Fintech
Fintech
1 August 2019
FinTech
Abstract
With the continuous breakthroughs and growth in various areas of the
financial sector, FinTech has achieved a great deal of attention. Banks
and financial institutions are realizing the value-addition in adopting /
adapting the fintech innovations for mutual and customer benefits.
However, plenty of challenges exist – due to the intersection of two
different fields, complex integrated systems, and expanded
expectations. Thus, having the latest knowledge of FinTech is
imperative for academicians as well as banking professionals and
practitioners. In this article, we present a detailed discussion on few of
the advanced data-oriented and machine learning based technologies.
1. Introduction
A relatively new industry in India, the Financial Technology (FinTech)
industry primarily deals with a wide range of applications of
information technology in the finance and banking sector. Few areas
where new research ideas are successfully being applied to improve
the quality of banking services include mobile networks [1-3], trust
management [4-6], cloud computing [7-9], big data [10-12], image
processing [13-15], and data analytics [16-18, 32]. Due to various
developments in technologies, increasing expectations of business
innovations, the requirement for affordable solutions, and growing
customer demand – FinTechs are seeing investments from global
financial firms [19]. The growing trend of investment in FinTech in the
recent five years is depicted in Figure 1. Figure 1(a) shows the global
trend and the trend of investment in India is shown in Figure 1(b).
2
FinTech
3
IDRBT Staff Paper Series
4
FinTech
come under the first category are about the processing or modeling
of large volume of data that impact quantitative finance. The
techniques that belong to the latter class are more centered on the
goal of retrieving more information from the financial and banking
data in large volumes.
5
IDRBT Staff Paper Series
In this article, we will first discuss data analytics and big data
processing tools and techniques in more detail in the succeeding
section. In addition, we will also discuss few applications, such as
intelligent micro conversations, robo-advisors, credit risk assessment,
6
FinTech
Using the allegory of a blind man and a giant elephant, the author
presented the main issue of localized view of the whole data, as
shown in Figure 4. This problem is faced by the big data practitioners,
since a localized view only provides a partial analytical result, which
might be different from the nature of actual inference that could be
drawn if the data is processed on the whole.
Fig. 4: The limited view of each blind man leads to a biased conclusion [21].
7
IDRBT Staff Paper Series
8
FinTech
9
IDRBT Staff Paper Series
10
FinTech
11
IDRBT Staff Paper Series
Method 1 – Cleaning:
12
FinTech
13
IDRBT Staff Paper Series
Fig. 8(c): Example sentence before and after Stemming and Lemmatization
14
FinTech
15
IDRBT Staff Paper Series
16
FinTech
17
IDRBT Staff Paper Series
3.2. Robo-Advisor
18
FinTech
The credit risk is defined as the risk associated with a loan application
that may emerge if the applicant fails to pay the loan amount. The
calculation of the credit risk for a borrower is very crucial for a bank
before taking the decision to accept or reject a loan application. The
measure, which is used for such creditworthiness of one borrower, is
called as credit score.
19
IDRBT Staff Paper Series
20
FinTech
21
IDRBT Staff Paper Series
Figure 12, few examples of biometrics data are shown, which can be
easily extracted from a mobile phone. Refer [71] for more details.
22
FinTech
Conclusion
In this article, we presented a detailed discussion on few of the
advanced data oriented and machine learning based technologies. We
discussed few important concepts of big data analytics as well as a set
of popular use-cases where the AI and machine learning based
techniques are being applied to produce better as well as smarter
customer services and financial solutions. We also discussed a few
open problems, which might help in designing improved technologies.
References
1. Qiu, M., Gai, K., Thuraisingham, B., Tao, L., & Zhao, H.
Proactive user-centric secure data scheme using attribute-
based semantic access controls for mobile clouds in the
financial industry. Future Generation Computer Systems. 80,
421-429, 2018
2. Wang, Y., Wen, S., Xiang, Y., & Zhou, W. Modeling the
propagation of worms in networks: A survey. IEEE
Communications Surveys & Tutorials, 16(2), 942-960, 2014
3. Panwar, N., Sharma, S., & Singh, A. K. A survey on 5G: The next
generation of mobile communication. Physical
Communication, 18, 64-84, 2016
4. Zhang, Q., Yang, L. T., & Chen, Z. Privacy-preserving deep
computation model on the cloud for big data feature learning.
