Petar, Radanliev (2023): Review and comparison of US, EU, and UK regulations on cyber risk/security of the current Blockchain Technologies - viewpoint from 2023.
Preview |
PDF
MPRA_paper_116885.pdf Download (2MB) | Preview |
Abstract
The results of this study show that cybersecurity standards are not designed in close cooperation between the two major western blocks - US and EU. In addition, while the US is still leading in this area, the security standards for cryptocurrencies, internet-of-things, and blockchain technologies have not evolved as fast as the technologies have. The key finding from this study is that although the crypto market has grown into a multi-trillion industry, the crypto market has also lost over 70% since its peak, causing significant financial loss for individuals and cooperation’s. Despite this significant impact to individuals and society, cybersecurity standards and financial governance regulations are still in their infancy.
Item Type: | MPRA Paper |
---|---|
Original Title: | Review and comparison of US, EU, and UK regulations on cyber risk/security of the current Blockchain Technologies - viewpoint from 2023 |
English Title: | Review and comparison of US, EU, and UK regulations on cyber risk/security of the current Blockchain Technologies - viewpoint from 2023 |
Language: | English |
Keywords: | Cyber Risk Assessment; Cloud Cybersecurity Standards; Financial Governance, DeFi, NIST; ISO27001; IoT; Blockchain Technologies, Metaverse, Cryptocurrencies. |
Subjects: | A - General Economics and Teaching > A3 - Collective Works F - International Economics > F3 - International Finance F - International Economics > F3 - International Finance > F38 - International Financial Policy: Financial Transactions Tax; Capital Controls F - International Economics > F5 - International Relations, National Security, and International Political Economy F - International Economics > F5 - International Relations, National Security, and International Political Economy > F55 - International Institutional Arrangements F - International Economics > F6 - Economic Impacts of Globalization G - Financial Economics > G2 - Financial Institutions and Services G - Financial Economics > G2 - Financial Institutions and Services > G21 - Banks ; Depository Institutions ; Micro Finance Institutions ; Mortgages G - Financial Economics > G2 - Financial Institutions and Services > G23 - Non-bank Financial Institutions ; Financial Instruments ; Institutional Investors G - Financial Economics > G2 - Financial Institutions and Services > G28 - Government Policy and Regulation |
Item ID: | 116885 |
Depositing User: | Dr Petar radanliev |
Date Deposited: | 02 Apr 2023 07:33 |
Last Modified: | 02 Apr 2023 07:33 |
References: | [1] J. Srinivas, A. K. Das, and N. Kumar, “Government regulations in cyber security: Framework, standards and recommendations,” Future Generation Computer Systems, vol. 92, pp. 178–188, Mar. 2019, doi: 10.1016/J.FUTURE.2018.09.063. [2] K. de Fine Licht and J. de Fine Licht, “Artificial intelligence, transparency, and public decision-making,” AI & SOCIETY, pp. 1–10, Mar. 2020, doi: 10.1007/s00146-020-00960-w. [3] G. Falco, A. Noriega, and L. Susskind, “Cyber negotiation: a cyber risk management approach to defend urban critical infrastructure from cyberattacks,” Journal of Cyber Policy, vol. 4, no. 1, pp. 90–116, Jan. 2019, doi: 10.1080/23738871.2019.1586969. [4] M. D. Workman, J. A. Luévanos, and B. Mai, “A Study of Cybersecurity Education Using a Present-Test-Practice-Assess Model,” IEEE Transactions on Education, vol. 65, no. 1, pp. 40–45, 2021. [5] K. D. Mitnick and W. L. Simon, The art of deception: Controlling the human element of security. John Wiley & Sons, 2003. [6] G. Watson, A. Mason, and R. Ackroyd, Social engineering penetration testing: executing social engineering pen tests, assessments and defense. Syngress, 2014. [7] A. Smith, M. Papadaki, and S. M. Furnell, “Improving awareness of social engineering attacks,” in Information Assurance and Security Education and Training, Springer, 2013, pp. 249–256. [8] J. Long, No tech hacking: A guide to social engineering, dumpster diving, and