|
|
Showing 1 - 3 of
3 matches in All Departments
This book discusses understand cybersecurity management in
decentralized finance (DeFi). It commences with introducing
fundamentals of DeFi and cybersecurity to readers. It emphasizes on
the importance of cybersecurity for decentralized finance by
illustrating recent cyber breaches, attacks, and financial losses.
The book delves into understanding cyber threats and adversaries
who can exploit those threats. It advances with cybersecurity
threat, vulnerability, and risk management in DeFi. The book helps
readers understand cyber threat landscape comprising different
threat categories for that can exploit different types of
vulnerabilities identified in DeFi. It puts forward prominent
threat modelling strategies by focusing on attackers, assets, and
software. The book includes the popular blockchains that support
DeFi include Ethereum, Binance Smart Chain, Solana, Cardano,
Avalanche, Polygon, among others. With so much monetary value
associated with all these technologies, the perpetrators are always
lured to breach security by exploiting the vulnerabilities that
exist in these technologies. For simplicity and clarity, all
vulnerabilities are classified into different categories:
arithmetic bugs, re-Entrancy attack, race conditions, exception
handling, using a weak random generator, timestamp dependency,
transaction-ordering dependence and front running, vulnerable
libraries, wrong initial assumptions, denial of service, flash loan
attacks, and vampire Since decentralized finance infrastructures
are the worst affected by cyber-attacks, it is imperative to
understand various security issues in different components of DeFi
infrastructures and proposes measures to secure all components of
DeFi infrastructures. It brings the detailed cybersecurity policies
and strategies that can be used to secure financial institutions.
Finally, the book provides recommendations to secure DeFi
infrastructures from cyber-attacks.
This book uncovers the idea of understanding cybersecurity
management in FinTech. It commences with introducing fundamentals
of FinTech and cybersecurity to readers. It emphasizes on the
importance of cybersecurity for financial institutions by
illustrating recent cyber breaches, attacks, and financial losses.
The book delves into understanding cyber threats and adversaries
who can exploit those threats. It advances with cybersecurity
threat, vulnerability, and risk management in FinTech. The book
helps readers understand cyber threat landscape comprising
different threat categories that can exploit different types of
vulnerabilties identified in FinTech. It puts forward prominent
threat modelling strategies by focusing on attackers, assets, and
software and addresses the challenges in managing cyber risks in
FinTech. The authors discuss detailed cybersecurity policies and
strategies that can be used to secure financial institutions and
provide recommendations to secure financial institutions from
cyber-attacks.
This book uncovers the idea of understanding cybersecurity
management in FinTech. It commences with introducing fundamentals
of FinTech and cybersecurity to readers. It emphasizes on the
importance of cybersecurity for financial institutions by
illustrating recent cyber breaches, attacks, and financial losses.
The book delves into understanding cyber threats and adversaries
who can exploit those threats. It advances with cybersecurity
threat, vulnerability, and risk management in FinTech. The book
helps readers understand cyber threat landscape comprising
different threat categories that can exploit different types of
vulnerabilties identified in FinTech. It puts forward prominent
threat modelling strategies by focusing on attackers, assets, and
software and addresses the challenges in managing cyber risks in
FinTech. The authors discuss detailed cybersecurity policies and
strategies that can be used to secure financial institutions and
provide recommendations to secure financial institutions from
cyber-attacks.
|
|