Purpose This paper aims to analyze the money laundering process itself, how cryptocurrencies have been integrated into this process, and how regulatory and government bodies are responding to this new form of currency. Design/methodology/approach This paper is a theoretical paper that discusses cryptocurrencies and their role in the money laundering process. Findings Cryptocurrencies eliminate the need for intermediary financial institutions and allow direct peer-to-peer financial transactions. Because of the anonymity introduced through blockchain, cryptocurrencies have been favored by the darknet and other criminal networks. Originality/value Cryptocurrencies are a nascent form of money that first arose with the creation of bitcoin in 2009. This form of purely digital currency was meant as a direct competitor to government-backed fiat currency that are controlled by the central banking system. The paper adds to the recent discussions and debate on cryptocurrencies by suggesting additional regulation to prevent their use in money laundering and corruption schemes.
In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level and flow-level are proposed, which can be applied for traffic profiling in intrusion detection systems. The empirical analysis of our profiles through the rate of remaining features at the packet-level, as well as the three-dimensional spaces of entropy at the flow-level, provide a fast detection of intrusions caused by port scanning and worm attacks.
Among the service models provided by the cloud, the software as a service (SaaS) model has had the greatest growth. This service model is an attractive option for organizations, as they can transfer part or all of their IT functions to a cloud service provider. However, there is still some uncertainty about deciding to carry out a migration of all data to the cloud, mainly due to security concerns. The SaaS model not only inherits the security problems of a traditional application, but there are unique attacks and vulnerabilities for a SaaS architecture. Additionally, some of the attacks in this environment are more devastating due to nature of shared resources in the SaaS model. Some of these attacks and vulnerabilities are not yet well known to software designers and developers. This lack of knowledge has negative consequences as it can expose sensitive data of users and organizations. This paper presents a rigorous systematic review using the SALSA framework to know the threats, attacks and countermeasures to mitigate the security problems that occur in a SaaS environment. As part of the results of this review, a classification of threats, attacks and countermeasures in the SaaS environment is presented.
El objetivo de este trabajo fue explorar cómo los contratos inteligentes pueden ser una herramienta para facilitar y agilizar el cumplimiento y ejecución de los acuerdos de transacción comercial derivados de una mediación internacional. El criterio metodológico utilizado fue el análisis crítico del estado actual de la ejecución de acuerdos de transacción derivados de una mediación internacional y examina las particularidades de los contratos inteligentes en este respecto, para hacer una propuesta en específico. La conclusión a la que se llega es que, a pesar de los muchos retos que en la actualidad tienen los contratos inteligentes, sus características únicas, como la descentralización, autonomía, inmutabilidad y ejecución automática, hacen posible la reducción significativa del incumplimiento de los acuerdos de transacción derivados de una mediación internacional.
The large amount of information handled by organizations has increased their dependance on information technologies, which has made information security management a complex task. This is mainly because they cover areas such as physical and environmental security, organization structure, human resources and the technologies used. Information security frameworks can minimize the complexity through the different documents that contain guidelines, standards, and requirements to establish the procedures, policies, and processes for every organization. However, the selection of an appropriate framework is by itself a critical and important task, as the framework must adapt to the characteristics of an organization. In this paper, a general vision of the newest versions of the NIST CSF, ISO/IEC 27001:2022, and MAGERIT frameworks is provided by comparing their characteristics in terms of their approaches to the identification, assessment, and treatment of risks. Furthermore, their key characteristics are analyzed and discussed, which should facilitate the consideration of any of these frameworks for the risk management of complex manufacturing organizations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.