Understanding cybersecurity management in FinTech: challenges, strategies, and trends
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2021]
|
Schriftenreihe: | Future of Business and Finance
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xiv, 182 Seiten Illustrationen |
ISBN: | 9783030799144 |
ISSN: | 2662-2467 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV047475107 | ||
003 | DE-604 | ||
005 | 20211103 | ||
007 | t | ||
008 | 210920s2021 a||| |||| 00||| eng d | ||
020 | |a 9783030799144 |9 978-3-030-79914-4 | ||
035 | |a (OCoLC)1284783195 | ||
035 | |a (DE-599)BVBBV047475107 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 332 |2 23 | |
084 | |a QK 305 |0 (DE-625)141642: |2 rvk | ||
100 | 1 | |a Kaur, Gurdip |e Verfasser |0 (DE-588)124218208X |4 aut | |
245 | 1 | 0 | |a Understanding cybersecurity management in FinTech |b challenges, strategies, and trends |c Gurdip Kaur, Ziba Habibi Lashkari, Arash Habibi Lashkari |
264 | 1 | |a Cham |b Springer |c [2021] | |
300 | |a xiv, 182 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Future of Business and Finance |x 2662-2467 | |
650 | 4 | |a Financial Engineering | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a IT in Business | |
650 | 4 | |a Business and Management, general | |
650 | 4 | |a Financial engineering | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology | |
650 | 4 | |a Business—Data processing | |
650 | 4 | |a Business | |
650 | 4 | |a Management science | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Finanztechnologie |0 (DE-588)1115819186 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Finanztechnologie |0 (DE-588)1115819186 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Habibi Lashkari, Ziba |e Verfasser |0 (DE-588)1242182225 |4 aut | |
700 | 1 | |a Habibi Lashkari, Arash |e Verfasser |0 (DE-588)1242182357 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-79915-1 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032876702&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032876702 |
Datensatz im Suchindex
_version_ | 1804182789773328384 |
---|---|
adam_text | 1 Introduction to FinTech and ImportanceObjects................................. 1.1 Introduction to Financial Technology............................................. 1.2 Importance of FinTech..................................................................... 1.3 Big Data and Financial Technology................................................ 1.4 Impact of FinTech on Global Economy........................................... 1.5 FinTech and Banking........................................................................ 1.6 FinTech and Online Banking........................................................... 1.7 FinTech Evolution.............................................................................. 1.8 FinTech Ecosystem........................................................................... 1.9 FinTech Applications......................................................................... 1.10 Chapter Summary.............................................................................. References..................................................................................................... 1 2 4 6 8 8 10 11 12 12 14 15 2 Introduction to Cybersecurity................................................................... 2.1 What Is Cybersecurity?.................................................................... 2.2 Motivation......................................................................................... 2.3 The CIAAA Principle....................................................................... 2.4 Cybersecurity
Threats....................................................................... 2.5 Cybersecurity Attacks....................................................................... 2.6 Cybersecurity Analysis..................................................................... 2.7 Why Cybersecurity Matters............................................................. 2.8 Data Science and Important Data Breachers.................................. 2.8.1 Important Data Breaches................................................... 2.9 The NSA Triad for Security Assessment........................................ 2.10 Data-Centric Security Management................................................ 2.10.1 Data-Centric Security Cycle.............................................. 2.10.2 Characteristics of Data-Centric Security Management. . 2.10.3 Problems with Data-Centric Security Management... . 2.11 Chapter Summary............................................................................. References..................................................................................................... 17 17 18 18 20 21 23 24 25 26 28 31 31 32 32 33 33 3 Information Security Governance inFinTech....................................... 3.1 What Is Information Security Governance?..................................... 35 35 vH
viii Contents 3.2 Governance Solution.......................................................... Security Governance Profiling........................................... Security Policies and Standards........................................ Security Strategic Planning................................................ Security Roles and Responsibilities.................................. Security Governance of Assets.......................................... Governance Structure Appropriate to the Organization........................................................................ 3.2.7 Third Parties and Suppliers................................................ 3.2.8 Information Security Governance Assessment Tools ... 3.3 Available Information Security Governance Models.................... 3.3.1 Basic Information Security Governance Model.............. 3.3.2 Extended Information Security Governance Model.... 3.3.3 Comprehensive Information Security Governance Model................................................................................... 3.4 What Is Effective and Efficient Information Security Governance?...................................................................................... 3.5 Integrated Governance Mechanisms................................................ 3.5.1 The Role of Governance.................................................... 3.5.2 Corporate Governance....................................................... 3.5.3 Principles of Good Governance........................................ 3.5.4 Principles of Undertaking Governance
