Advertisement

FinSec 3.0: Theory and Practices in Financial Enterprise

  • Yang LiEmail author
  • Jing-Ping Qiu
  • Qing Xie
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)

Abstract

The rapid growth of information and communications technology (ICT) and implementation of financial technology together make it more convenient for enterprises to do business. Meanwhile, the innovations change the ecosystem of financial industry but also present potential threats. Cloud computing, mobile working application, and smart city system are being deployed to enhance life and working conditions for citizens. Nevertheless, cyber-attacks are increasing while security awareness and protection measures need to be improved. In this paper, security theory and practices of the use of cloud, mobile apps, and smart city system are to discuss. Connected with practice of practitioners in the industry, ideas of security architectures are presented and featured as key points of the financial security 3.0 framework.

Keywords

FinTech FinSec 3.0 Cloud computing Mobile security Smart city 

References

  1. 1.
    Dattani, I.: Financial Services and FinTech - A Review of the Cyber Security Threats and Implications (2016)Google Scholar
  2. 2.
    Ifinedo, P.: Information technology security management concerns in global financial services institutions. Inf. Manag. Comput. Secur. 17(5), 372–387 (2009)CrossRefGoogle Scholar
  3. 3.
    Shaikh, F.B., Haider, S.: Security threats in cloud computing. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 214–219. IEEE (2011)Google Scholar
  4. 4.
    Gartner: Seven cloud-computing security risks. InfoWorld. https://www.infoworld.com/article/2652198/security/gartner–seven-cloud-computing-security-risks.html. Accessed 16 April 2018
  5. 5.
    Kozlovszky, M.: Cloud security monitoring and vulnerability management. In: Nádai, L., Padányi, J. (eds.) Critical Infrastructure Protection Research. TIEI, vol. 12, pp. 123–139. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-28091-2_11CrossRefGoogle Scholar
  6. 6.
    Jain, A.K., Shanbhag, D.: Addressing security and privacy risks in mobile applications. IT Prof. 14(5), 28–33 (2012)CrossRefGoogle Scholar
  7. 7.
    Unhelkar, B., Murugesan, S.: The enterprise mobile applications development framework. IT Prof. 12(3), 33–39 (2010)CrossRefGoogle Scholar
  8. 8.
    Elmaghraby, A.S., Losavio, M.M.: Cyber security challenges in smart cities: safety, security and privacy. J. Adv. Res. 5(4), 491–497 (2014)CrossRefGoogle Scholar
  9. 9.
    Cerrudo, C.: An emerging us (and world) threat: cities wide open to cyber attacks. Securing Smart Cities (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Ping An Technology Inc.ShenzhenChina
  2. 2.Ping An Academy of Financial SecurityShenzhenChina

Personalised recommendations