IEEE Transactions on Computers, 65(5), 1351-1362, 2016
5. Li, P., Li, J., Huang, Z., Li, T., Gao, C. Z., Yiu, S. M., & Chen, K.
Multi-key privacy-preserving deep learning in cloud
computing. Future Generation Computer Systems. 74, 76-85,
2017
6. Anjum, A., Sporny, M., & Sill, A. Blockchain standards for
compliance and trust. IEEE Cloud Computing. 4(4), 84-90,
2017
7. Gai, K., Qiu, L., Chen, M., Zhao, H., & Qiu, M. SA-EAST:
security-aware efficient data transmission for ITS in mobile
heterogeneous cloud computing. ACM Transactions on
Embedded Computing Systems (TECS), 16(2), 60, 2017
8. Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. Intelligent
cryptography approach for secure distributed big data storage
in cloud computing. Information Sciences. 387, 103-115, 2017
23
IDRBT Staff Paper Series
9. Gai, K., Qiu, M., & Zhao, H. Energy-aware task assignment for
mobile cyber-enabled applications in heterogeneous cloud
computing. Journal of Parallel & Distributed Computing. 111,
126-135, 2018
10. Lei, Y., Jia, F., Lin, J., Xing, S., & Ding, S. X. An intelligent fault
diagnosis method using unsupervised feature learning
towards mechanical big data. IEEE Transactions on Industrial
Electronics. 63(5), 3137-3147, 2016
11. Yin, S., & Kaynak, O. Big data for modern industry: challenges
and trends [point of view]. Proceedings of the IEEE, 103(2),
143-146, 2015
12. Genuer, R., Poggi, J. M., Tuleau-Malot, C., & Villa-Vialaneix, N.
Random forests for big data. Big Data Research. 9, 28-46, 2017
13. Castiglione, A., De Santis, A., & Soriente, C. Taking advantages
of a disadvantage: Digital forensics and steganography using
document metadata. Journal of Systems and Software. 80(5),
750-764, 2007
14. Raghavan, S. Digital forensic research: current state of the art.
CSI Transactions on ICT. 1(1), 91-114, 2013
15. Guo, Q., Zhang, C., Zhang, Y., & Liu, H. An efficient SVD-based
method for image denoising. IEEE Transactions on Circuits and
Systems for Video Technology. 26(5), 868-880, 2016
16. Chen, H., Chiang, R. H., & Storey, V. C. Business intelligence
and analytics: from big data to big impact. MIS quarterly,
1165-1188, 2012
17. Vasarhelyi, M. A., Kogan, A., & Tuttle, B. M. Big Data in
accounting: An overview. Accounting Horizons. 29(2), 381-
396, 2015
18. Lv, Y., Duan, Y., Kang, W., Li, Z., & Wang, F. Y. Traffic flow
prediction with big data: A deep learning approach. IEEE
Trans. Intelligent Transportation Systems, 16(2), 865-873,
2015
19. Wigglesworth, R. Fintech: Search for a super-algo, URL =
https://www.ft.com/content/5eb91614-bee5-11e5-846f-
79b0e3d20eaf, January 2016
20. https://rbidocs.rbi.org.in/rdocs/PublicationReport/Pdfs/WG
FR68AA1890D7334D8F8F72CC2399A27F4A.PDF
21. Wu, X., Zhu, X., Wu, G. Q., & Ding, W. Data mining with big
data. IEEE transactions on knowledge and data engineering.
26(1), 97-107, 2014
24
FinTech
22. Sun, Y., Shi, Y., & Zhang, Z. Finance Big Data: Management,
Analysis, and Applications, 2019
23. Shi, X., Zhang, P., & Khan, S. U. Quantitative Data Analysis in
Finance. In Handbook of Big Data Technologies. pp. 719-753,
Springer, Cham, 2017
24. Zhang, P., Yu, K., Jessica, J. Y., & Khan, S. U. QuantCloud: big
data infrastructure for quantitative finance on the cloud. IEEE
Transactions on Big Data. 4(3), 368-380, 2018
25. Zhao, G., Qian, X., Lei, X., & Mei, T. Service quality evaluation
by exploring social users’ contextual information. IEEE
Transactions on Knowledge and Data Engineering. 28(12),
3382-3394, 2016
26. Jiang, S., Qian, X., Mei, T., & Fu, Y. Personalized travel
sequence recommendation on multi-source big social media.
