Securing Financial Applications from Inception: A Comprehensive Security Design Review

Mushad Aadil, Chris Ohanyan, Sabeen Tahir*, Linda Mohaisen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In today's ever-changing world of financial technology, safeguarding customer data is a top priority. This paper underscores the critical importance of a thorough security design review and offers a practical solution for integrating security measures right from the start of a project. It highlights the identification of key security objectives, a comprehensive vulnerability assessment, effective mitigation strategies, security-conscious API design and coding practices, data protection, user privacy considerations, and robust authentication and authorisation mechanisms. This paper serves as a practical guide for developers to craft cutting-edge financial applications that prioritise security, guaranteeing data integrity and earning customer confidence from the outset.

Original languageEnglish
Title of host publicationAI Applications in Cyber Security and Communication Networks - Proceedings of 9th International Conference on Cyber Security, Privacy in Communication Networks ICCS 2023
EditorsChaminda Hewage, Liqaa Nawaf, Nishtha Kesswani
PublisherSpringer Science and Business Media Deutschland GmbH
Pages521-535
Number of pages15
ISBN (Print)9789819739721
DOIs
Publication statusPublished - 18 Sept 2024
Event9th International Conference on Cyber Security, Privacy in Communication Networks, ICCS 2023 - Cardiff, United Kingdom
Duration: 9 Dec 202310 Dec 2023

Publication series

NameLecture Notes in Networks and Systems
Volume1032 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

Conference9th International Conference on Cyber Security, Privacy in Communication Networks, ICCS 2023
Country/TerritoryUnited Kingdom
CityCardiff
Period9/12/2310/12/23

Keywords

  • Financial applications
  • Security design review
  • Vulnerability assessment

Cite this