Understanding cybersecurity management in decentralized finance: challenges, strategies, and trends
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2023]
|
Schriftenreihe: | Financial Innovation and Technology
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xvi, 117 Seiten |
ISBN: | 9783031233425 |
ISSN: | 2730-969X |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV048816585 | ||
003 | DE-604 | ||
005 | 20230324 | ||
007 | t| | ||
008 | 230215s2023 xx |||| 00||| eng d | ||
020 | |a 9783031233425 |9 978-3-031-23342-5 | ||
035 | |a (OCoLC)1372481889 | ||
035 | |a (DE-599)BVBBV048816585 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 332 |2 23 | |
082 | 0 | |a 658.15 |2 23 | |
084 | |a QK 305 |0 (DE-625)141642: |2 rvk | ||
084 | |a WIR 000 |2 stub | ||
100 | 1 | |a Kaur, Gurdip |e Verfasser |0 (DE-588)124218208X |4 aut | |
245 | 1 | 0 | |a Understanding cybersecurity management in decentralized finance |b challenges, strategies, and trends |c Gurdip Kaur, Arash Habibi Lashkari, Iman Sharafaldin, Ziba Habibi Lashkari |
264 | 1 | |a Cham |b Springer |c [2023] | |
300 | |a xvi, 117 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Financial Innovation and Technology |x 2730-969X | |
650 | 4 | |a Financial Technology and Innovation | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a IT in Business | |
650 | 4 | |a Innovation and Technology Management | |
650 | 4 | |a Financial engineering | |
650 | 4 | |a Data protection | |
650 | 4 | |a Business information services | |
650 | 4 | |a Technological innovations | |
700 | 1 | |a Habibi Lashkari, Arash |e Verfasser |0 (DE-588)1242182357 |4 aut | |
700 | 1 | |a Sharafaldin, Iman |e Verfasser |4 aut | |
700 | 1 | |a Habibi Lashkari, Ziba |e Verfasser |0 (DE-588)1242182225 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-031-23340-1 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034082402&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034082402 |
Datensatz im Suchindex
_version_ | 1822603512155996160 |
---|---|
adam_text |
Contents 1 The Origin of Modern Decentralized Finance. 1.1 A Brief History of Finance. 1.2 Introduction to FinTech. 1.3 Key Problems of Centralized Financial System. 1.4 Introduction to Crypto-Based Finance. 1.4.1 Roots of DeFi. 1.4.2 Examples of DeFi. 1.4.3 Advantages of DeFi Ecosystem. 1.5 Bitcoin. 1.5.1 Characteristics of Bitcoin Ecosystem. 1.5.2 History of Bitcoin. 1.6 Smart Contract-Based Blockchains. 1.7 Summary. References. 1 1 4 6 8 9 11 11 12 14 14 15 26 26 2 Introduction to Smart Contracts and DeFi. 2.1 History of Smart Contracts. 2.2 Fundamentals of Smart
Contracts. 2.2.1 Creating First Smart Contract. 2.3 The Operation Process of Smart Contracts. 2.3.1 Technical Operational Process. 2.4 How Can We Use Smart Contracts. 2.5 Benefits and Problems of Smart Contracts. 2.6 Introduction to DeFi. 2.6.1 DeFi Characteristics. 2.6.2 DeFi vs CeFi. 2.7 DeFi Applications. 2.7.1 DeFi Exchanges. 2.7.2 Lending Pools. 2.7.3 Derivatives. 29 29 31 33 37 42 44 46 48 49 49 50 50 51 51 xi
xii Contents 2.7.4 Insurance. 2.7.5 Gaining. 2.7.6 NFT. . 2.8 Importance of Oracles in the Rise of DeFi. 2.9 Summary. References. 51 52 52 52 54 54 DeFi Platforms. 3.1 Popular Blockchains that Support DeFi Apps. 3.1.1 Ethereum. . 3.1.2 Binance Smart Chain. 3.1.3 Solana. 3.1.4 Cardano. 3.1.5 Avalanche. 3.1.6 Polygon. . 3.1.7 Fantom. 3.2 Security and Safety of DeFi Platforms. 3.3 Evaluating die Security of DeFi Platforms. 3.4
Summary. References. 57 57 57 58 60 61 62 64 64 66 67 69 69 4 Blockchain Security. 4.1 Blockchain Attacks and Countermeasures. 4.1.1 Double-Spending Attack. 4.1.2 Finney Attack. 4.1.3 Race Attack. 4.1.4 Brute Force or Alternative History Attack. 4.1.5 Vector 76 or One-Confirmation Attack. 4.1.6 Balance Attack. 4.1.7 Nothing-at-Stake Attack. . 4.1.8 Selfish Mining or Block Discarding Attack. 4.1.9 Long-Range Attack. 4.1.10 Block Withholding Attack. 4.1.11 Fork After Withholding Attack. 4.1.12 51% Attack. . 4.1.13 Feather and Punitive Forking Blockchain Attack. 4.1.14 Eclipse or Netsplit Attack. 4.1.15 Distributed Denial of Service