IEEE Transactions on Big Data. 2(1), 43-56, 2016
27. Cao, M., Chychyla, R., Stewart, T., 2015. Big data analytics in
financial statement audits. Account. Horiz. 29(2), 423–429
28. Dal Pozzolo, A., Boracchi, G., Caelen, O., Alippi, C., &
Bontempi, G. Credit card fraud detection: A realistic modeling
and a novel learning strategy. IEEE transactions on neural
networks and learning systems. 29(8), 3784-3797, 2018
29. Carcillo, F., Dal Pozzolo, A., Le Borgne, Y. A., Caelen, O.,
Mazzer, Y., & Bontempi, G. SCARFF: A scalable framework for
streaming credit card fraud detection with Spark. Information
fusion. 41, 182-194, 2018
30. Min, W., Tang, Z., Zhu, M., Dai, Y., Wei, Y., & Zhang, R.
Behavior Language Processing with Graph-based Feature
Generation for Fraud Detection in Online Lending. Workshop
on MIS2: Misinformation and Misbehavior Mining on the
Web, USA, 2018
31. Ying, W., Ray, P., & Lewis, L. A methodology for creating
ontology-based multi-agent systems with an experiment in
financial application development. 46th Hawaii International
Conference on System Sciences (HICSS). pp. 3397-3406,
January 2013
32. Chen, C. P., & Zhang, C. Y. (2014). Data-intensive applications,
challenges, techniques and technologies: A survey on Big
Data. Information Sciences, 275, 314-347
33. Xu, K., Yue, H., Guo, L., Guo, Y., & Fang, Y. Privacy-preserving
machine learning algorithms for big data systems. IEEE 35th
25
IDRBT Staff Paper Series
26
FinTech
27
IDRBT Staff Paper Series
58. https://medium.com/@athif.shaffy/one-hot-encoding-of-
text-b69124bef0a7
59. J. Xue, E. Zhu, Q. Liu and J. Yin. Group Recommendation Based
on Financial Social Network for Robo-Advisor. IEEE Access,
Vol. 6, pp. 54527-54535, 2018
60. Ravi V, et al. Analytics. http://www.idrbt.ac.in/assets/
publications/Staff%20Papers/Analytics.pdf, 3(2), December
2017
61. Moody’s Analytics
62. Kuo Wang, Ajay Kumar. Cross-spectral iris recognition using
CNN and supervised discrete hashing. Pattern Recognition.
Vol. 86, pp. 85-98, ISSN 0031-3203,
https://doi.org/10.1016/j.patcog.2018.08.010, 2019
63. Nguyen, K., Fookes, C., Ross, A., & Sridharan, S. Iris recognition
with off-the-shelf CNN features: A deep learning perspective.
IEEE Access, 6, 18848-18855, 2017
64. Liu, N., Zhang, M., Li, H., Sun, Z., & Tan, T. Deep Iris: Learning
pairwise filter bank for heterogeneous iris verification.
Pattern Recognition Letters, 82, 154-161, 2016
65. Q. Zhang, H. Li, Z. Sun and T. Tan. Deep Feature Fusion for Iris
and Periocular Biometrics on Mobile Devices. IEEE
Transactions on Information Forensics and Security, 13(11),
pp. 2897-2912, doi: 10.1109/TIFS.2018.2833033, November
2018
66. Shuping Zhao, Bob Zhang, C.L. Philip Chen. Joint deep
convolutional feature representation for hyperspectral
palmprint recognition. Information Sciences, Vol. 489, pp.
167-181, ISSN 0020-0255,
https://doi.org/10.1016/j.ins.2019.03.027, 2019
67. Sundararajan, K., & Woodard, D. L. Deep learning for
biometrics: a survey. ACM Computing Surveys (CSUR), 51(3),
65, 2018
68. Sun, X., Zhang, P., Liu, J. K., Yu, J., & Xie, W. Private machine
learning classification based on fully homomorphic
encryption. IEEE Transactions on Emerging Topics in
Computing, 2018
69. Bost, R., Popa, R. A., Tu, S., & Goldwasser, S. Machine learning
classification over encrypted data. In NDSS, Vol. 4324, pp.
4325, February 2015
28
FinTech
29
Recent Advances in Blockchain Technology
Abstract
Blockchain technology is widely regarded as a disruptive technology
capable of changing the very fabric of the way we connect and
interact. Naturally, there has been a lot of effort dedicated to leverage
the benefits of blockchain technology. Despite all the efforts, the
technology is still in a nascent stage with a lot of refinements and fine-
tuning still possible. In this article, we will explore some of the recent
advances in blockchain technology.
31
IDRBT Staff Paper Series
32
FinTech
33
IDRBT Staff Paper Series
34
FinTech
35
IDRBT Staff Paper Series
36
FinTech
Fault Tolerance
37
IDRBT Staff Paper Series
Reconciliation Overhead
38
FinTech
The linked list data structure forms the core of blockchain technology.
Though a simple data structure is sufficient to provide necessary
functions, there are some innovations at data structure level
described as below:
39
IDRBT Staff Paper Series
a directed acyclic graph. This new DLT has been adopted in the Swirlds
platform where the consensus protocols are different from the
blockchain based consensus. Hashgraph uses virtual voting consensus
mechanism, which as of now is not compatible with any other existing
blockchain platforms like Hyperledger Fabric, and Multichain.
40
FinTech
3.3. Security
41
IDRBT Staff Paper Series
Indistinguishability Obfuscation
42
FinTech
43
IDRBT Staff Paper Series
44
FinTech
4.1. Finance
Blockchain as a Service
Enterprises like IBM, Oracle, and Microsoft, etc. have already started
offering Blockchain-as-a–Service, thereby enabling enterprises to be
involved with the technology without risking a high investment cost
that would go into in-house blockchain development.
45
IDRBT Staff Paper Series
Asset Tokenization
IoT Inclusion
The decentralized market has found several use cases for merging IoT
with blockchain based applications. The fact that passing data with
utmost security lies at the core of blockchain technology fits almost
naturally with the mechanism of IoT that drives on connecting devices
and transferring information between one platform to another.