shoulder surfing. Syngress, 2011. [9] A. McIlwraith, Information security and employee behaviour: how to reduce risk through employee education, training and awareness. Routledge, 2021. [10] P. Dixit and S. Silakari, “Deep learning algorithms for cybersecurity applications: A technological and status review,” Computer Science Review, vol. 39, p. 100317, 2021. [11] B. Zohuri, M. Moghaddam, and F. Mossavar-Rahmani, “Business Resilience System Integrated Artificial Intelligence System,” International Journal of Theoretical & Computational Physics, vol. 3, pp. 1–7, 2022. [12] D. U. Case, “Analysis of the cyber attack on the Ukrainian power grid,” Electricity Information Sharing and Analysis Center (E-ISAC), vol. 388, pp. 1–29, 2016. [13] V. Schlatt, T. Guggenberger, J. Schmid, and N. Urbach, “Attacking the trust machine: Developing an information systems research agenda for blockchain cybersecurity,” Int J Inf Manage, vol. 68, p. 102470, Feb. 2023, doi: 10.1016/J.IJINFOMGT.2022.102470. [14] S. Mahmood, M. Chadhar, and S. Firmin, “Cybersecurity Challenges in Blockchain Technology: A Scoping Review,” Hum Behav Emerg Technol, vol. 2022, pp. 1–11, Apr. 2022, doi: 10.1155/2022/7384000. [15] V. Wylde et al., “Cybersecurity, Data Privacy and Blockchain: A Review,” SN Computer Science 2022 3:2, vol. 3, no. 2, pp. 1–12, Jan. 2022, doi: 10.1007/S42979-022-01020-4. [16] S. He et al., “Blockchain-based automated and robust cyber security management,” J Parallel Distrib Comput, vol. 163, pp. 62–82, May 2022, doi: 10.1016/J.JPDC.2022.01.002. [17] A. Hazra, A. Alkhayyat, and M. Adhikari, “Blockchain-aided Integrated Edge Framework of Cybersecurity for Internet of Things,” IEEE Consumer Electronics Magazine, 2022, doi: 10.1109/MCE.2022.3141068. [18] Y. I. Ll. Lucio, K. Marceles Villalba, and S. A. Donado, “Adaptive Blockchain Technology for a Cybersecurity Framework in IIoT,” Revista Iberoamericana de Tecnologias del Aprendizaje, vol. 17, no. 2, pp. 178–184, May 2022, doi: 10.1109/RITA.2022.3166857. [19] O. Cheikhrouhou, I. Amdouni, K. Mershad, M. Ammi, and T. N. Gia, “Blockchain for the Cybersecurity of Smart City Applications,” Jun. 2022, Accessed: Mar. 29, 2023. [Online]. Available: https://arxiv.org/abs/2206.02760v1 [20] M. Liu, W. Yeoh, F. Jiang, and K. K. R. Choo, “Blockchain for Cybersecurity: Systematic Literature Review and Classification,” https://doi.org/10.1080/08874417.2021.1995914, vol. 62, no. 6, pp. 1182–1198, 2021, doi: 10.1080/08874417.2021.1995914. [21] A. Deshmukh, N. Sreenath, A. K. Tyagi, and U. V. E. Abhichandan, “Blockchain Enabled Cyber Security: A Comprehensive Survey,” 2022 International Conference on Computer Communication and Informatics, ICCCI 2022, 2022, doi: 10.1109/ICCCI54379.2022.9740843. [22] R. Prakash, V. S. Anoop, and S. Asharaf, “Blockchain technology for cybersecurity: A text mining literature analysis,” International Journal of Information Management Data Insights, vol. 2, no. 2, p. 100112, Nov. 2022, doi: 10.1016/J.JJIMEI.2022.100112. [23] M. in C. R. (MiCA), “Proposal for a Regulation of the European Parliament and of the Council on Markets in Crypto-assets, and amending Directive (EU) 2019/1937 (MiCA),” 2022. [24] NIST, “NIST Version 1.1,” National Institute of Standards and Technology, U.S. Department of Commerce, 2018. https://www.nist.gov/news-events/news/2018/04/nist-releases-version-11-its-popular-cybersecurity-framework [25] NIST, “Cybersecurity Framework,” 2022. https://www.nist.gov/cyberframework/getting-started [26] Advisera, “What is the meaning of ISO 27001?,” 2022. https://advisera.com/27001academy/what-is-iso-27001/ [27] NIST 800-53, “Security and Privacy Controls for Information Systems and Organizations,” 2020. [28] ISO, “ISO/IEC 27001 and related standards Information security management,” 2022. [29] M. Petrov, “Adapted SANS Cybersecurity Policies for NIST Cybersecurity Framework,” 2021. [30] J. E. Catril Opazo, “NIST cybersecurity framework in south america: Argentina, Brazil, Chile, Colombia, And Uruguay,” 2021. [31] M. J. ALDhanhani, “Review of Cyber Security on Oil and Gas Industry in United Arab Emirates: Analysis on the Effectiveness of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework,” Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 12, no. 11, pp. 714–720, 2021. [32] A.