Back to Search
Start Over
Crafting Strategies of Security Breaches
- Source :
- FinTech Development for Financial Inclusiveness
- Publication Year :
- 2022
- Publisher :
- IGI Global, 2022.
-
Abstract
- In recent years, the number of financial technology players and users have increased at a significant rate due to the rapid technological advancement in financial technology. While smart devices are providing more useful features to users, they have also made it possible for cyber threats to migrate from desktops to smart devices. Thus, it is important for smart device users to be aware that their device could be exposed to cyber threats and that users could protect their devices by employing data-centric cyber security measures. This study reveals how financial technology business model responded to the breach phenomenon by employing data-centric protection approaches. The result is very interesting. Data-centric security is very needed as it is capable of protecting data as a whole. It provides a gapless protection, meaning to say, the data are encrypted and classified wherever it moves. With persistent protection and cross-platform operability, data-centric security will eliminate gaps and keep data protected.
Details
- Database :
- OpenAIRE
- Journal :
- FinTech Development for Financial Inclusiveness
- Accession number :
- edsair.doi...........b30e0db0b5c5d50c8a4b5b7eba2fef04
- Full Text :
- https://doi.org/10.4018/978-1-7998-8447-7.ch012