This study proposes a smart contract risk management model built on the NIST Risk Management Framework (RMF) to help identify, assess, and manage the risks of smart contracts. While smart contracts are beloved as a me...
This study proposes a smart contract risk management model built on the NIST Risk Management Framework (RMF) to help identify, assess, and manage the risks of smart contracts. While smart contracts are beloved as a means to automate and disintermediate business processes, their security vulnerabilities can be critical. The main issue discussed in this paper is the lack of a holistic approach to risk management smart contracts. The resulting framework consists of six steps: Risk identification, assessment, prioritization, mitigation, testing, and continuous monitoring (and was developed through reviewing existing literature on smart contract security and the NIST RMF). It is recommended that a case study be performed to prove the proposed model's effectiveness in managing the risks of smart contracts and minimizing financial losses and reputational harm. The paper presents a risk management framework for smart contracts to increase trust and adoption to enhance security while reducing financial losses and reputation damage. This has wider implications for the security of smart contracts and can be used as a starting point for future work. This study is expected to significantly contribute to smart contract security by introducing an organized way to address these contracts' risks using the NIST RMF.
The field of the Internet of Medical Things (IoMT) is experiencing significant growth as it involves the integration of medical devices and systems with the internet and various digital technologies. This study provid...
详细信息
Crop Yield Analysis and Prediction is a fast-expanding discipline that is critical for optimizing agricultural methods. A lack of trustworthy data is one of the challenges in estimating crop yields. We develop predict...
详细信息
Tactile sensing, which relies on direct physical contact, is critical for human perception and underpins applications in computer vision, robotics, and multimodal learning. Because tactile data is often scarce and cos...
详细信息
In this work we present the results of the creation and evaluation of a tool prototype that automatically calculates the size of the non-functional requirements (NFR) of the User Interface 2.1 subcategory of the SNAP ...
详细信息
Humans can flexibly extend word usages across different grammatical classes, a phenomenon known as word class conversion. Noun-to-verb conversion, or denominal verb (e.g., to Google a cheap flight), is one of the most...
详细信息
The Variational Quantum Eigensolver (VQE) is a promising quantum algorithm for applications in chemistry within the Noisy Intermediate-Scale Quantum (NISQ) era. The ability for a quantum computer to simulate electroni...
详细信息
The rapid growth of digital payment platforms like OVO, ShopeePay, and GoPay in Indonesia has driven the need for businesses to optimize marketing strategies by analyzing customer interactions through social media. Th...
详细信息
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their abi...
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their ability to withstand these malicious threats. This study examines the impact and importance of organizational security culture in ransomware threat mitigation. We have surveyed five organizations, giving points from 1 to 5 for each question on cultural factors, leadership support, employee awareness and involvement (compliance), communication, behavior change or BBS practice incorporation, learning/training delivery methodology, and Size and industry impact on their security culture. The results indicate that a robust security culture, with leadership and effective communication, builds stronger resilience to ransomware. Organizations with jointly accountable cybersecurity and training practices are highly efficient. Suggestions range from establishing a secure environment to increasing management buy-in and integrating compliance. This work helps advance our understanding of ransomware resilience and highlights the key role of organizational security culture. The resulting learnings can help to inform organizations' security posture, ultimately helping them better protect their defenses against ransomware threats.
Incremental dataflow analysis is a conventional technique adopted in syntax-directed editors, popularly used in Integrated Development Environments (IDEs). However, dataflow anomaly detection during program editing in...
详细信息
暂无评论