Financial CyberSecurity
Cybersecurity for financial institutions
We offer consulting service where we identify cybersecurity vulnerabilities and provide solutions. In addition, we can train your staff, help you build cryptography groups in your own companies. and keep you up to date on recent developments.Â
Contact: info@risat.org
Services
RISAT provides service and consulting in the following areas:
cybersecurity for financial institutions (banks, government agencies)
consulting on crypto currencies
Security of communications systems for military and naval systems (this includes merchant vessels)
data securityÂ
strategic planning on cybersecurityÂ
Consulting
Just because you have a successful business it doesn't mean that you are safe. Electronic theft is today the single biggest concern of any financial institution. In addition, data security, crypto currencies risk, and many other security issues make today's cyber world a very dangerous place. Most of the time companies do not understand how vulnerable they are or how to fix the cybersecurity issues.
Courses
We offer courses for students and young professionals who want to specialize on financial cybersecurity. Â
FCS 475: Foundations of Cryptography
FCS 511: Financial Cryptography
FCS 531: Modern Cryptography
FCS 541: Blockchains
FCS 542: Crypto currencies
FCS 535: Post-quantum financial security
FCS 475: Foundations of Cryptography
Classical cryptosystems
Introduction, Affine ciphers, Shift ciphers, Block ciphersÂ
Advanced Encryption StandardÂ
The overall structure of the AES
 Hash functions and Message Authentication Codes
Different ways to use hashing for message authentication
Cryptographically secure hash functions
Hash functions for computing Message Authentication Codes
 Public key cryptography
Discrete Log Problem
Introduction to the discrete log problem
The Massey-Omura cryptosystem for message transmission
The ElGamal cryptosystem
RSA
Encrypting via RSA, Encrypting function
How good is RSA?
 ECC: Elliptic Curve Cryptography
Introduction to elliptic curves, Elliptic curves over finite fields
ECC
Hyperelliptic Curve Cryptography
Quantum computers and their impact on cryptography
FCS 511: Financial Cryptography
Protocols and Theory
E-Cash, Â
Auctions, Â
Electronic Voting, Â
Nonrepudiation, Â
Fair Exchange, Â
Broadcast and Content Distribution,Â
Systems, Device, Banking, and Commerce
Micropayment Systems, Â
Digital Rights Management, Â
Trusted Computing, Â
Hardware Security Modules, Â
Portfolio Trading, Â
Risk, Threats, Countermeasures, and Trust
Phishing, Â
Anonymity and Privacy, Â
Digital Watermarking,Â
Identity Management, Â
Public Key Infrastructure, Â
Perspectives
Human Factors, Â
Legal Issues, Â
Regulatory Compliance