Nothing Special   »   [go: up one dir, main page]

Pandher et al., 2022 - Google Patents

Blockchain Risk, Governance Compliance, Assessment and Mitigation

Pandher et al., 2022

Document ID
8808375666715924100
Author
Pandher B
Nagavamshi M
Prajapati P
Kundru V
Publication year
Publication venue
The Auditor’s Guide to Blockchain Technology

External Links

Snippet

This chapter discusses a total of seventeen blockchain-related risks, four major regulations/standards and ten COSO-based blockchain good practices. The risks, regulations and good practices presented in this chapter should enable assurance …
Continue reading at api.taylorfrancis.com (other versions)

Similar Documents

Publication Publication Date Title
Johnson Security controls evaluation, testing, and assessment handbook
Kissel Glossary of key information security terms
Silowash et al. Common sense guide to mitigating insider threats
Swanson et al. Generally accepted principles and practices for securing information technology systems
Gordon Official (ISC) 2 guide to the CISSP CBK
Salim Cyber safety: A systems thinking and systems theory approach to managing cyber security risks
Goodenough et al. Toward a theory of assurance case confidence
WO2019194803A1 (en) Systems and methods for personal identification and verification
Glaessner et al. Electronic Security: Risk Mitigation in Financial Transactions: Public Policy Issues
Silowash et al. Common sense guide to mitigating insider threats 4th edition
Paul Official (ISC) 2 Guide to the CSSLP
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
Parker Managing threats to health data and information: toward security
Skinner California's Database Breach Notification Security Act: The First State Breach Notification Law Is Not Yet A Suitable Template For National Identity Theft Legislation
Beissel Cybersecurity investments: Decision support under economic aspects
Weiss et al. Auditing IT infrastructures for compliance
Haber et al. Regulatory compliance
Zarei Risk management of internet banking
Parker Healthcare regulations, threats, and their impact on cybersecurity
Grossman Blaming the Victim: How FTC Data Security Enforcement Actions Make Companies and Consumers More Vulnerable to Hackers
Pandher et al. Blockchain Risk, Governance Compliance, Assessment and Mitigation
May et al. Defense in depth: Foundations for secure and resilient it enterprises
Pandher et al. Blockchain risk assessment and mitigation
Smith et al. 14 Corrupt misuse of information and communications technologies
Alwan Policy Development and Frameworks for Cyber Security in Corporates and Law Firms