Back to Search Start Over

Crafting Strategies of Security Breaches

Authors :
Nurul Mardhiah
Heru Susanto
Alifya Kayla Shafa Susanto
Source :
FinTech Development for Financial Inclusiveness
Publication Year :
2022
Publisher :
IGI Global, 2022.

Abstract

In recent years, the number of financial technology players and users have increased at a significant rate due to the rapid technological advancement in financial technology. While smart devices are providing more useful features to users, they have also made it possible for cyber threats to migrate from desktops to smart devices. Thus, it is important for smart device users to be aware that their device could be exposed to cyber threats and that users could protect their devices by employing data-centric cyber security measures. This study reveals how financial technology business model responded to the breach phenomenon by employing data-centric protection approaches. The result is very interesting. Data-centric security is very needed as it is capable of protecting data as a whole. It provides a gapless protection, meaning to say, the data are encrypted and classified wherever it moves. With persistent protection and cross-platform operability, data-centric security will eliminate gaps and keep data protected.

Details

Database :
OpenAIRE
Journal :
FinTech Development for Financial Inclusiveness
Accession number :
edsair.doi...........b30e0db0b5c5d50c8a4b5b7eba2fef04
Full Text :
https://doi.org/10.4018/978-1-7998-8447-7.ch012