Countering Cyber Threats to Financial Institutions
eBook - ePub

Countering Cyber Threats to Financial Institutions

A Private and Public Partnership Approach to Critical Infrastructure Protection

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Countering Cyber Threats to Financial Institutions

A Private and Public Partnership Approach to Critical Infrastructure Protection

About this book

Exploring the negative social impact of cyber-attacks, this book takes a closer look at the challenges faced by both the public and private sectors of the financial industry. It is widely known amongst senior executives in both sectors that cybercrime poses a real threat, however effective collaboration between individual financial institutions and the public sector into detecting, monitoring and responding to cyber-attacks remains limited. Addressing this problem, the authors present the results from a series of interviews with cybersecurity professionals based in Canada in order to better understand the potential risks and threats that financial institutions are facing in the digital age. Offering policy recommendations for improving cybersecurity protection measures within financial institutions, and enhancing the sharing of information between the public and private sector, this book is a timely and invaluable read for those researching financial services, cybercrime and risk management, as well as finance professionals interested in cybersecurity.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Countering Cyber Threats to Financial Institutions by Pierre-Luc Pomerleau,David L. Lowery in PDF and/or ePUB format, as well as other popular books in Business & Financial Engineering. We have over one million books available in our catalogue for you to explore.

Information

Š The Author(s) 2020
P.-L. Pomerleau, D. L. LoweryCountering Cyber Threats to Financial Institutionshttps://doi.org/10.1007/978-3-030-54054-8_1
Begin Abstract

1. Contemporary Cybersecurity in Our Daily Lives

Pierre-Luc Pomerleau1 and David L. Lowery2
(1)
School of Business, Northcentral University, Granby, QC, Canada
(2)
School of Business, Northcentral University, Panama City, FL, USA
Pierre-Luc Pomerleau
End Abstract

Introduction

In contemporary modern society, we are all virtually surrounded by a plethora of internet-connected computing devices that are essentially “baked into” into any number of our everyday routines. These devices range from the obvious—cell phones, computers/laptops/tablets, smart televisions, smart watches, and interactive home exercise equipment—to more subtle devices such as our modern automobiles, high-tech kitchen appliances, and even the garage door opener. We activate our virtual assistants with the sound of our voice, routinely gather our daily news, communicate, date, shop, attend virtual college courses, make travel reservations, and conduct our financial affairs all online. With a few clicks of a button or verbal commands, our logistical and financial well-being is at our fingertips—in real-time from virtually anywhere—a digital connection can be made.
As Singer and Friedman (2014) point out, for all the conveniences and opportunities afforded to us with instant access—on-demand—in today’s information age, unfortunately this easy access has also given rise to wide-spread “cyber anxiety.” Fears of nefarious internet-enabled threats have slowly intertwined into America’s national subconscious. Today’s notions of digital security, physical security, financial/economic security, and even our individual identities and privacy needs all meld together into a pervasive sense of collective vulnerability. Any number of collective vulnerabilities can affect us all—ranging from power plants, financial institutions, transportation systems, and the availability of consumable commodities.
While some degree of cyber-threat awareness and the practice of good cyber-hygiene/digital security is becoming more common place, cybersecurity is “one of those areas that has been left to only the most technically inclined to worry [about]…anything related to the digital world of zeroes and ones [is] an issue for computer scientists and the IT help desk…some threats are overblown, while others are ignored” (Singer and Friedman, 2014, pp. 5–6).