Review............... 3.6 Comprehensive Security Governance............................................. 3.6.1 Strategic Integration........................................................... 3.6.2 Cyber Risk Mitigation Approach...................................... 3.6.3 Adaptability and Agility.................................................... 3.6.4 Reporting Framework for GoodGovernance................... 3.7 Effectively Implementing a Sustainable Strategy.......................... 3.8 Integrated Governance Framework................................................. 3.9 The Integrated Framework Assessment.......................................... 3.9.1 Governance Structure........................................................ 3.9.2 Management Structure....................................................... 3.9.3 Operations/Infrastructure................................................... 3.9.4 Compensation/Funds Flow................................................ 3.10 A General Information SecurityGovernance Model for FinTech........................................................................................ 3.11 Chapter Summary............................................................................. References..................................................................................................... 4 Security 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5 3.2.6 Cybersecurity Threats in FinTech.......................................................... 4.1 Understanding Cybersecurity Threats............................................. 4.2 Understanding the
Adversary.......................................................... 4.3 Threat Categories for FinTech......................................................... 4.4 Threat Actors.................................................................................... 4.5 Threat Intelligence............................................................................ 37 38 38 39 40 41 42 43 44 45 45 46 48 49 51 51 51 52 53 53 53 54 55 56 57 58 58 59 60 60 60 60 62 63 65 67 68 69 72 76
Contents Ix 4.6 Structural Approach to FinTech Threat Modeling........................ 4.6.1 Focusing on Assets........................................................... 4.6.2 Focusing on Attackers..................................................... 4.6.3 Focusing on Software...................................................... 4.7 Threat Modeling............................................................................. 4.8 The Best Threat Modeling Methodology for FinTech.................. 4.8.1 STRIDE............................................................................ 4.8.2 Trike................................................................................. 4.8.3 VAST............................................................................... 4.8.4 PASTA............................................................................. 4.9 Chapter Summary........................................................................... References.................................................................................................. 77 78 78 78 79 82 82 83 84 84 86 87 Cybersecurity Vulnerabilities in FinTech............................................ 5.1 General Cybersecurity Vulnerabilities in FinTech......................... 5.2 Specific Cybersecurity Vulnerabilities in FinTech......................... 5.2.1 Technology Vulnerabilities............................................. 5.2.2 Human Vulnerabilities..................................................... 5.2.3 Transaction Vulnerabilities.............................................. 5.3 Assessing the
FinTech Cybersecurity Vulnerabilities................... 5.4 General Policies to Mitigate FinTech Cybersecurity Vulnerabilities................................................................................ 5.5 Chapter Summary........................................................................... References.................................................................................................. 89 89 92 93 94 96 97 98 101 101 Cybersecurity Risk in FinTech.............................................................. 6.1 What Is Risk?................................................................................. 6.2 What Is the Cybersecurity Risk?................................................... 6.3 Cybersecurity Risk Lifecycle......................................................... 6.4 Risk Assessment.............................................................................. 6.5 Risk Analysis.................................................................................. 6.5.1 Procedure.......................................................................... 6.5.2 Strategies.......................................................................... 6.5.3 Models.............................................................................. 6.6 Risk Mitigation................................................................................ 6.7 Risk Monitoring and Review.......................................................... 6.8 Challenges in FinTech Risk Management..................................... 6.9 Dealing with Uncertainty in