Blockchains Interoperability
46
FinTech
Energy Industry
AI-driven Trading
AI-Entertainment
Verifying the authenticity of the drugs, which are returned from the
retailers and the wholesalers to the industry is very much needed as
these return drugs itself, constitute 2-3 percent of sales costing
47
IDRBT Staff Paper Series
48
FinTech
4.4. Insurance
Enhance efficiencies
The insured and the insurer each currently have issues that blockchain
and smart contracts could solve. Insured individuals typically find
insurance contracts long and confusing while the insurance
companies are battling an extraordinary amount of fraud. Through
blockchain and smart contracts, both parties would benefit from
managing claims in a responsive and transparent way. It would start
by recording and verifying contracts on the blockchain. When a claim
is submitted, the blockchain could ensure that only valid claims are
paid. The network would know if there were multiple claims
submitted for the same accident. When certain criteria are met, a
blockchain could trigger payment of the claim without any human
intervention, therefore improving the speed of resolution for claims.
49
IDRBT Staff Paper Series
50
FinTech
4.6. Governance
Cross-border Transactions
Any government would strive for the betterment of its economy.
Since trading is a major source of economy, it would be helpful to have
digital platforms that enable hassle free cross-border trading. Having
blockchain enabled cross-border transaction would make the trading
free and more transparent. Many governments have taken initial
steps to take the make progress in this direction.
Education
Some of the use cases where blockchain can be used in education
domain are:
51
IDRBT Staff Paper Series
52
FinTech
5. Conclusion
Blockchain technology has a great potential to revolutionize the way
we conduct business. However, several factors are creating
roadblocks for successful implementation of this technology in
practice. There has been good progress in solving many important
challenges for adopting blockchains for business. FinTechs have been
actively contributing to the development of this technology both
through the innovations in the core aspects itself and through its
application to innovative use cases.
References
1. K. Sultan, U. Ruhi, R. - Lakhani (Eds.). Conceptualizing
blockchain: characteristics & applications, 11th IADIS
International Conference Information Systems. pp. 49–57,
2018
2. V. Costan and S. Devadas. Intel SGX explained. Cryptology
ePrint Archive, Report 2016/086. 2016, http://eprint.iacr.org/
3. Digital Asset. The Digital Asset Platform – Non-technical White
Paper, 2016. Available at https://digitalasset.com/press/
digital-asset-releases-non-technical-white-paper.html.
4. Dr. Leemon Baird, Mance Harmon, and Paul Madsen. Hedera:
A Public Hashgraph Network & Governing Council. White
Paper v.1.5, 2019
5. Dean Demellweek. Blockchain-based Zero Knowledge Proof
solution (Link). July 2017
6. Koens, T., Ramaekers, C., & van Wijk, C. Efficient Zero-
Knowledge Range Proofs in Ethereum. November 16, 2017.
Retrieved from https://www.ingwb.com/media/2122048/
zeroknowledge-range-proof-whitepaper.pdf
7. Christian Reitwiessner. zkSNARKs in a nutshell (Link).
December 5, 2016
8. Raghav Bharadwaj. AI in Blockchain – Current Applications
and Trends (Link). May 19, 2019
9. Inmediate.io. The Potential Of Blockchain Technology In The
Insurance Industry (Link). November 8 2018
53
IDRBT Staff Paper Series
* The contribution made by Shri. Ravi Kanth Kotha, Research Fellow, IDRBT
is gratefully acknowledged.
54
Emerging Security Solutions
- Dr. V. Radha,
Associate Professor, IDRBT
IDRBT Staff Paper Series
Abstract
The two major factors that are driving new security offerings in the
BFSI are: 1. Regulatory requirements and 2. Increase in targeted
attacks. Since targeted attacks need targeted defence, new solutions
must be adapted. This paper describes the latest trends in the
prevention of cyber-attacks.
1. Introduction
Cyber security is a major concern for any business and especially the
banking and financial sector. As the financial sector deals with the
business of money apart from critical data, it is a jackpot for the
hackers. The age-old security solutions to protect the data may not
be sufficient, as hackers continuously upgrade their tactics. With the
changing threat landscape, even businesses need to update their
security strategies. In this paper, we discuss a few solutions for cyber
security, which benefits the financial sector.
56
FinTech
Data loss is one of the biggest threats to the financial sector and in
most cases, it is due to malicious insiders.
57
IDRBT Staff Paper Series
58
FinTech
The network DLP solutions can stop data leakage that may happen
through an organization’s network communications like web
applications, email and FTP. Typically, the network DLP solution
monitors the traffic and prevents data loss regardless of the port or
protocol; it can also encrypt certain content like card data before
transmitting; it can notify both the users and admin when the
network traffic violates the policies present.
The key features one should look from while choosing a network DLP
includes: automatically blocking or warning users if an activity looks
risky, encrypting all the data that is leaving the organization, logging
everything for further incident response and forensic analysis.
The storage DLP allows one to classify the users and confidential files
(tag/label); then gives access permission as per label to the groups of
employees. Hence, it is possible to find out the sensitive points and
prevent data leakage. This is a good solution for data stored on
premise as well as in the cloud.
The key features one should look for while choosing a Storage DLP
includes: integrating with existing cloud storages to prevent sensitive
59
IDRBT Staff Paper Series
data leak, scan the data uploaded and continuously audit existing
data.
In the initial days, disks and in the recent times, pen drives are the
external devices or tools, which is the reason for leaks from PC based
systems, laptops, tablets, etc. They may be practically very fast in
transferring files and data, but they put the organizations’ security at
risk and become one of the prime reasons for intentional or
accidental data leakage.
