Chapter 1
Chapter 1
of Cybersecurity
The Business
of Cybersecurity
Foundations and Ideologies
Ashwini Sathnur
The Business of Cybersecurity: Foundations and Ideologies
Copyright © Business Expert Press, LLC, 2019.
10 9 8 7 6 5 4 3 2 1
Keywords
cybersecurity; trust; information and communication technologies;
hacking; digital financial services; digital fiat currency; blockchain; financial
inclusion; accessibility; innovation
Contents
Acknowledgments....................................................................................ix
Introduction to
Cybersecurity
entry into the computer systems to access and steal data. The software
languages that were existent were used to build and execute software pro-
grams that provided cybersecurity.
The first computer software language that explained much of the
fundamentals of computing was BASIC. Thus, anti-hacking modules
were written first in BASIC language.
LET AFLAG = 0
IF NETWORK != “Connected”
THEN
AFLAG = 0
ELSE
# Data transmission
NETWORK = “Connected”
# Send data over network
WHILE “Data transfer”
IF personA.hackedData() = true
THEN
AFLAG = 1
ENDIF
END WHILE
END IF
IF #AFLAG = 1
THEN
Hacking Data
Cybersecurity module invoked
ENDIF
Index
Accessibility, 15 Data structure of, 4
Agent management, in cash-in and program contribution to, 4–6
cash-out services, 37–38 Data theft, 4, 9
Anti-hacking modules, 2 Database design of cybersecurity
Artificial intelligence (AI), 57 module, 6–7
Database function method, 7
Bank-led model, 27, 34–35 Database modules and programs, 54
BASIC, 2, 3, 4 DBMSAdd() function, 7
Blockchain technology, 9–10 DBMSFindByColumn(), 7
ideologies of theories of, 11–13 DBMSRemoveSelectedOrAll(), 7
Bulk payments, 39, 41 DFS providers, 24–25
support services, 25
C, 3, 4 Digital fiat currency, 9
C++, 3, 4 Digital financial inclusion, 11
“Cash-in and cash-out” (CICO) Digital financial services (DFS)
process, 20, 27, 36–38 ecosystem, 9, 18
Cash-to-mobile transfers, 39 and components
“Closed-loop” payments systems, 27 DFS providers, 24–25
Consumer protection, 54, 55 DFS providers support
Consumers, 24 services, 25
Cross-border remittances, 40–41 enabling environment, 24
Cryptography, 53, 55 infrastructure readiness, 22–23
Cybersecurity insurance services, 26
in BASIC, 2 investment services, 26
building, steps of processes of, 51 loans, 26
data members, 4 payments services, 25–26
data structure, program savings accounts, 26
contribution to, 4–6 transaction accounts, 25
defined, 1 use cases, 26
functional design flowchart for, 3 users, 24
functional methods, 4 defined, 19, 20
modules evolution of, 27–28
database design of, 6–7 financial inclusion benefits of,
of programming for, 4 21–22
theory of, 3–7 focus group technical report, 18
emerging technologies for, 9–10 goal of, 20–22
users of, 9 high-level user requirements, 31
bulk payments, 41
Data communication networks, 23 insurance services, 48–50
Data members, 4 investment services, 47–48
Data privacy, 54, 55 loans, 43–47
70 INDEX