Attack. 4.1.16 Liveness Denial Attack. 4.1.17 Refund Attack. 4.1.18 Tampering or Delay Attack. 4.1.19 BGP Hijacking or Routing Attack. 4.1.20 Sybil Attack. 4.1.21 Time Jacking. 4.1.22 Quantum Attack. 71 71 72 73 74 75 75 76 76 77 77 79 79 80 81 82 82 83 84 84 85 85 86 86 3
Contents xiii 4.2 Summary. References. 87 87 5 Smart Contracts and DeFi Security and Threats. 5.1 Arithmetic Bugs. 5.2 Re-entrancy Attack. 5.3 Race Conditions. 5.4 Unhandled Exceptions. 5.5 Using a Weak Random Generator. 5.6 Timestamp Dependency. 5.7 Transaction-Ordering Dependence and Front Running. 5.8 Vulnerable Libraries. 5.9 Wrong Initial Assumptions. 5.10 Denial of Service. 5.11 Flash Loan Attacks. 5.12 Vampire Attack. 5.13 Maximal Extractable Value. 5.14 Sample Attack
Scenarios. 5.14.1 Weak Random Generator Attack. 5.14.2 Transaction-Ordering Attack. 5.14.3 Denial of Service Attack. 5.15 Summary. References. 91 91 92 94 95 96 96 97 98 98 99 100 101 101 102 103 105 108 109 109 6 Challenges, Issues, and Basic Security Practices. 6.1 Introduction. 6.2 Challenges and Issues. 6.3 Best Security Practices. 6.4 Summary. References. 113 113 114 115 117 117 |
adam_txt |
Contents 1 The Origin of Modern Decentralized Finance. 1.1 A Brief History of Finance. 1.2 Introduction to FinTech. 1.3 Key Problems of Centralized Financial System. 1.4 Introduction to Crypto-Based Finance. 1.4.1 Roots of DeFi. 1.4.2 Examples of DeFi. 1.4.3 Advantages of DeFi Ecosystem. 1.5 Bitcoin. 1.5.1 Characteristics of Bitcoin Ecosystem. 1.5.2 History of Bitcoin. 1.6 Smart Contract-Based Blockchains. 1.7 Summary. References. 1 1 4 6 8 9 11 11 12 14 14 15 26 26 2 Introduction to Smart Contracts and DeFi. 2.1 History of Smart Contracts. 2.2 Fundamentals of Smart
Contracts. 2.2.1 Creating First Smart Contract. 2.3 The Operation Process of Smart Contracts. 2.3.1 Technical Operational Process. 2.4 How Can We Use Smart Contracts. 2.5 Benefits and Problems of Smart Contracts. 2.6 Introduction to DeFi. 2.6.1 DeFi Characteristics. 2.6.2 DeFi vs CeFi. 2.7 DeFi Applications. 2.7.1 DeFi Exchanges. 2.7.2 Lending Pools. 2.7.3 Derivatives. 29 29 31 33 37 42 44 46 48 49 49 50 50 51 51 xi
xii Contents 2.7.4 Insurance. 2.7.5 Gaining. 2.7.6 NFT. . 2.8 Importance of Oracles in the Rise of DeFi. 2.9 Summary. References. 51 52 52 52 54 54 DeFi Platforms. 3.1 Popular Blockchains that Support DeFi Apps. 3.1.1 Ethereum. . 3.1.2 Binance Smart Chain. 3.1.3 Solana. 3.1.4 Cardano. 3.1.5 Avalanche. 3.1.6 Polygon. . 3.1.7 Fantom. 3.2 Security and Safety of DeFi Platforms. 3.3 Evaluating die Security of DeFi Platforms. 3.4
Summary. References. 57 57 57 58 60 61 62 64 64 66 67 69 69 4 Blockchain Security. 4.1 Blockchain Attacks and Countermeasures. 4.1.1 Double-Spending Attack. 4.1.2 Finney Attack. 4.1.3 Race Attack. 4.1.4 Brute Force or Alternative History Attack. 4.1.5 Vector 76 or One-Confirmation Attack. 4.1.6 Balance Attack. 4.1.7 Nothing-at-Stake Attack. . 4.1.8 Selfish Mining or Block Discarding Attack. 4.1.9 Long-Range Attack. 4.1.10 Block Withholding Attack. 4.1.11 Fork After Withholding Attack. 4.1.12 51% Attack. . 4.1.13 Feather and Punitive Forking Blockchain Attack. 4.1.14 Eclipse or Netsplit Attack. 4.1.15 Distributed Denial of Service
Attack. 4.1.16 Liveness Denial Attack. 4.1.17 Refund Attack. 4.1.18 Tampering or Delay Attack. 4.1.19 BGP Hijacking or Routing Attack. 4.1.20 Sybil Attack. 4.1.21 Time Jacking. 4.1.22 Quantum Attack. 71 71 72 73 74 75 75 76 76 77 77 79 79 80 81 82 82 83 84 84 85 85 86 86 3