A Broad View of Cybercriminals

Unfortunately, cyber-enabled criminal activity is continuously evolving and is extremely unlikely to diminish anytime soon. Nation-state actors and individual hackers alike can make hundreds, thousands, or even millions of people unsuspecting victims using stolen personal identities to generate fraudulent identities or access stolen credit card data to generate fake financial transactions. According to the 2018 McAfee Annual Cybersecurity Report written by Lewis (2018), McAfee; the American-based global computer security company, suggests a good estimate is a full two-thirds of people operating online today—more than two billion users—have had their personal/financial information stolen or compromised. Thus, cybercrime is an incredibly important topic that can potentially impact everyone and cause significant disruptions to many aspects of our daily lives.
According to both Buono (2014) and Lewis (2018), for those higher-end and technically-savvy cybercriminals who have the technical knowledge and capabilities to be successful in their nefarious cybercrimes, the perceived rewards often outweigh the perceived risks of getting caught and subsequently punished. This perceived “low risk” activity is aided by the relatively high degree of anonymity afforded in cyberspace—a medium through which crimes can be committed that would never be possible in the physical off-line world (Buono, 2014). This unique combination of factors makes cybercriminal activities a lucrative industry—with a smart (and lucky) cybercriminal making potentially hundreds of thousands or even millions of dollars with only a minimal chance of arrest or jail time. Even if a cyber-perpetrator is eventually identified as being behind a successful cyberattack, law enforcement officials can find themselves hamstrung by geopolitical or international boundaries that make criminal arrests and overall enforcement incredibly difficult (Lewis, 2018). This is why cybersecurity-minded organization focus their primary efforts on continuous risk mitigation and preventative measures. This dynamic also explains why malicious cybercrimes continue to persist at such a large scale and why cybersecurity is such a critically important component of all modern e-commerce worldwide.
Just as contemporary IT-related technologies are continuously evolving at a lightning-fast pace, so too are high-tech cybercriminals. As the IT Industry has collectively moved toward cloud computing, enhanced encryption methodologies, and artificial intelligence (AI)-enabled software capabilities, so too have those same high-tech cybercriminals moved to take advantage of potential vulnerabilities within each platform or new capability (Ashford, 2018; Cowley, 2018; Lewis, 2018). While there is a natural inclination for public organizations and private industries alike to seek out the most cutting-edge and high-performance IT system-based capabilities possible—with the expectation that these “box solutions” will help protect their respective organizations from cyberattacks, this is seldom the case.
An organization’s cyber-defenses are only as good as its weakest link…and this often ends up not being a technical deficiency, but rather unsuspecting “flesh and blood” employees who fail to maintain even the most basic of cyber-hygiene protocols or mistakenly click on a phishing link hidden in a harmless looking email. Beyond ignorance, potential insider threats are another distinct challenge for organizations because of the increased difficulty in detecting “in-house” activities when so much of modern cybersecurity efforts are outward-focused beyond the organization’s IT firewalls. Clearly, the ever-evolving challenges of cybersecurity—the mitigation of cyber-vulnerabilities through the comprehensive prevention, detection, and protective response to unauthorized activities—is by no means exclusively an American problem, but rather a worldwide problem. Cybersecurity threats and mitigation efforts span to virtually every corner of the globe. Every modern governmental organization, financial institution, and business organization with any type of online presence, e-commerce activities, or a public interest shares in the collective threats of faceless cyber-enabled threats by disreputable actors.

Recent Cyberattack Trends

In July 2019, Internet Society’s Online Trust Alliance (OTA) released its 11th Annual Cyber Incident & Breach Trends Report, which provides a global overview of publicly released cyberattack incidents and offers key mitigation steps public and private organizations alike can take to reduce cyber vulnerabilities to their own networks, thus limiting potential damage. This most recent OTA annual trends analysis reported a total of two million reported cyber incident...

Table of contents

  1. Cover
  2. Front Matter
  3. 1. Contemporary Cybersecurity in Our Daily Lives
  4. 2. Relevance of Evidence-Based Cybersecurity in Guiding the Financial Sector’s and Efforts in Fighting Cybercrime
  5. 3. The Evolution of Cybersecurity within the American Financial Sector
  6. 4. The Evolution of the Threats to Canadian Financial Institutions, the Actual State of Public and Private Partnerships in Canada
  7. 5. Major Themes in the Literature of Cybersecurity and Public–Private Partnerships; A Focus on Financial Institutions
  8. 6. Research Findings; Contemporary Perceptions of Canadian Security Professionals Regarding the Challenges in Sharing Information with the Public Sector
  9. 7. Conclusions and Implications for Practice and Future Studies on Public–Private Partnerships
  10. Back Matter