Abstract
Emerging Technologies such as blockchain, continue to transform businesses. Blockchain, or distributed ledger, continues to be deployed in the healthcare, energy, manufacturing, and financial services sectors. Given the disruptive nature of this technology, there is a strong business need to understand the cyber risk associated with blockchain. With this in mind, this investigation posed the following research questions: What are the risks associated with blockchain? How can these risks be evaluated and integrated into corporate decision-making? Multiple quantitative and qualitative methods were used to analyze the data and to identify trends. This analysis identified cyber risk, in the context of blockchain, using the simple and generally accepted definition of cybersecurity as confidentiality, integrity, and availability (CIA). Based on the results, a cyber-physical risk-based approach is presented which equips executives as they develop their thinking around enterprise cyber risk, particularly with emerging technologies such as blockchain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Berke, A. 2017. “How Safe are Blockchains? It Depends.” Harvard Business Review.https://hbr.org/2017/03/how-safe-are-blockchains-it-depends. Accessed February 19, 2020.
Colbert, E. 2017. “Security of Cyber Physical Systems.” Journal of Cyber Security and Information Systems 5: 1. 1–5.
Colbert, E., and Hutchinson, S. 2016. “Intrusion Detection in Industrial Control Systems,” in Cyber-Security of SCADA and Other Industrial Control Systems (eds. E. Colbert & A. Kott). Springer: New York.
Colbert, E., and Kott, A. 2016. Cyber Security of SCADA and Other Industrial Control Systems. Springer: New York.
Deshmukh, A. Mihovska, A., and Prasad, R. 2012. A Cloud Computing Security Schemes:- TGOS [Threshold group-oriented signature] and TMS [Threshold multisignature schemes]. 2012 World Congress on Information and Communications Technology, IEEE. Trivandrum, India. 203–208.
Enisa Threat Landscape Report 2019. European Union Agency for Network and Information Security (ENISA). ISSN2363–3050,https://doi.org/10.2824/622757. https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-2018. Accessed February 1, 2020.
Forrester, J. W. 2007. “System Dynamics—A Personal View of the First Fifty Years.” System Dynamics Review 23: 345–358.
Griffy-Brown, C., Lazarikos, D., and Chun, M. S. 2016. “How Do You Secure an Environment Without a Perimeter? Using Emerging Technology Processes to Support Information Security Efforts in an Agile Data Center.” Journal of Applied Business and Economics 18: 1, 90–102.
Griffy-Brown, Lazarikos, D., and Chun, M. S. 2017. “Cybercrime Business Models: Developing an Approach for Effective Security against Better Organized Criminals.” Journal of Applied Business and Economics 19: 8.
Griffy-Brown, C., Lazarikos, D., and Chun, M. S. 2019. “Emerging Technologies and Risk: How Do We Secure the Internet of Things (IoT) Environment?” Journal of Applied Business and Economics 21: 2.
Griffy-Brown, C., Miller, H., Zhao, V., Lazarikos, D., and Chun, M. 2020. Making Better Risk Decisions in a New Technology Environment. Engineering Management Review 48: 1. 1–10.
Gul, I., Ur Rehman, A., and Islam, M. H. 2013. “Cloud Computing Security Auditing.” Gyeongju, University of Twente, Faculty of Engineering and Mathematics and Computer Science.
Ilanchezhian, J., Varadharassu,V., Ranjeeth, A., and Arun, K. 2012. “To Improve the Current Security Model and Efficiency in Cloud Computing Using Access Control Matrix.” Third International Conference on Computing, Communication, and Networking Technologies (ICCCNT 12). Coimbatore, India. Tamilnadu, 2012. https://doi.org/10.1109/icccnt.2012.6395994.
Kumar, P. S., and Sburamanian, R. 2011. “Homomorpic Storage Security in Cloud Computing.” Information International Interdisciplinary Journal 14: 10. 3465–3476.
Miller, H., and Griffy-Brown, C. 2018. “Developing a Methodology for Assessing Cyber Risk for Business Leaders.” Journal of Applied Business and Economics 20: 3. 100–114.
Munoz, I. A., Gonzalez, J., and Mana, A. 2012. “A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications.” Computer Journal 55: 4. 979–994.
Nishikawa, K., Oki, K., and A. Matsuo, A. 2012. “SaaS Application Framework Using Information Gateway Enabling Cloud Service with Data Confidentiality.” 19th Asia-Pacific Software Engineering Conference. Hong Kong. https://doi.org/10.1109/apsec.2012.133.
Paulson, C., and Byers, P. 2019. National Institute of Standards and Technology, US Department of Commerce. NISTIR 7298 Revision 3, https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.7298r3.pdf, p. 33.
Piscini, E., Dalton, D., and Kehoe, L. 2017. Blockchain and Cyber Security. “Let’s Discuss.” https://www2.deloitte.com/content/dam/Deloitte/ie/Documents/Technology/IE_C_BlockchainandCyberPOV_0417.pdf. Accessed February 20, 2020.
Privacy Canada. 2019. https://privacycanada.net/cryptocurrency/51-attack/. Accessed February 20, 2020.
Rizzo, P. 2016. “So Etheriums Blockchain Is Still Under Attack.” Coin Desk. https://www.coindesk.com/so-ethereums-blockchain-is-still-under-attack. Accessed February 20, 2020.
Tran, D. H., Nguyen, H. L., Zha, W., and Ng, W. K. 2011. “Towards Security in Sharing Data on Cloud-Based Social Networks.” 8th International Conference on Information, Communications, and Signal Processing. Singapore. https://doi.org/10.1109/icics.2011.6173582.
Yin, Robert. 1994. Case Study Research: Design and Methods. Thousand Oaks, CA: Sage.
Strauss and Corbin. 2015. Basics of Qualitative Research: Grounded Theory Procedures and Techniques, 2nd Edition. Thousand Oaks, CA: Sage.
Verizon 2020 Data Breach Investigation Report. VerizonEnterprise.com. https://enterprise.verizon.com/resources/reports/dbir/. Accessed February 20, 2020.
Winters, T. 2014. “How to Solve the Byzantine General Problems.” https://ice3x.co.za/byzantine-generals-problem/. Accessed February 5, 2020.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Griffy-Brown, C., Chun, M.W.S., Miller, H.A., Lazarikos, D. (2021). Blockchain and Cyber Risk: Identifying Areas of Cyber Risk and a Risk-Based Approach for Executives. In: Pompella, M., Matousek, R. (eds) The Palgrave Handbook of FinTech and Blockchain. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-66433-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-66433-6_15
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-66432-9
Online ISBN: 978-3-030-66433-6
eBook Packages: Business and ManagementBusiness and Management (R0)