Contents xiii 4.2 Summary. References. 87 87 5 Smart Contracts and DeFi Security and Threats. 5.1 Arithmetic Bugs. 5.2 Re-entrancy Attack. 5.3 Race Conditions. 5.4 Unhandled Exceptions. 5.5 Using a Weak Random Generator. 5.6 Timestamp Dependency. 5.7 Transaction-Ordering Dependence and Front Running. 5.8 Vulnerable Libraries. 5.9 Wrong Initial Assumptions. 5.10 Denial of Service. 5.11 Flash Loan Attacks. 5.12 Vampire Attack. 5.13 Maximal Extractable Value. 5.14 Sample Attack
Scenarios. 5.14.1 Weak Random Generator Attack. 5.14.2 Transaction-Ordering Attack. 5.14.3 Denial of Service Attack. 5.15 Summary. References. 91 91 92 94 95 96 96 97 98 98 99 100 101 101 102 103 105 108 109 109 6 Challenges, Issues, and Basic Security Practices. 6.1 Introduction. 6.2 Challenges and Issues. 6.3 Best Security Practices. 6.4 Summary. References. 113 113 114 115 117 117 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Kaur, Gurdip Habibi Lashkari, Arash Sharafaldin, Iman Habibi Lashkari, Ziba |
author_GND | (DE-588)124218208X (DE-588)1242182357 (DE-588)1242182225 |
author_facet | Kaur, Gurdip Habibi Lashkari, Arash Sharafaldin, Iman Habibi Lashkari, Ziba |
author_role | aut aut aut aut |
author_sort | Kaur, Gurdip |
author_variant | g k gk l a h la lah i s is l z h lz lzh |
building | Verbundindex |
bvnumber | BV048816585 |
classification_rvk | QK 305 |
classification_tum | WIR 000 |
ctrlnum | (OCoLC)1372481889 (DE-599)BVBBV048816585 |
dewey-full | 332 658.15 |
dewey-hundreds | 300 - Social sciences 600 - Technology (Applied sciences) |
dewey-ones | 332 - Financial economics 658 - General management |
dewey-raw | 332 658.15 |
dewey-search | 332 658.15 |
dewey-sort | 3332 |
dewey-tens | 330 - Economics 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV048816585</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230324</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">230215s2023 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031233425</subfield><subfield code="9">978-3-031-23342-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1372481889</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048816585</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">332</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.15</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QK 305</subfield><subfield code="0">(DE-625)141642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kaur, Gurdip</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)124218208X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding cybersecurity management in decentralized finance</subfield><subfield code="b">challenges, strategies, and trends</subfield><subfield code="c">Gurdip Kaur, Arash Habibi Lashkari, Iman Sharafaldin, Ziba Habibi Lashkari</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 117 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Financial Innovation and Technology</subfield><subfield code="x">2730-969X</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Financial Technology and Innovation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT in Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Innovation and Technology Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Financial engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business information services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technological innovations</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Habibi Lashkari, Arash</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1242182357</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharafaldin, Iman</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Habibi Lashkari, Ziba</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1242182225</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-031-23340-1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034082402&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034082402</subfield></datafield></record></collection> |
id | DE-604.BV048816585 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:31:48Z |
indexdate | 2025-01-29T17:02:37Z |
