Skip to main content

Blockchain and Cyber Risk: Identifying Areas of Cyber Risk and a Risk-Based Approach for Executives

  • Chapter
  • First Online:
The Palgrave Handbook of FinTech and Blockchain

Abstract

Emerging Technologies such as blockchain, continue to transform businesses. Blockchain, or distributed ledger, continues to be deployed in the healthcare, energy, manufacturing, and financial services sectors. Given the disruptive nature of this technology, there is a strong business need to understand the cyber risk associated with blockchain. With this in mind, this investigation posed the following research questions: What are the risks associated with blockchain? How can these risks be evaluated and integrated into corporate decision-making? Multiple quantitative and qualitative methods were used to analyze the data and to identify trends. This analysis identified cyber risk, in the context of blockchain, using the simple and generally accepted definition of cybersecurity as confidentiality, integrity, and availability (CIA). Based on the results, a cyber-physical risk-based approach is presented which equips executives as they develop their thinking around enterprise cyber risk, particularly with emerging technologies such as blockchain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Berke, A. 2017. “How Safe are Blockchains? It Depends.” Harvard Business Review.https://hbr.org/2017/03/how-safe-are-blockchains-it-depends. Accessed February 19, 2020.

  • Colbert, E. 2017. “Security of Cyber Physical Systems.” Journal of Cyber Security and Information Systems 5: 1. 1–5.

    Google Scholar 

  • Colbert, E., and Hutchinson, S. 2016. “Intrusion Detection in Industrial Control Systems,” in Cyber-Security of SCADA and Other Industrial Control Systems (eds. E. Colbert & A. Kott). Springer: New York.

    Google Scholar 

  • Colbert, E., and Kott, A. 2016. Cyber Security of SCADA and Other Industrial Control Systems. Springer: New York.

    Google Scholar 

  • Deshmukh, A. Mihovska, A., and Prasad, R. 2012. A Cloud Computing Security Schemes:- TGOS [Threshold group-oriented signature] and TMS [Threshold multisignature schemes]. 2012 World Congress on Information and Communications Technology, IEEE. Trivandrum, India. 203–208.

    Google Scholar 

  • Enisa Threat Landscape Report 2019. European Union Agency for Network and Information Security (ENISA). ISSN2363–3050,https://doi.org/10.2824/622757. https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2018. Accessed February 1, 2020.

  • Forrester, J. W. 2007. “System Dynamics—A Personal View of the First Fifty Years.” System Dynamics Review 23: 345–358.

    Google Scholar 

  • Griffy-Brown, C., Lazarikos, D., and Chun, M. S. 2016. “How Do You Secure an Environment Without a Perimeter? Using Emerging Technology Processes to Support Information Security Efforts in an Agile Data Center.” Journal of Applied Business and Economics 18: 1, 90–102.

    Google Scholar 

  • Griffy-Brown, Lazarikos, D., and Chun, M. S. 2017. “Cybercrime Business Models: Developing an Approach for Effective Security against Better Organized Criminals.” Journal of Applied Business and Economics 19: 8.

    Google Scholar 

  • Griffy-Brown, C., Lazarikos, D., and Chun, M. S. 2019. “Emerging Technologies and Risk: How Do We Secure the Internet of Things (IoT) Environment?” Journal of Applied Business and Economics 21: 2.

    Google Scholar 

  • Griffy-Brown, C., Miller, H., Zhao, V., Lazarikos, D., and Chun, M. 2020. Making Better Risk Decisions in a New Technology Environment. Engineering Management Review 48: 1. 1–10.

    Google Scholar 

  • Gul, I., Ur Rehman, A., and Islam, M. H. 2013. “Cloud Computing Security Auditing.” Gyeongju, University of Twente, Faculty of Engineering and Mathematics and Computer Science.

    Google Scholar 

  • Ilanchezhian, J., Varadharassu,V., Ranjeeth, A., and Arun, K. 2012. “To Improve the Current Security Model and Efficiency in Cloud Computing Using Access Control Matrix.” Third International Conference on Computing, Communication, and Networking Technologies (ICCCNT 12). Coimbatore, India. Tamilnadu, 2012. https://doi.org/10.1109/icccnt.2012.6395994.

  • Kumar, P. S., and Sburamanian, R. 2011. “Homomorpic Storage Security in Cloud Computing.” Information International Interdisciplinary Journal 14: 10. 3465–3476.

    Google Scholar 

  • Miller, H., and Griffy-Brown, C. 2018. “Developing a Methodology for Assessing Cyber Risk for Business Leaders.” Journal of Applied Business and Economics 20: 3. 100–114.

    Google Scholar 

  • Munoz, I. A., Gonzalez, J., and Mana, A. 2012. “A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications.” Computer Journal 55: 4. 979–994.

    Google Scholar 

  • Nishikawa, K., Oki, K., and A. Matsuo, A. 2012. “SaaS Application Framework Using Information Gateway Enabling Cloud Service with Data Confidentiality.” 19th Asia-Pacific Software Engineering Conference. Hong Kong. https://doi.org/10.1109/apsec.2012.133.

  • Paulson, C., and Byers, P. 2019. National Institute of Standards and Technology, US Department of Commerce. NISTIR 7298 Revision 3, https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.7298r3.pdf, p. 33.

  • Piscini, E., Dalton, D., and Kehoe, L. 2017. Blockchain and Cyber Security. “Let’s Discuss.” https://www2.deloitte.com/content/dam/Deloitte/ie/Documents/Technology/IE_C_BlockchainandCyberPOV_0417.pdf. Accessed February 20, 2020.

  • Privacy Canada. 2019. https://privacycanada.net/cryptocurrency/51-attack/. Accessed February 20, 2020.

  • Rizzo, P. 2016. “So Etheriums Blockchain Is Still Under Attack.” Coin Desk. https://www.coindesk.com/so-ethereums-blockchain-is-still-under-attack. Accessed February 20, 2020.

  • Tran, D. H., Nguyen, H. L., Zha, W., and Ng, W. K. 2011. “Towards Security in Sharing Data on Cloud-Based Social Networks.” 8th International Conference on Information, Communications, and Signal Processing. Singapore. https://doi.org/10.1109/icics.2011.6173582.

  • Yin, Robert. 1994. Case Study Research: Design and Methods. Thousand Oaks, CA: Sage.

    Google Scholar 

  • Strauss and Corbin. 2015. Basics of Qualitative Research: Grounded Theory Procedures and Techniques, 2nd Edition. Thousand Oaks, CA: Sage.

    Google Scholar 

  • Verizon 2020 Data Breach Investigation Report. VerizonEnterprise.com. https://enterprise.verizon.com/resources/reports/dbir/. Accessed February 20, 2020.

  • Winters, T. 2014. “How to Solve the Byzantine General Problems.” https://ice3x.co.za/byzantine-generals-problem/. Accessed February 5, 2020.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Charla Griffy-Brown .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Griffy-Brown, C., Chun, M.W.S., Miller, H.A., Lazarikos, D. (2021). Blockchain and Cyber Risk: Identifying Areas of Cyber Risk and a Risk-Based Approach for Executives. In: Pompella, M., Matousek, R. (eds) The Palgrave Handbook of FinTech and Blockchain. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-66433-6_15

Download citation

Publish with us

Policies and ethics