FinTech............................................ 6.10 Kinds of Uncertainty...................................................................... 6.11 Reducing Uncertainty.................................................................... 6.12 Handling Uncertainty for FinTech Cybersecurity Risk................ 6.13 Chapter Summary.......................................................................... References.................................................................................................. 103 103 104 107 108 111 Ill 43 ИЗ 11*3 116 117 119 119 120 120 121 122 5 6
|
adam_txt |
1 Introduction to FinTech and ImportanceObjects. 1.1 Introduction to Financial Technology. 1.2 Importance of FinTech. 1.3 Big Data and Financial Technology. 1.4 Impact of FinTech on Global Economy. 1.5 FinTech and Banking. 1.6 FinTech and Online Banking. 1.7 FinTech Evolution. 1.8 FinTech Ecosystem. 1.9 FinTech Applications. 1.10 Chapter Summary. References. 1 2 4 6 8 8 10 11 12 12 14 15 2 Introduction to Cybersecurity. 2.1 What Is Cybersecurity?. 2.2 Motivation. 2.3 The CIAAA Principle. 2.4 Cybersecurity
Threats. 2.5 Cybersecurity Attacks. 2.6 Cybersecurity Analysis. 2.7 Why Cybersecurity Matters. 2.8 Data Science and Important Data Breachers. 2.8.1 Important Data Breaches. 2.9 The NSA Triad for Security Assessment. 2.10 Data-Centric Security Management. 2.10.1 Data-Centric Security Cycle. 2.10.2 Characteristics of Data-Centric Security Management. . 2.10.3 Problems with Data-Centric Security Management. . 2.11 Chapter Summary. References. 17 17 18 18 20 21 23 24 25 26 28 31 31 32 32 33 33 3 Information Security Governance inFinTech. 3.1 What Is Information Security Governance?. 35 35 vH
viii Contents 3.2 Governance Solution. Security Governance Profiling. Security Policies and Standards. Security Strategic Planning. Security Roles and Responsibilities. Security Governance of Assets. Governance Structure Appropriate to the Organization. 3.2.7 Third Parties and Suppliers. 3.2.8 Information Security Governance Assessment Tools . 3.3 Available Information Security Governance Models. 3.3.1 Basic Information Security Governance Model. 3.3.2 Extended Information Security Governance Model. 3.3.3 Comprehensive Information Security Governance Model. 3.4 What Is Effective and Efficient Information Security Governance?. 3.5 Integrated Governance Mechanisms. 3.5.1 The Role of Governance. 3.5.2 Corporate Governance. 3.5.3 Principles of Good Governance. 3.5.4 Principles of Undertaking Governance
Review. 3.6 Comprehensive Security Governance. 3.6.1 Strategic Integration. 3.6.2 Cyber Risk Mitigation Approach. 3.6.3 Adaptability and Agility. 3.6.4 Reporting Framework for GoodGovernance. 3.7 Effectively Implementing a Sustainable Strategy. 3.8 Integrated Governance Framework. 3.9 The Integrated Framework Assessment. 3.9.1 Governance Structure. 3.9.2 Management Structure. 3.9.3 Operations/Infrastructure. 3.9.4 Compensation/Funds Flow. 3.10 A General Information SecurityGovernance Model for FinTech. 3.11 Chapter Summary. References. 4 Security 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5 3.2.6 Cybersecurity Threats in FinTech. 4.1 Understanding Cybersecurity Threats. 4.2 Understanding the
Adversary. 4.3 Threat Categories for FinTech. 4.4 Threat Actors. 4.5 Threat Intelligence. 37 38 38 39 40 41 42 43 44 45 45 46 48 49 51 51 51 52 53 53 53 54 55 56 57 58 58 59 60 60 60 60 62 63 65 67 68 69 72 76
Contents Ix 4.6 Structural Approach to FinTech Threat Modeling. 4.6.1 Focusing on Assets. 4.6.2 Focusing on Attackers. 4.6.3 Focusing on Software. 4.7 Threat Modeling. 4.8 The Best Threat Modeling Methodology for FinTech. 4.8.1 STRIDE. 4.8.2 Trike. 4.8.3 VAST. 4.8.4 PASTA. 4.9 Chapter Summary. References. 77 78 78 78 79 82 82 83 84 84 86 87 Cybersecurity Vulnerabilities in FinTech. 5.1 General Cybersecurity Vulnerabilities in FinTech. 5.2 Specific Cybersecurity Vulnerabilities in FinTech. 5.2.1 Technology Vulnerabilities. 5.2.2 Human Vulnerabilities. 5.2.3 Transaction Vulnerabilities. 5.3 Assessing the
FinTech Cybersecurity Vulnerabilities. 5.4 General Policies to Mitigate FinTech Cybersecurity Vulnerabilities. 5.5 Chapter Summary. References. 89 89 92 93 94 96 97 98 101 101 Cybersecurity Risk in FinTech. 6.1 What Is Risk?. 6.2 What Is the Cybersecurity Risk?. 6.3 Cybersecurity Risk Lifecycle. 6.4 Risk Assessment. 6.5 Risk Analysis. 6.5.1 Procedure. 6.5.2 Strategies. 6.5.3 Models. 6.6 Risk Mitigation. 6.7 Risk Monitoring and Review. 6.8 Challenges in FinTech Risk Management. 6.9 Dealing with Uncertainty in
FinTech. 6.10 Kinds of Uncertainty. 6.11 Reducing Uncertainty. 6.12 Handling Uncertainty for FinTech Cybersecurity Risk. 6.13 Chapter Summary. References. 103 103 104 107 108 111 Ill 43 ИЗ 11*3 116 117 119 119 120 120 121 122 5 6 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Kaur, Gurdip Habibi Lashkari, Ziba Habibi Lashkari, Arash |
author_GND | (DE-588)124218208X (DE-588)1242182225 (DE-588)1242182357 |
author_facet | Kaur, Gurdip Habibi Lashkari, Ziba Habibi Lashkari, Arash |
author_role | aut aut aut |
author_sort | Kaur, Gurdip |
author_variant | g k gk l z h lz lzh l a h la lah |
building | Verbundindex |
bvnumber | BV047475107 |
classification_rvk | QK 305 |
ctrlnum | (OCoLC)1284783195 (DE-599)BVBBV047475107 |
dewey-full | 332 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 332 - Financial economics |
dewey-raw | 332 |
dewey-search | 332 |
dewey-sort | 3332 |
