Académique Documents
Professionnel Documents
Culture Documents
There are both State and Non-State actors who want to hack banks.
v Second Hack Internal Systems Hackers pick out encrypted passwords from
network traffic and can decrypt them with fast GPU based crackers.
v Third Steal or Encrypt Internal Information This is easy once they are in and
have access to the internal systems from steps 1 and 2.
Step 1 simply cant be secured against Even if all employees are being careful,
there are always zero day exploits. In the last 20 years, a day hasnt dawned
when Windows or other systems never had an exploitable bug, nor will it.
v Most important restricting access on a need to know basis and time restricted,
based on intents. This is what LoginCat SmartFirewall does.
Standards Supported