[go: up one dir, main page]

Sharif et al., 2022 - Google Patents

A literature review of financial losses statistics for cyber security and future trend

Sharif et al., 2022

View PDF
Document ID
2971064657908098029
Author
Sharif M
Mohammed M
Publication year
Publication venue
World Journal of Advanced Research and Reviews

External Links

Snippet

Cybercrime directs to any criminal activity taken out utilizing computers or the internet. Attackers have chosen strategies such as social engineering, phishing, and malware as part of their cyber-attacks. A cyber-attack can lead to various effects, ranging from stealing …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • G06Q40/025Credit processing or loan processing, e.g. risk analysis for mortgages
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Investment, e.g. financial instruments, portfolio management or fund management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance, e.g. risk analysis or pensions

Similar Documents

Publication Publication Date Title
Sharif et al. A literature review of financial losses statistics for cyber security and future trend
Agrafiotis et al. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
Sen et al. Estimating the contextual risk of data breach: An empirical approach
Lee et al. Interrelationship between Bitcoin, ransomware, and terrorist activities: Criminal opportunity assessment via cyber-routine activities theoretical framework
Gwebu et al. Data breaches in hospitality: is the industry different?
Khey et al. Examining the correlates and spatial distribution of organizational data breaches in the United States
Gañán et al. Beyond the pretty penny: The economic impact of cybercrime
Nobanee et al. Bibliometric analysis of cybercrime and cybersecurity risks literature
Johnson Cyber risks: Emerging risk management concerns for financial institutions
Gulyamov et al. Personal data protection as a tool to fight cyber corruption
Wallang et al. Cyber security in Small and Medium Enterprises (SMEs): What’s good or bad?
Dasgupta et al. AI-powered cybersecurity: identifying threats in digital banking
Ama et al. Cybersecurity Challenge in Nigeria Deposit Money Banks
Sunna et al. AssessCICA: Assessing and Mitigating Financial Losses from Cyber Attacks with Role of Cyber Insurance in Post-Pandemic Era
Pan et al. Analytics and cybersecurity: The shape of things to come
Sampath et al. An analysis of cyber security risks and authentication systems
Okoru et al. Cybercrime, Crime Security and National Development in Nigeria
Halouzka et al. Overview of Cyber Threats in Central European Countries
Siddique Framework for the mobilization of cyber security and risk mitigation of financial organizations in bangladesh: a case study
DoP et al. effect of data protection frameworks against cybercrimes on cyber security in Nigeria
Hossain et al. Cybercrime as a Threat to the Banking Sector: A Perspective from Commercial Banks in Bangladesh
Nyawanga Meeting the challenge of cyber threats in emerging electronic transaction technologies in in Kenyan banking sector
Valackienė et al. The impact of cyber security management on the digital economy: multiple case study analysis
Andoh-Baidoo Explaining investors' reaction to internet security breach using deterrence theory
Russo et al. Cybersecurity: Executive Orders, Legislation, Cyberattacks, and Hot Topics