Sharif et al., 2022 - Google Patents
A literature review of financial losses statistics for cyber security and future trendSharif et al., 2022
View PDF- Document ID
- 2971064657908098029
- Author
- Sharif M
- Mohammed M
- Publication year
- Publication venue
- World Journal of Advanced Research and Reviews
External Links
Snippet
Cybercrime directs to any criminal activity taken out utilizing computers or the internet. Attackers have chosen strategies such as social engineering, phishing, and malware as part of their cyber-attacks. A cyber-attack can lead to various effects, ranging from stealing …
- 230000001965 increased 0 abstract description 31
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Investment, e.g. financial instruments, portfolio management or fund management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance, e.g. risk analysis or pensions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sharif et al. | A literature review of financial losses statistics for cyber security and future trend | |
Agrafiotis et al. | A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate | |
Sen et al. | Estimating the contextual risk of data breach: An empirical approach | |
Lee et al. | Interrelationship between Bitcoin, ransomware, and terrorist activities: Criminal opportunity assessment via cyber-routine activities theoretical framework | |
Gwebu et al. | Data breaches in hospitality: is the industry different? | |
Khey et al. | Examining the correlates and spatial distribution of organizational data breaches in the United States | |
Gañán et al. | Beyond the pretty penny: The economic impact of cybercrime | |
Nobanee et al. | Bibliometric analysis of cybercrime and cybersecurity risks literature | |
Johnson | Cyber risks: Emerging risk management concerns for financial institutions | |
Gulyamov et al. | Personal data protection as a tool to fight cyber corruption | |
Wallang et al. | Cyber security in Small and Medium Enterprises (SMEs): What’s good or bad? | |
Dasgupta et al. | AI-powered cybersecurity: identifying threats in digital banking | |
Ama et al. | Cybersecurity Challenge in Nigeria Deposit Money Banks | |
Sunna et al. | AssessCICA: Assessing and Mitigating Financial Losses from Cyber Attacks with Role of Cyber Insurance in Post-Pandemic Era | |
Pan et al. | Analytics and cybersecurity: The shape of things to come | |
Sampath et al. | An analysis of cyber security risks and authentication systems | |
Okoru et al. | Cybercrime, Crime Security and National Development in Nigeria | |
Halouzka et al. | Overview of Cyber Threats in Central European Countries | |
Siddique | Framework for the mobilization of cyber security and risk mitigation of financial organizations in bangladesh: a case study | |
DoP et al. | effect of data protection frameworks against cybercrimes on cyber security in Nigeria | |
Hossain et al. | Cybercrime as a Threat to the Banking Sector: A Perspective from Commercial Banks in Bangladesh | |
Nyawanga | Meeting the challenge of cyber threats in emerging electronic transaction technologies in in Kenyan banking sector | |
Valackienė et al. | The impact of cyber security management on the digital economy: multiple case study analysis | |
Andoh-Baidoo | Explaining investors' reaction to internet security breach using deterrence theory | |
Russo et al. | Cybersecurity: Executive Orders, Legislation, Cyberattacks, and Hot Topics |