Index

A

Acceptance, risk
Advanced persistent threat (APT)
Adversary, cyber threats
insider vs. outsider perspectives
intentional/unintentional actions
lack of data
OWASP
skill levels
typology of
Antelope metaphor
Antifragile
Apache Struts vulnerability
Application support team
Attackers
Automated clearing house (ACH)
Automated Teller Machine (ATM) services
attacks
bank clients
Channel owner
data transfer and message sequence integrity
fraud
information
internal control, Banks
security responsibilities
shared industry networks
transaction flow

B

Bank of International Settlements (BIS)
Breach
calculation
cost estimate
cybersecurity
impact analysis
loss categories
risk
scenario
creation
selection
Business E-mail Compromise (BEC)
controls
identification of attack, FBI
process dimensions ...

Get Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.