EmergentX Digital Asset Outlook 2022 - The Year of Consilience

Page 264

Digital Asset Outlook 2022

Theme 12. Cybersecurity

12.3 Potential solutions to cybersecurity attacks Cybersecurity solutions and regulatory controls are critical to an effective cybersecurity strategy for digital assets. Below we discuss some proven ways to prevent cybersecurity breaches. Figure 118. Cybersecurity for digital assets – Potential solutions to cyberattacks Potential solutions

Significance

Adopt access controls

Access controls prevent employees from providing customer information to unauthorized individuals who may seek to obtain this information through fraudulent means.

Use threat modelling

Threat modelling conducted by software developers can analyze and mitigate threats.

Encrypt information

The encryption of electronic customer information (including those stored on networks or systems) helps prevent unauthorized individuals from gaining access.

Use attack detection systems

Attack Detection Systems can detect actual and attempted attacks on or intrusions into customer information systems.

Adopt cybersecurity audit program

An adequately structured audit program can evaluate cybersecurity risk management practices, internal control systems, and regulatory compliance.

Install response programs

Response programs can specify actions to be taken, make reports to regulatory and law enforcement agencies when the financial institution suspects or detects access by unauthorized individuals to systems.

Install digital asset management software

Digital asset management software helps improve cloud metrics for security by storing assets in a single location and making them available worldwide.

Adopt Two-Factor Authentication

Two-factor authentication (2FA) adds a second method of identity verification to secure accounts and increases security. The first method is the password, the added second method being something unique to users, such as a fingerprint.

Source: Deloitte, Mckinsey

264


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

13.2 Crypto-philanthropy – Key considerations for donors and non-profits

1min
page 274

13.1 What is Crypto-philanthropy?

0
page 273

12.5 Cybersecurity for digital assets – Industry metrics

1min
page 266

12.6 Cybersecurity for digital assets – Future outlook and key themes

7min
pages 267-272

12.4 How cybersecurity adds value to the existing digital assets ecosystem

0
page 265

12.3 Potential solutions to cybersecurity attacks

1min
page 264

12.2 Key categories of cyberattacks related to cryptocurrency

3min
pages 262-263

12.1 Cybersecurity in the context of digital assets

2min
pages 260-261

1.7 Approaches for gaining exposure to digital assets

12min
pages 62-68

1.6 Digital asset in portfolio construction

1min
page 61

1.5 Valuation approaches to digital assets

2min
pages 59-60

1.4 Digital asset as an investable asset class

20min
pages 46-58

1.2 Characteristics of digital assets

0
page 44

Theme 12: Cybersecurity in 2022

1min
pages 35-36

Bonus Theme: Crypto-Philanthropy in 2022

5min
pages 37-40

Theme 11: Consensus Mechanisms in 2022

1min
page 34

Theme 9: Blockchain Scalability in 2022

1min
page 32

Theme 10: Tokenomics in 2022

1min
page 33

Theme 6: Regulation and Institutionalization in 2022

3min
pages 27-28

Theme 7: Centralized and Decentralized Exchanges in 2022

1min
pages 29-30

Theme 1: Digital Asset Economy in 2022

2min
pages 17-18

Theme 4: NFT and Metaverse in 2022

3min
pages 23-24

Theme 5: Blockchain Gaming in 2022

1min
pages 25-26

Theme 8: Asset Tokenization in 2022

1min
page 31

Theme 3: DeFi in 2022

2min
pages 21-22

Theme 2: Web 3.0 in 2022

1min
pages 19-20
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.