In this case, the solution has central management that controls rules
applied on the client side devices. (The agents are installed in the
client side machine and then managed centrally). In these solutions,
copy and paste options, screenshot grabbing options are disabled.
The key features one should look for while choosing an endpoint DLP
includes: automatic logging and warning when an external device is
connected.
60
FinTech
Table 1:
Solution Capabilities Autonomous Cloud Remarks
features compatible
61
IDRBT Staff Paper Series
prioritizes
data
Digital Data “” “” Can be on
Guardian management premise,
+ tracking + cloud or
encryption hybrid
Check Data loss “” “” Overly simple
Point DLP education to use
and
remediation
3 Deception Technologies
Usually in cyber security, the attackers have an advantage of
succeeding with just one attack and with an in-depth knowledge of
few vulnerabilities, but the defenders have to be more aware of all
vulnerabilities, platforms, networks, etc. to defend against the
attackers.
Definition:
62
FinTech
• Deception reduces the dwell time and mean time to detect and
remediate
• By engaging the attacker, it provides insight into forensics of
adversary intelligence including indicators of compromise (IOCs)
and tactics, techniques, and procedures (TTPs)
• If we suspect that an attack may happen then we can
automatically add few more decoys around our critical assets or
simply reset the attack surface, so that we can up the complexity
for an adversary
• Deception technology is capable of finding attacks like advanced
persistent threats (APT’s) and Zero Day Events that the endpoint
protection systems deployed failed to stop
63
IDRBT Staff Paper Series
64
FinTech
Source: https://www.wwt.com/all-blog/deception-technology/
65
IDRBT Staff Paper Series
• Logging must be done for all packets going and coming from a
honeypot system
• To analyse the attacks, a protocol analyser must be used
• Whenever there is heavy traffic from honeypots, we can utilize
the firewall notification feature to send alerts to us, so that
proper logging and monitoring can be done
• To watch external cyber-attacks to our network, the best way is
to place honeypots outside the network and towards the
internet.
66
FinTech
Table 2:
Company Year
Rapid7 2000
LogRhythm 2003
ForeScout 2000
Shape Security 2011
Attivo Networks 2015
Acalvio Technologies 2015
67
IDRBT Staff Paper Series
4 Application Whitelisting
Application Whitelisting (AWL) is a realistic practice of ensuring only
permitted programs and software libraries to be present and active,
while others are prevented from execution. It mainly focuses on
protecting computers and networks from potentially harmful
applications. In direct opposition to the concept of Blacklisting,
Application Whitelisting is a more proactive approach that allows
only pre-approved and specified programs to run.
68
FinTech
69
IDRBT Staff Paper Series
Advantages
Disadvantages
70
FinTech
Precautions
71
IDRBT Staff Paper Series
72
FinTech
These solutions are motivated from sayings like “Think like a hacker
to break and put controls safeguard”. “It’s time to play the hacker.
Complement existing reactive and defensive security with offensive
tactics. Think and act like a hacker to gain a better understanding of
how exactly you will be breached.”
73
IDRBT Staff Paper Series
74
FinTech
Source: https://blog.centrify.com/best-practices-zero-trust-security/
The zero trust models work on the principle that it moves access
control mechanisms from perimeter of network to actual devices,
systems and users. A centralized policy (policy engine) verifies the
identity of user and validates his device before granting access
permissions, but it smartly limits the access permissions and
privileges one can have on the target system.
The following are the three operational objectives that define zero
trust implementation:
75
IDRBT Staff Paper Series
76
FinTech
7 Threat Intelligence
Traditionally, security teams use a variety of tools and techniques to
conduct threat analysis, incident response and organization network
defense. Information sharing between the security team and other
teams is usually a manual or a ticketing system. Changing attacking
methodologies demand upgrading the knowledge of the security
team. Threat intelligence fastens this process and benefits the
organization with latest threat information. Threat intelligence, also
called as cyber threat intelligence, is the analyzed (both internal and
external threats), refined and organized information about potential
or current attacks, that threaten an organization. The threat
intelligence can be gathered against many threats, like:
• Zero day threats: It is a computer-software vulnerability, which
is unaddressed by the ones responsible for addressing the (patch
management team, security testers). From the name of the
threat, it is clear that software is vulnerable since the day of
release.
77
IDRBT Staff Paper Series
• Exploits: Once the attacker finds a way into the network, his
motive is to take control of the entire network/system and
exploit it.
• APT (Advanced Persistent Threats): Sometimes the attacker’s
motive might not be to destroy the network/system; his aim
would be to remain in the network unnoticed and rob all the
possible information.
Source: https://www.crest-approved.org/wp-content/uploads/CREST-Cyber-Threat-
Intelligence.pdf
78
FinTech
As the name suggests, they are threat intelligence data/IOC that can
be fed to the security devices like Security information and event
management (SIEM).
For these feeds, the organization must assess itself, i.e., depending
on the organization’s domain. There are different kinds of feeds and
they can be combined based on the purpose and requirement.