-M. Udroiu, M. Dumitrache, and I. Sandu, “Improving the cybersecurity of medical systems by applying the NIST framework,” in 2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), IEEE, 2022, pp. 1–7. [33] NIST, “NIST Special Publication 800-128,” 2011. [34] NIST, “Block Cipher Techniques,” 2020. https://csrc.nist.gov/Projects/block-cipher-techniques [35] NIST, “Hash Functions,” 2020. https://csrc.nist.gov/Projects/Hash-Functions [36] NIST, “Key Management - Symmetric Block Ciphers, Pair-Wise Key Establishment Schemes,” 2022. [37] NIST, “Post-Quantum Cryptography PQC,” 2022. https://csrc.nist.gov/Projects/post-quantum-cryptography [38] NIST, “Lightweight Cryptography,” 2022. https://csrc.nist.gov/Projects/lightweight-cryptography [39] NIST, “Privacy-Enhancing Cryptography PEC,” 2022. https://csrc.nist.gov/Projects/pec [40] MITRE, “MESSAGETAP,” 2020. [41] T. Kovanen, J. Pöyhönen, and M. Lehto, “Cyber-Threat Analysis in the Remote Pilotage System,” in ECCWS 2021 20th European Conference on Cyber Warfare and Security, Academic Conferences Inter Ltd, 2021, p. 221. [42] Y. Cao, H. Jiang, Y. Deng, J. Wu, P. Zhou, and W. Luo, “Detecting and mitigating ddos attacks in SDN using spatial-temporal graph convolutional network,” IEEE Transactions on Dependable and Secure Computing, 2021. [43] CISCO, “Cisco Firepower Next-Generation Firewall Overview,” 2022. https://www.router-switch.com/cisco-firepower-ngfw.html#:~:text=The Cisco FirepowerTM Next,the network to the endpoint. [44] S. Creese, W. H. Dutton, P. Esteve-González, and R. Shillair, “Cybersecurity capacity-building: cross-national benefits and international divides,” https://doi.org/10.1080/23738871.2021.1979617, vol. 6, no. 2, pp. 214–235, May 2021, doi: 10.1080/23738871.2021.1979617. [45] Y. Hong and S. Furnell, “Understanding cybersecurity behavioral habits: Insights from situational support,” Journal of Information Security and Applications, vol. 57, p. 102710, Mar. 2021, doi: 10.1016/J.JISA.2020.102710. [46] W. Kitler, Cybersecurity in Poland: The Cybersecurity Strategy of the Republic of Poland. 2021. doi: 10.1007/978-3-030-78551-2. [47] F. R. Moreira, D. A. Da Silva Filho, G. D. A. Nze, R. T. De Sousa Junior, and R. R. Nunes, “Evaluating the Performance of NIST’s Framework Cybersecurity Controls Through a Constructivist Multicriteria Methodology,” IEEE Access, 2021, doi: 10.1109/ACCESS.2021.3113178. [48] R. T. Williams and A. Capstone, “Banking and Cybersecurity Governance,” Utica College, Utica, New York, 2021. [49] A. Khan and M. Malaika, “Central Bank Risk Management, Fintech, and Cybersecurity - Mr. Ashraf Khan, Majid Malaika - Google Books,” 2021. [50] P. Cheng, “Decoding the rise of Central Bank Digital Currency in China: designs, problems, and prospects,” Journal of Banking Regulation 2022, pp. 1–15, Feb. 2022, doi: 10.1057/S41261-022-00193-5. [51] T. Hansen and K. Delak, “Security Considerations for a Central Bank Digital Currency,” FEDS Notes, vol. 2022, no. 2970, Feb. 2022, doi: 10.17016/2380-7172.2970. [52] The Federal Reserve, “Central Bank Digital Currency (CBDC),” 2022. [53] The Federal Reserve, “Research & Publications - Central Bank Digital Currency (CBDC),” 2022. https://www.federalreserve.gov/cbdc-research-and-publications.htm [54] ENISA, “EUCS – Cloud Services Scheme,” 2020. [55] ENISA, “Cloud Computing Risk Assessment,” 2009. [56] NIST, “Product Integration using NVD CVSS Calculators,” 2022. [57] CVE, “Current CVSS Score Distribution For All Vulnerabilities,” 2022. [58] N. Stephenson, Snow crash: A novel. Spectra, 2003. [59] Coinmarketcap, “Cryptocurrency Prices by Market Cap,” 2022. https://coinmarketcap.com/ [60] Coingecko, “Cryptocurrency Prices by Market Cap,” 2022. https://www.coingecko.com/ [61] E. Howcroft, “Investors pull $1.6 billion from Binance after CFTC lawsuit | Reuters,” Reuters, Mar. 2023. https://www.reuters.com/legal/investors-pull-16-billion-binance-after-cftc-lawsuit-2023-03-29/ (accessed Mar. 29, 2023). |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/116885 |