Pandher et al., 2022 - Google Patents
Blockchain Risk, Governance Compliance, Assessment and MitigationPandher et al., 2022
- Document ID
- 8808375666715924100
- Author
- Pandher B
- Nagavamshi M
- Prajapati P
- Kundru V
- Publication year
- Publication venue
- The Auditor’s Guide to Blockchain Technology
External Links
Snippet
This chapter discusses a total of seventeen blockchain-related risks, four major regulations/standards and ten COSO-based blockchain good practices. The risks, regulations and good practices presented in this chapter should enable assurance …
- 230000000116 mitigating effect 0 title description 12
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Johnson | Security controls evaluation, testing, and assessment handbook | |
Kissel | Glossary of key information security terms | |
Silowash et al. | Common sense guide to mitigating insider threats | |
Swanson et al. | Generally accepted principles and practices for securing information technology systems | |
Gordon | Official (ISC) 2 guide to the CISSP CBK | |
Salim | Cyber safety: A systems thinking and systems theory approach to managing cyber security risks | |
Goodenough et al. | Toward a theory of assurance case confidence | |
WO2019194803A1 (en) | Systems and methods for personal identification and verification | |
Glaessner et al. | Electronic Security: Risk Mitigation in Financial Transactions: Public Policy Issues | |
Silowash et al. | Common sense guide to mitigating insider threats 4th edition | |
Paul | Official (ISC) 2 Guide to the CSSLP | |
Dash et al. | Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications | |
Parker | Managing threats to health data and information: toward security | |
Skinner | California's Database Breach Notification Security Act: The First State Breach Notification Law Is Not Yet A Suitable Template For National Identity Theft Legislation | |
Beissel | Cybersecurity investments: Decision support under economic aspects | |
Weiss et al. | Auditing IT infrastructures for compliance | |
Haber et al. | Regulatory compliance | |
Zarei | Risk management of internet banking | |
Parker | Healthcare regulations, threats, and their impact on cybersecurity | |
Grossman | Blaming the Victim: How FTC Data Security Enforcement Actions Make Companies and Consumers More Vulnerable to Hackers | |
Pandher et al. | Blockchain Risk, Governance Compliance, Assessment and Mitigation | |
May et al. | Defense in depth: Foundations for secure and resilient it enterprises | |
Pandher et al. | Blockchain risk assessment and mitigation | |
Smith et al. | 14 Corrupt misuse of information and communications technologies | |
Alwan | Policy Development and Frameworks for Cyber Security in Corporates and Law Firms |