Threat data is gathered from human intelligence, signal intelligence,
open source intelligence, geospatial intelligence, financial
intelligence, market intelligence and tech intelligence in real-time.
79
IDRBT Staff Paper Series
Source: https://www.cm-alliance.com/cybersecurity-blog/importance-of-threat-
intelligence-feeds
Table 3:
Public Threat Intelligence Private Threat Intelligence
80
FinTech
Source: https://www.anomali.com/resources/what-is-a-tip
TIP capabilities
81
IDRBT Staff Paper Series
8 Conclusion
In this paper, we tried to provide an overview on six emerging
solutions for cyber security, namely: 1. DLP-Data Leakage
Prevention, 2. Deception Technologies, 3. AWL – Application
Whitelisting, 4. Continuous Security Validation, 5. Zero Networks;
and 6. Threat Intelligence Solutions.
References
1. https://www.ey.com/Publication/vwLUAssets/EY_Data_Loss
_Prevention/$FILE/EY_Data_Loss_Prevention.pdf
2. https://www.ten-inc.com/presentations/
2017_ISE_NA_NSSLabs_WP.pdf
3. https://aspioneer.com/safebreach-a-pioneer-in-the-breach-
and-attack-simulation-market/
4. https://www.cybonet.com/images/CyBoWall/Network_Trap
s_Whitepaper.pdf
5. https://www.csoonline.com/article/3387616/the-case-for-
continuous-automated-security-validation.html
82
FinTech
6. http://www.isaca.org/Knowledge-
Center/Blog/Lists/Posts/Post.aspx?List=ef7cbc6d%2D9997%
2D4b62%2D96a4%2Da36fb7e171af&ID=1219
7. https://www.paloaltonetworks.com/cyberpedia/what-is-a-
zero-trust-architecture
8. https://www.centrify.com/education/what-is-zero-trust/
9. https://www.csoonline.com/article/3287057/network-
security/what-it-takes-to-build-a-zero-trust-network.html
10. https://www.oreilly.com/library/view/zero-trust-
networks/9781491962183/ch01.html
11. https://www.forrester.com/report/Five+Steps+To+A+Zero+T
rust+Network/-/E-RES120510
12. https://www.esecurityplanet.com/network-
security/deception-technology.html
13. https://www.forbes.com/sites/danwoods/2018/06/22/how-
deception-technology-gives-you-the-upper-hand-in-
cybersecurity/#161d082a689e
14. https://earlyadopter.com/2018/06/13/active-defense-how-
deception-has-changed-cybersecurity/
15. https://www.networkworld.com/article/3019760/network-
security/the-ins-and-outs-of-deception-for-cyber-
security.html
16. https://www.thewindowsclub.com/what-are-honeypots
17. https://en.wikipedia.org/wiki/Honeypot_(computing)
18. https://searchsecurity.techtarget.com/definition/honey-pot
19. https://www.techopedia.com/definition/10278/honeypot
20. https://www.titanhq.com/blog/how-do-you-implement-
honeypots-in-your-organization
21. https://github.com/paralax/awesome-
honeypots/blob/master/README.md
22. https://pdfs.semanticscholar.org/presentation/d6a3/ad5c2c
f61cbf6d0edfb2eb92a44198baa577.pdf
23. https://focus.forsythe.com/articles/509/Deploying-Data-
Loss-Prevention-Best-Practices-for-Success
24. https://www.gb-advisors.com/data-leak-prevention-dlp/
25. https://www.bankinfosecurity.com/webinars/preventing-
unauthorized-access-to-your-institutions-data-w-119
26. http://www.cbai.com/news/What%20is%20DLP%20and%20
Why%20is%20it%20Important%20to%20My%20Bank.pdf
83
IDRBT Staff Paper Series
27. https://www.bankinfosecurity.com/webinars/preventing-
unauthorized-access-to-your-institutions-data-w-119
28. https://www.gb-advisors.com/data-leak-prevention-dlp/
29. https://www.veracode.com/security/data-leak-protection
30. https://www.esecurityplanet.com/network-security/data-
loss-prevention-dlp.html
31. https://ostec.blog/en/perimeter/dlp-what-is-it-and-how-
does-it-work
32. https://spinbackup.com/blog/data-loss-prevention-tool-
advantages/
33. https://securosis.com/assets/library/reports/DLP-
Whitepaper.pdf
34. https://resources.infosecinstitute.com/data-loss-prevention-
dlp-strategy-guide/#gref
35. https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp
.800-167.pdf
36. https://www.calyptix.com/top-threats/application-
whitelisting-good/
37. https://searchsecurity.techtarget.com/definition/application
-whitelisting
38. https://www.linkedin.com/pulse/tiered-communications-
model-cyber-threat-intelligence-shane-anglin
39. https://securityintelligence.com/what-are-the-different-
types-of-cyberthreat-intelligence/
40. https://www.cm-alliance.com/cybersecurity-
blog/importance-of-threat-intelligence-feeds
41. https://threatconnect.com/blog/strategic-vs-tactical-threat-
intelligence/
42. https://www.anomali.com/blog/what-is-tactical-threat-
intelligence.