dewey-tens | 330 - Economics |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02216nam a2200541zc 4500</leader><controlfield tag="001">BV047475107</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211103 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210920s2021 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030799144</subfield><subfield code="9">978-3-030-79914-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1284783195</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047475107</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">332</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QK 305</subfield><subfield code="0">(DE-625)141642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kaur, Gurdip</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)124218208X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding cybersecurity management in FinTech</subfield><subfield code="b">challenges, strategies, and trends</subfield><subfield code="c">Gurdip Kaur, Ziba Habibi Lashkari, Arash Habibi Lashkari</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiv, 182 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Future of Business and Finance</subfield><subfield code="x">2662-2467</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Financial Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT in Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business and Management, general</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Financial engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business—Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Finanztechnologie</subfield><subfield code="0">(DE-588)1115819186</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Finanztechnologie</subfield><subfield code="0">(DE-588)1115819186</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Habibi Lashkari, Ziba</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1242182225</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Habibi Lashkari, Arash</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1242182357</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-79915-1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032876702&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032876702</subfield></datafield></record></collection> |
id | DE-604.BV047475107 |
illustrated | Illustrated |
index_date | 2024-07-03T18:10:49Z |
indexdate | 2024-07-10T09:13:08Z |
institution | BVB |
isbn | 9783030799144 |
issn | 2662-2467 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032876702 |
oclc_num | 1284783195 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | xiv, 182 Seiten Illustrationen |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Springer |
record_format | marc |
series2 | Future of Business and Finance |
spelling | Kaur, Gurdip Verfasser (DE-588)124218208X aut Understanding cybersecurity management in FinTech challenges, strategies, and trends Gurdip Kaur, Ziba Habibi Lashkari, Arash Habibi Lashkari Cham Springer [2021] xiv, 182 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Future of Business and Finance 2662-2467 Financial Engineering Systems and Data Security IT in Business Business and Management, general Financial engineering Computer security Information technology Business—Data processing Business Management science Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Finanztechnologie (DE-588)1115819186 gnd rswk-swf Finanztechnologie (DE-588)1115819186 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Habibi Lashkari, Ziba Verfasser (DE-588)1242182225 aut Habibi Lashkari, Arash Verfasser (DE-588)1242182357 aut Erscheint auch als Online-Ausgabe 978-3-030-79915-1 Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032876702&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kaur, Gurdip Habibi Lashkari, Ziba Habibi Lashkari, Arash Understanding cybersecurity management in FinTech challenges, strategies, and trends Financial Engineering Systems and Data Security IT in Business Business and Management, general Financial engineering Computer security Information technology Business—Data processing Business Management science Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Finanztechnologie (DE-588)1115819186 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)1115819186 |
title | Understanding cybersecurity management in FinTech challenges, strategies, and trends |
title_auth | Understanding cybersecurity management in FinTech challenges, strategies, and trends |
title_exact_search | Understanding cybersecurity management in FinTech challenges, strategies, and trends |
title_exact_search_txtP | Understanding cybersecurity management in FinTech challenges, strategies, and trends |
title_full | Understanding cybersecurity management in FinTech challenges, strategies, and trends Gurdip Kaur, Ziba Habibi Lashkari, Arash Habibi Lashkari |
title_fullStr | Understanding cybersecurity management in FinTech challenges, strategies, and trends Gurdip Kaur, Ziba Habibi Lashkari, Arash Habibi Lashkari |
title_full_unstemmed | Understanding cybersecurity management in FinTech challenges, strategies, and trends Gurdip Kaur, Ziba Habibi Lashkari, Arash Habibi Lashkari |
title_short | Understanding cybersecurity management in FinTech |
title_sort | understanding cybersecurity management in fintech challenges strategies and trends |
title_sub | challenges, strategies, and trends |
topic | Financial Engineering Systems and Data Security IT in Business Business and Management, general Financial engineering Computer security Information technology Business—Data processing Business Management science Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Finanztechnologie (DE-588)1115819186 gnd |
topic_facet | Financial Engineering Systems and Data Security IT in Business Business and Management, general Financial engineering Computer security Information technology Business—Data processing Business Management science Computersicherheit Datensicherung Finanztechnologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032876702&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kaurgurdip understandingcybersecuritymanagementinfintechchallengesstrategiesandtrends AT habibilashkariziba understandingcybersecuritymanagementinfintechchallengesstrategiesandtrends AT habibilashkariarash understandingcybersecuritymanagementinfintechchallengesstrategiesandtrends |