institution | BVB |
isbn | 9783031233425 |
issn | 2730-969X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034082402 |
oclc_num | 1372481889 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | xvi, 117 Seiten |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer |
record_format | marc |
series2 | Financial Innovation and Technology |
spelling | Kaur, Gurdip Verfasser (DE-588)124218208X aut Understanding cybersecurity management in decentralized finance challenges, strategies, and trends Gurdip Kaur, Arash Habibi Lashkari, Iman Sharafaldin, Ziba Habibi Lashkari Cham Springer [2023] xvi, 117 Seiten txt rdacontent n rdamedia nc rdacarrier Financial Innovation and Technology 2730-969X Financial Technology and Innovation Data and Information Security IT in Business Innovation and Technology Management Financial engineering Data protection Business information services Technological innovations Habibi Lashkari, Arash Verfasser (DE-588)1242182357 aut Sharafaldin, Iman Verfasser aut Habibi Lashkari, Ziba Verfasser (DE-588)1242182225 aut Erscheint auch als Online-Ausgabe 978-3-031-23340-1 Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034082402&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kaur, Gurdip Habibi Lashkari, Arash Sharafaldin, Iman Habibi Lashkari, Ziba Understanding cybersecurity management in decentralized finance challenges, strategies, and trends Financial Technology and Innovation Data and Information Security IT in Business Innovation and Technology Management Financial engineering Data protection Business information services Technological innovations |
title | Understanding cybersecurity management in decentralized finance challenges, strategies, and trends |
title_auth | Understanding cybersecurity management in decentralized finance challenges, strategies, and trends |
title_exact_search | Understanding cybersecurity management in decentralized finance challenges, strategies, and trends |
title_exact_search_txtP | Understanding cybersecurity management in decentralized finance challenges, strategies, and trends |
title_full | Understanding cybersecurity management in decentralized finance challenges, strategies, and trends Gurdip Kaur, Arash Habibi Lashkari, Iman Sharafaldin, Ziba Habibi Lashkari |
title_fullStr | Understanding cybersecurity management in decentralized finance challenges, strategies, and trends Gurdip Kaur, Arash Habibi Lashkari, Iman Sharafaldin, Ziba Habibi Lashkari |
title_full_unstemmed | Understanding cybersecurity management in decentralized finance challenges, strategies, and trends Gurdip Kaur, Arash Habibi Lashkari, Iman Sharafaldin, Ziba Habibi Lashkari |
title_short | Understanding cybersecurity management in decentralized finance |
title_sort | understanding cybersecurity management in decentralized finance challenges strategies and trends |
title_sub | challenges, strategies, and trends |
topic | Financial Technology and Innovation Data and Information Security IT in Business Innovation and Technology Management Financial engineering Data protection Business information services Technological innovations |
topic_facet | Financial Technology and Innovation Data and Information Security IT in Business Innovation and Technology Management Financial engineering Data protection Business information services Technological innovations |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034082402&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kaurgurdip understandingcybersecuritymanagementindecentralizedfinancechallengesstrategiesandtrends AT habibilashkariarash understandingcybersecuritymanagementindecentralizedfinancechallengesstrategiesandtrends AT sharafaldiniman understandingcybersecuritymanagementindecentralizedfinancechallengesstrategiesandtrends AT habibilashkariziba understandingcybersecuritymanagementindecentralizedfinancechallengesstrategiesandtrends |