84
Financial Inclusion: Emerging Role of
FinTech
– Dr. M. V. N. K. Prasad,
Associate Professor, IDRBT
IDRBT Staff Paper Series
Abstract
Financial inclusion plays an indispensable role in inclusive growth of
an economy by addressing the challenge of poor access of financial
services to rural masses. Through this paper, an attempt has been
made to provide an overview on the status of financial inclusion and
the role of FinTech in past few years.
1. Literature Review
Financial inclusion is an essential keystone for economic
development. A survey indicates that for enhancing the economic
status of the financially feeble, a push towards financial inclusion is a
critical step. It comprises of a collection of activities such as insurance
and savings and is not restricted to expansion of credit facilities [1]. In
2005, experts observed that financial services could garner profits
with ‘low margin-high volume’ by inclusion of large number of people
at the bottom of pyramid. Therefore, banks need to relook at their
business plans to make financial inclusion more possible for low
income groups. In addition, technology and other resources must be
used in the ways possible to accomplish the primary motto of financial
inclusion [2].
86
FinTech
87
IDRBT Staff Paper Series
3. Evolution of FinTech
The year 2015 was a big year for the Indian FinTech sector, for it saw
the growth of various incubators, FinTech start-ups, as well as from
private and public investments.
88
FinTech
For this purpose, distinct exploratory studies and analysis have been
carried out. To assess the scope of financial inclusion, some
researchers computed Financial Inclusion indices. Dr. K. C.
Chakrabarty, former Deputy Governor, RBI [5] had stated that almost
half the country is unbanked and financially excluded households then
accounted for 14.50 Cr. Among all, only 55% had deposit accounts and
the percentage of current accounts was 9%.
Shri H. R. Khan, former Deputy Governor, RBI [7], stated that along
with other states in India, UP has very low Financial Inclusion. He
suggested three dimensions to find the scope of Financial Inclusion
viz. scope of banking services, banking penetration and utilisation of
banking services. As per research work in (2008) [7], the author
developed a multidimensional index (Index of Financial Inclusion, IFI)
that collects data on distinct dimensions of Financial Inclusion in a
single digit that varies between 0 and 1, where 0 signifies complete
Financial Exclusion and 1 denotes complete Financial Inclusion in the
89
IDRBT Staff Paper Series
90
FinTech
CRISIL released three volumes in June 2013, June 2014 and June 2015
to report the scope of financial inclusion based on the four above-
mentioned categories. In the first volume, CRISIL Inclusix score has
been increased by the reason of enhancement in deposit penetration.
For the overall improvement in CRISIL Inclusix score, the authorities
focussed on the other two parameters - credit and branch
penetration. The CRISIL Inclusix score for the whole country was 40.1
and for UP the score was between 25 and 40, which clearly shows that
it falls under below average level of financial inclusion (Table 1). In the
second volume, CRISIL Inclusix score for the country was 42.5 and the
score for UP increased to 35.2. Lastly, in the third volume,
microfinance institutions contributed for the first time in the
computation of CRISIL Inclusix score and the score for the country was
50.1. The increased level of financial inclusion was mainly because of
improvement in UP score to 40.1. India ranks low when compared to
other countries in financial inclusion and within India, UP is lagging
behind when compared to other states.
2018
Experimental survey has proposed that specific indicators are needed
for developing financial inclusion polices. Some effective indicators of
financial inclusion are defined by the World Bank, International
Monetary Fund and other global organizations. A few of these key
indicators are the number of ATMs installed, number of bank
branches, deposits, bank credit and so on. As per the research, when
measured per 1000 km of region, the most populated country i.e.,
China, has a broad network of financial inclusion having 1428.98 bank
branches.
91
IDRBT Staff Paper Series
92
FinTech
93
IDRBT Staff Paper Series
94
FinTech
95
IDRBT Staff Paper Series
There are 1.7 billion unbanked adults all over the world i.e. they have
no accounts either at banks or a mobile money provider. In developed
economies, the number of bank account holders is higher as
compared to the unbanked adults living in the developing world. Half
of the unbanked population exists in developing economies like India,
China, Nigeria, Indonesia, Bangladesh, Pakistan and Mexico and up to
56% of them are women. Adults without an account in 2017 by gender
(%) is shown in Figure 3.
96
FinTech
97
IDRBT Staff Paper Series
As per 2017 Global Findex survey, it was reported that 76% of account
owners (52% of adults) across the world received or made at least one
digital payment (Figure 5). In high-income economies, the share of
account owners is 97% (91% of adults), while the share is 70% (44% of
adults) in developing economies. The percentages include all people
reportedly using either mobile phones or credit or debit cards to make
payments from an account, or purchasing something online through
internet or bill payments. The transactions also includes receiving or
sending payments for agricultural products, paying bills or receiving
wage, government transfers by a mobile money account, pension
from or into a financial institution account.
