce it or abandon it entirely (Google some recent articles to research this)?  (Please...

  • Peer Reviewer: Describe the problem in your own words. What is the scope? What is the...

    Peer Reviewer: Describe the problem in your own words. What is the scope? What is the severity? Is the problem statement objective? Explain why or why not. Describe the problem statement quality and provide one suggestion for improvement. How was the problem measured? Explain the derivation of the metric and the baseline and the unit of the metric. Make a comment on the quality of the metric used, providing one alternative or additional metric for the problem. List the factors...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of...

    CASE STUDY U.S. Office of Personnel Management Data Breach: No Routine Hack The U.S. Office of Personnel Management (OPM) is conducted, may have been extracted. Government offi responsible for recruiting and retaining a world-class cials say that the exposure of security clearance irn workforce to serve the American people and is also mation could pose a problem for years responsible for background investigations on pro- spective employees and security clearances. In June the OPM system, and its records were protected...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • please I need this, step by step with formulas, avoid using excel. CASE 33 Security Software,...

    please I need this, step by step with formulas, avoid using excel. CASE 33 Security Software, Inc. communication in a highly secure and efficient process. The Market Security Software, Inc. (SSI) was a major provider of application software. The firm was proud to be the number two company in the enterprise firewall market. Firewalls ensure network Security for businesses by determining whether to approve or deny access to corporate networks and applications. They have security software that inspects com- munication...

  • And there was a buy-sell arrangement which laid out the conditions under which either shareholder could...

    And there was a buy-sell arrangement which laid out the conditions under which either shareholder could buy out the other. Paul knew that this offer would strengthen his financial picture…but did he really want a partner?It was going to be a long night. read the case study above and answer this question what would you do if you were Paul with regards to financing, and why? ntroductloh Paul McTaggart sat at his desk. Behind him, the computer screen flickered with...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT