The Assessment of Cyber Security’s Significance in the Financial Sector of Lithuania
DOI:
https://doi.org/10.13052/jcsm2245-1439.1243Keywords:
Cyber risk, Cyber Security, financial sector, risk managementAbstract
Constantly evolving high technologies provide new approaches to business development and deliver unknown business risks. Online financial services and operations are integral to everyday life, making cyber risk one of the most relevant risks for the financial sector’s companies. As the survey conducted by the National Bank of Lithuania at the end of 2018 showed, the possibility of cyber threats and presumable effects on the financial system in Lithuania is one of the critical problems that should be prioritized. Therefore, it is essential to clarify what potential cyber threats in financial sector companies are considered the most significant and likely to occur. As well as identify how companies in the financial sector estimate their dispositions and preparedness for this cyber risk management and control. The findings of this research are significant for financial institutions as a tool to adopt their cyber risk management processes, increase preparedness and cyber security, and identify the possible threats to the organization.
Downloads
References
Advisen. (2018). The Future of cyber risk modeling. 18 April, 2018, London. Available at: https://www.advisenltd.com/2018/04/24/the-future-of-cyber-risk-modeling/.
Assaf A, (2008). Automation, Stock Market Volatility, and Risk-Return Relationship. Investment Management and Financial Innovations, 3/2005.
Belton, V.; Stewart, T. Multiple Criteria Decision Analysis: An Integrated Approach. ISBN: 978-0-7923-7505-0.
Cebula, J.J.; L.R. Young. 2010. A taxonomy of Operational Cyber Security Risks. Technical Note CMU/SEI-2010-TN-028, Software Engineering Institute, Carnegie Mellon University.
Chang, A., Zhong, L., Grabosky, P., Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime. Regulation & Governance (2018) 12, 101–114. DOI: 10.1111/rego.12125.
Chapelle, A., Crama, Y., Huebner, G., Peters, J.-P. 2018. Practical methods for measuring and managing operational risk in the financial sector: a clinical study. Banking & Finance 32(6).
Chubb Cyber Index: Providing Data-Driven Insight on Cyber Threat Trends. Available at: https://chubbcyberindex.com/#/incident-growth.
Cybersecurity Ventures Marcadet T. 2020. Navigating through Cyber Risk.
European Union (2016) Regulation 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons about the processing of personal data and the free movement of such data, and repealing Directive 95/46/EC (GDPR).
Hwang, C.L. and Yoon, K. (1981) Multiple Attribute Decision Making: Methods and Applications. Springer-Verlag, New York.
Kaspersky Lab, “Damage Control: The Cost of Security Breaches,” 2015. As of 4 January, 2018: https://media.kaspersky.com/pdf/it-risks-survey-report-cost-of-security-breaches.pdf.
KOVRR. Cybersecurity Investments vs. Actual Risk and Cyber Risk Mitigation. 2022. https://www.kovrr.com/blog-post/cybersecurity-investments-vs-actual-risk-and-cyber-risk-mitigation.
Markovic, Z. Modification of TOPSIS method for solving multi-criteria tasks. Yugoslav Journal of Operations Research 20(1). DOI: 10.2298/YJOR1001117M.
Merriam-Webster Inc./ Online Dictionary. Available at: https://www.merriam-webster.com/dictionary/cybersecurity.
National Bank of Lithuania. 2018. Survey: Cybercrimes are the most significant risk to the domestic financial system. Available at: https://www.lb.lt/en/news/survey-cybercrimes-are-the-greatest-risk-to-the-domestic-financial-system.
National Institute of Standards and Technology, Standards for Security Categorization of Federal Information and Information Systems, FIPS 199, 2004. As of 4 January 2018: http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.199.pdf.
Opricovic, S.; Tzeng, G-H. 2004. Compromise solution by MCDM methods: A comparative analyses of VIKON and TOPSIS. European Journal of Operational Research. 156:445–455.
Sheth, A.; Bhosale, S.; Kurupka, F. 2021. Research Paper on Cyber Security. Contemporary Research in India (ISSN 2231-2137. Special Issue: April 2021.
Stubley D. (2013). What is Cyber Security? Independent Information Security Center. Oxford.
Velasquez, M., & Hester, P. T. (2013). An analysis of multi-criteria decision-making methods. International Journal of Operations Research, 10(2), 56–66.
World Economic Forum. The Global Risks Report 2020. 15th edition, in partnership with Marsh & McLennan and Zurich Insurance Group. Available at: http://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf.
Wu, W.; Kang, R.; Li, Z. Risk assessment method for the cyber security of cyber-physical systems. In Proceedings of the 2015 First International Conference on Reliability Systems Engineering (ICRSE), Beijing, China, 21–23 October 2015.
Zhao, X.; Xue, L.; Whinston, A. 2009. Managing Interdependent Information Security Risks: An Investigation of Commercial Cyber insurance and Risk Pooling Arrangement Thirtieth International Conference on Information Systems, p. 189–239.
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Cyber Security and Mobility
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.