Across the world, during 2014-2017, the share of adults with accounts
rose by 11 percentage points from 41% to 52% either by receiving or
making digital payments. In developing economies, the overall share
of bank accounts rose by 12 percentage points due to use of digital
98
FinTech
payments – among adults it rose from 32% to 44% and among account
owners, the percentage rose from 57% to 70%. In Kenya, the
percentage of people using digital payments is 97 and in China it is 85.
Digital payments also helped increase the share of account owners in
Venezuela and Russian Federation. Usage of digital payments is low in
Ethiopia. The share almost doubled in Thailand to 62% and in
economies like Malaysia, Brazil and Russia. (Figure 5).
99
IDRBT Staff Paper Series
100
FinTech
The internet and the mobile phones are opening up new avenues to
make transactions directly from an account either through a website
or by an app or through using mobile money account. In the past year,
financial transactions in high-income economies through internet or
the mobile phones constituted 55% of account owners (51% of
adults). The share is 85% in Norway, 33% in Japan, and 22% in Italy
(Figure 8). Whereas, in developing economies, 30% of account owners
(19% of adults) performed such financial transactions. On the other
hand, adults having mobile money account share is large in Tanzania
101
IDRBT Staff Paper Series
and Kenya. Kenya accounted for 70% of adults share (88% of account
owners) and China had 40% of adults’ share (49% of account owners).
102
FinTech
report of PwC, nearly 56% of the accused identified data privacy and
security as hazards to the advancement of FinTech. Due to provision
of online financial services and information ubiquity, information
security has become a considerable challenge for FinTech. Since
online services are increasing, tremendous amount of customer
information is easily gathered, which can help determine acquisition
and consumer buying patterns and retention schemes. Some of this
information also contains personally traceable data and health and
economic information. To secure this information and present it to
third parties and consumers in a protected manner when needed are
a challenge for the industry.
103
IDRBT Staff Paper Series
Few opine that outsourcing the data and other IT related services to
FinTech companies poses information and security challenges. To
mitigate such risks, it is essential for the banks to identify, assess and
resolve the issues on a daily basis and fortify their risk culture for
better governance and control.
104
FinTech
105
IDRBT Staff Paper Series
8. Conclusion
However advanced be the technologies, the financial sector would not
see expected progress until financial inclusion benefits the
underdeveloped. FinTech should play a critical role in enabling one
and all have access to the financial services which requires a
‘sustainable, collaborative and healthy financial ecosystem’.
References
1. Dev, S. M. Financial inclusion: Issues and challenges. Economic
and political weekly, pp. 4310-4313, 2006
2. Leeladhar V. Taking Banking Services to the Common Man –
Financial Inclusion. Commemorative Lecture at the Fedbank
Hormis Memorial Foundation at Ernakulam. 2005
3. Sriram, M., & Sundaram, N. Financial inclusion index: a
customized regional model with reference to economically most
backward districts of Tamil Nadu, India. Mediterranean Journal
of Social Sciences, 6(6), 209, 2015
4. Ramji, M. Financial inclusion in Gulbarga: Finding usage in access.
Institute for Financial Management and Research Centre for
Micro Finance. Working paper, 2009
5. Khan, H. R. Issues and Challenges in Financial Inclusion: Policies,
Partnerships, Processes & Products. Keynote address delivered at
symposium organized by the IIPA, Bhubaneswar. https://
www.rbi.org.in/scripts/BS_SpeechesView.aspx?id=711, 2012
6. Rangarajan C. Report of the Committee on Financial Inclusion.
http://www.nabard.org/reportcomfinancial.asp, 2008
7. Sarma, M. Index of Financial Inclusion, ICRIER Working paper No.
215, http://www.icrier.org/pdf/mandira, 2008
8. Kainth, G. S. Developing an Index of Financial Inclusion, http://
www.microfinancegateway.org/library/developing-index-
financial-inclusion, 2011
106
FinTech
107
* The views expressed in the articles, notes and reviews published in
the staff papers are those of the authors and do not necessarily reflect
the views of IDRBT. Moreover, the responsibility for the accuracy of
statements contained in the contributions rests with the author(s).
Journal of Banking and Financial Technology
1. First Issue (in association with Springer) - January-June 2019
2. Third Issue - July-December 2018
3. Second Issue - January-June 2018
4. First Issue - July-December 2017
White Paper/Blueprint
1. White Paper on 5G Applications for Banking and Financial Sector in India
2. Blueprint of Blockchain Platform for Banking Sector and Beyond
3. White Paper on Applications of Blockchain Technology to
Banking and Financial Sector in India
Frameworks
1. Cyber Insurance - A Reference Guide
2. Handbook on Information Security Operations Center
3. FAQs on Cloud Adoption for Indian Banks
4. Digital Banking Framework
5. Cyber Security Checklist
6. IT Vendor Management: Principles & Practices
7. Data Quality Framework
8. Cloud Security Framework
9. Green Banking Framework
10. Social Media Framework
11. Information Security Framework for Indian Banking Industry
12. Information Security Governance for the Indian Banking Sector
13. Holistic CRM and Analytics for Indian Banking Industry
14. Organizational Structure for IT in the Indian Banking Sector
Access all Frameworks from www.idrbt.ac.in/bestpractices.html
Published by: