Cyber Risk Surveillance: A Case Study of Singapore

Cyber Risk Surveillance: A Case Study of Singapore

Author: Joseph Goh

Publisher: International Monetary Fund

Published: 2020-02-10

Total Pages: 31

ISBN-13: 1513526316

DOWNLOAD EBOOK

Cyber risk is an emerging source of systemic risk in the financial sector, and possibly a macro-critical risk too. It is therefore important to integrate it into financial sector surveillance. This paper offers a range of analytical approaches to assess and monitor cyber risk to the financial sector, including various approaches to stress testing. The paper illustrates these techniques by applying them to Singapore. As an advanced economy with a complex financial system and rapid adoption of fintech, Singapore serves as a good case study. We place our results in the context of recent cybersecurity developments in the public and private sectors, which can be a reference for surveillance work.


Cyber Risk Surveillance

Cyber Risk Surveillance

Author:

Publisher:

Published: 2020

Total Pages: 38

ISBN-13:

DOWNLOAD EBOOK

"Cyber risk is an emerging source of systemic risk in the financial sector, and possibly a macro-critical risk too. It is therefore important to integrate it into financial sector surveillance. This paper offers a range of analytical approaches to assess and monitor cyber risk to the financial sector, including various approaches to stress testing. The paper illustrates these techniques by applying them to Singapore. As an advanced economy with a complex financial system and rapid adoption of fintech, Singapore serves as a good case study. We place our results in the context of recent cybersecurity developments in the public and private sectors, which can be a reference for surveillance work."--Abstract


Securitising Singapore

Securitising Singapore

Author: Syed Mohammed Ad’ha Aljunied

Publisher: Routledge

Published: 2019-07-15

Total Pages: 146

ISBN-13: 1000227995

DOWNLOAD EBOOK

Aljunied examines how the Singaporean government developed a comprehensive state–society strategic relationship by ‘securitising’ vital policy areas because of Singapore’s vulnerability as a global city state. In the twenty-first century, the Singaporean government has strategically renewed an existing form of authoritarian rule by ‘militarising’ national security governance. The main objective is to widen and deepen state power. Senior military-trained civilian political leaders and bureaucrats use military personnel, command and control, terminology and strategy of war to deal with non-traditional security challenges leading to the state’s further domination over civil liberty and civil society. Aljunied analyses the information and communication, health and climate–environment sectors. The case studies highlight the way the Singaporean government has used varying forms of political engagement, surveillance and legislation to limit civil liberty and inhibit the development of civil society. This book is a valuable resource for researchers and students of Singapore Studies as well as for the readers of Security Studies with an interest in the global–local nexus in a small state context. It is a pioneering scholarly study on the national security framework and the use of non-traditional security discourse to strengthen state power and social stability at the expense of political liberalism.


Security Frameworks in Contemporary Electronic Government

Security Frameworks in Contemporary Electronic Government

Author: Abassi, Ryma

Publisher: IGI Global

Published: 2018-08-31

Total Pages: 320

ISBN-13: 152255985X

DOWNLOAD EBOOK

Global change and advancing technology have transformed the government sector with the use of information and communication technology to improve service delivery. The use of such technologies in electronic and mobile government services raises issues relating to security, privacy, and data protection. Security Frameworks in Contemporary Electronic Government is a pivotal reference source that provides vital research on the application of special security requirements in electronic government transactions. While highlighting topics such as digital environments, public service delivery, and cybercrime, this publication explores the difficulties and challenges faced in implementing e-government technologies, as well as the different aspects of security in e-government. This book is ideally designed for policymakers, software developers, IT specialists, government officials, academicians, researchers, and students seeking current research on secure environments in electronic and mobile government.


OECD SME and Entrepreneurship Outlook 2019

OECD SME and Entrepreneurship Outlook 2019

Author: OECD

Publisher: OECD Publishing

Published: 2019-05-20

Total Pages: 396

ISBN-13: 926435882X

DOWNLOAD EBOOK

The new OECD SME and Entrepreneurship Outlook presents the latest trends in performance of small and medium-sized enterprises (SMEs) and provides a comprehensive overview of business conditions and policy frameworks for SMEs and entrepreneurs. This year’s edition provides comparative evidence on business dynamism, productivity growth, wage gaps and export trends by firm size across OECD countries and emerging economies.


Pyramid

Pyramid

Author: Nimisha Singh

Publisher:

Published: 2015

Total Pages:

ISBN-13: 9781526405470

DOWNLOAD EBOOK

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.