Modernizing Financial Technology Infrastructure, Enterprise Systems and Cybersecurity in the Digital Age

  IJCTT-book-cover
 
         
 
© 2024 by IJCTT Journal
Volume-72 Issue-7
Year of Publication : 2024
Authors : Jabin Geevarghese George
DOI :  10.14445/22312803/IJCTT-V72I7P101

How to Cite?

Jabin Geevarghese George, "Modernizing Financial Technology Infrastructure, Enterprise Systems and Cybersecurity in the Digital Age," International Journal of Computer Trends and Technology, vol. 72, no. 7, pp. 1-11, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I7P101

Abstract
The industry of financial technology, or FinTech has experienced significant changes in the last several years due to the progressive developments in information and communication technology and evolving legal framework. This paper examines the modernization of FinTech infrastructure, enterprise systems, and cybersecurity, emphasizing the integration of cloud computing, blockchain, artificial intelligence (AI), and machine learning. Modernization of infrastructure also refers to the use of cloud computing, blockchain, and many other new technologies, and the goals of their utilization are effectiveness and cost-saving. These technologies aim to enhance efficiency and reduce costs, reshaping enterprise systems and improving decision-making processes. Despite the significant technological advancement, cybersecurity is still a crucial issue since the enhancement of Financial Services through digitization leads to high risks of cybercrimes. The paper offers a definition of Fintech, reviews the current state of matters, defines the major Fintech trends, and analyses the major opportunities as well as the threats that exist in the Fintech industry today. In this paper, by reviewing relevant literature, describing the methodology, and discussing the results, the intention is to add knowledge to the current discussion about fintech developments and prospects in the financial sector.

Keywords
Financial technology, Fintech, Enterprise systems, Cybersecurity, Cloud computing, Blockchain, Artificial intelligence, Machine learning.

Reference

[1] Cyber Security Strategies, Tutorialspoint. [Online]. Available: https://www.tutorialspoint.com/information_security_cyber_law/cyber_security_strategies.htm
[2] Rutuja, The Importance of Cybersecurity in the Digital Age, Cybernx. [Online]. Available: https://www.cybernx.com/b-the-importance-of-cybersecurity-in-the-digital-age
[3] Big Data in Finance, Corporate Finance Institute. [Online]. Available: https://corporatefinanceinstitute.com/resources/data-science/big-data-in-finance/
[4] Matthew Finio, and Amanda Downie, What is Artificial Intelligence (AI) in Finance?, IBM, 2023. [Online]. Available: https://www.ibm.com/topics/artificial-intelligence-finance
[5] K.A. Aksenov, and N.V. Goncharova, Decision Support Systems: Manual for Higher Education Institutions, , Moscow: Publishing House, 2021.
[Publisher Link]
[6] R.K. Safiullin, Fundamentals of Automation and Process Automation: Textbook for Secondary Vocational Education, 2 nd ed., Moscow: Publishing House, 2023.
[Publisher Link]
[7] 5 Key Technologies in FinTech, Deloitte, 2018. [Online]. Available: https://www2.deloitte.com/th/en/pages/technology/articles/5-key-technologies-in-fintech.html
[8] Muhammad Aamir et al., “Machine Learning Classification of Port Scanning and DDoS Attacks: A Comparative Analysis,” Mehran University Research Journal of Engineering and Technology, vol. 40, no. 1, pp. 215–229, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Muhammad Aamir, and Syed Mustafa Ali Zaidi, “DDos Attack Detection with Feature Engineering and Machine Learning: The Framework and Performance Evaluation,” International Journal of Information Security, vol. 18, pp. 761–785, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Uttam Adhikari, Thomas H. Morris, and Shengyi Pan, “Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification,” IEEE Transactions on Smart Grid, vol. 9, no. 5, pp. 4049–4060, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Nuno Oliveira et al., “Intelligent Cyber Attack Detection and Classification for Network-Based Intrusion Detection Systems,” Applied Sciences, vol. 11, no. 4, pp. 1-21, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Didier Sornette, Thomas Maillart, and Wolfgang Kröger, “Exploring the Limits of Safety Analysis in Complex Technological Systems,” International Journal of Disaster Risk Reduction, vol. 6, pp. 59–66, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Jason R.C. Nurse et al., “The Data that Drives Cyber Insurance: A Study into the Underwriting and Claims Processes,” 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, pp. 1-8, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Branka Stojanović, Katharina Hofer-Schmitz, and Ulrike Kleb, “APT Datasets and Attack Modeling for Automated Detection Methods: A Review,” Computers & Security, vol. 92, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Ayman El Aassal et al., “An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs,” IEEE Access, vol. 8, pp. 22170–22192, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Nelson Novaes Neto et al., “Developing a Global Data Breach Database and the Challenges Encountered,” ACM Journal of Data and Information Quality, vol. 13, no. 1, pp. 1-33, 2021.
[CrossRef] [Google Scholar] [Publisher Link]