Table 8 Risk features of the two financial institutions.

From: Comprehensive assessment of privacy security of financial services in cloud environment

Risk indicators

Company 1

Company 2

I1: Malicious Internal Employee Behavior

Lower level of disciplinary infractions exist

Internal employees have a high disciplinary record

I2: Software or application vulnerability

Has no obvious technical vulnerabilities and can pass security tests

Has no obvious technical vulnerabilities and can pass security tests

I3: Abusive collection of permissions by third-party applications

There are few financial product ads is abusive collection of information

There are more investment trading ads that collect more users’ information

I4: Data leakage due to internal system or platform error

Internal systems and platforms are stable and pose little threat to users’ privacy in the event of a service failure.

Systems and platforms have been in operation for many years and service failures can pose a significant threat to users’ privacy

I5: Data Store or Server Authentication Vulnerability

Strict access control such as real-name authentication

Can be logged in through third-party applications, some vulnerabilities exist

I6: Connection to unsecured network during data transfer

Secure network connections are used, Sensitive information such as users contact details will not be exposed

Sometimes a secure network connection is not used, which may expose information such as users contact details

I7: Services provider data loss

Take multiple security measures to prevent data loss

The security measures implemented are not sufficient to avoid users’ data loss

I8: Operating system or terminal device vulnerabilities

No obvious vulnerabilities in terminals

No obvious vulnerabilities in terminals

I9: User rights not properly configured or managed by internal personnel

The rights are properly configured. Internal employees can access only basic users’ information

The permission configuration is improper, and some employees can access a large number of users information

I10: Third party applications hacked

Not being associated with or authorized to cooperate with third-party applications, it is relatively secure

Have risks associated with information and authorized cooperation with third-party applications

I11: Vulnerability of encryption mechanism

A strong encryption mechanism is used to protect users’ information from vulnerability threats

The encryption mechanism used is not strong, and users’ information may be threatened

I12: Improper key management during use

Regular rotation and stringent control measures are implemented for the key

There is no regular rotation and strict control for the key