Cryptocurrency Security
Expert-defined terms from the Professional Certificate in Cybersecurity for Fintech course at Greenwich School of Business and Finance. Free to read, free to share, paired with a globally recognised certification pathway.
A #
A
API (Application Programming Interface) #
API (Application Programming Interface)
An API is a set of rules and protocols that allow different software application… #
In the context of cybersecurity for fintech, APIs are often used to securely transfer data between different systems or services.
Authentication #
Authentication
Authentication is the process of verifying the identity of a user or entity #
In the context of cryptocurrency security, authentication is crucial to ensure that only authorized individuals have access to digital wallets or trading platforms.
B #
B
Blockchain #
Blockchain
A blockchain is a decentralized and distributed digital ledger that records tran… #
In the context of cryptocurrency security, blockchain technology is used to ensure the transparency and integrity of transactions.
C #
C
Cryptography #
Cryptography
Cryptography is the practice of securing communication and data by converting pl… #
In the context of cryptocurrency security, cryptography plays a key role in securing transactions and wallets.
Cybersecurity #
Cybersecurity
Cybersecurity refers to the practice of protecting computer systems, networks, a… #
In the context of fintech, cybersecurity is essential to safeguard sensitive financial information and transactions.
Cyber Threat Intelligence #
Cyber Threat Intelligence
Cyber threat intelligence refers to information that helps organizations identif… #
In the context of cryptocurrency security, cyber threat intelligence can help detect and prevent potential attacks on digital assets.
D #
D
DDoS (Distributed Denial of Service) #
DDoS (Distributed Denial of Service)
A DDoS attack is a malicious attempt to disrupt the normal traffic of a targeted… #
In the context of cryptocurrency security, DDoS attacks can disrupt trading platforms or digital wallets.
Decentralized #
Decentralized
Decentralized refers to a network or system that operates without a central auth… #
In the context of cryptocurrency security, decentralized systems like blockchain provide increased security and transparency by distributing control among multiple nodes.
Denial of Service (DoS) #
Denial of Service (DoS)
A DoS attack is a malicious attempt to disrupt the normal traffic of a targeted… #
In the context of cryptocurrency security, DoS attacks can disrupt trading platforms or digital wallets.
Digital Signature #
Digital Signature
A digital signature is a cryptographic mechanism used to verify the authenticity… #
In the context of cryptocurrency security, digital signatures are often used to sign transactions and ensure their validity.
E #
E
Encryption #
Encryption
Encryption is the process of converting plain text into an unreadable format usi… #
In the context of cryptocurrency security, encryption is used to protect sensitive information such as private keys.
Endpoint Security #
Endpoint Security
Endpoint security refers to the protection of end #
user devices such as computers, laptops, or mobile devices from cyber threats. In the context of cryptocurrency security, endpoint security is essential to prevent unauthorized access to digital wallets or trading platforms.
F #
F
Firewall #
Firewall
A firewall is a network security system that monitors and controls incoming and… #
In the context of cryptocurrency security, firewalls are used to protect trading platforms or digital wallets from unauthorized access.
Fintech (Financial Technology) #
Fintech (Financial Technology)
Fintech refers to the use of technology to deliver financial services and produc… #
In the context of cybersecurity, fintech companies must implement robust security measures to protect sensitive financial data and transactions.
G #
G
GDPR (General Data Protection Regulation) #
GDPR (General Data Protection Regulation)
The GDPR is a regulation in EU law on data protection and privacy for all indivi… #
In the context of fintech cybersecurity, compliance with GDPR is essential to protect customer data and avoid hefty fines.
H #
H
Hacking #
Hacking
Hacking refers to gaining unauthorized access to computer systems, networks, or… #
In the context of cryptocurrency security, hacking poses a significant threat to digital wallets and trading platforms.
I #
I
Incident Response #
Incident Response
Incident response is the process of responding to and managing security incident… #
In the context of cryptocurrency security, incident response plans help organizations mitigate the impact of security incidents and prevent future attacks.
Insider Threat #
Insider Threat
An insider threat refers to a security risk posed by individuals within an organ… #
In the context of cryptocurrency security, insider threats can result in theft or manipulation of digital assets.
IoT (Internet of Things) #
IoT (Internet of Things)
The Internet of Things refers to interconnected devices that can communicate and… #
In the context of fintech cybersecurity, IoT devices present new challenges in securing sensitive financial data and transactions.
J #
J
JSON Web Tokens (JWT) #
JSON Web Tokens (JWT)
JSON Web Tokens are an open standard for securely transmitting information betwe… #
In the context of cryptocurrency security, JWTs are often used for authentication and authorization processes to access digital wallets or trading platforms.
K #
K
Key Management #
Key Management
Key management refers to the processes and procedures involved in generating, st… #
In the context of cryptocurrency security, effective key management is essential to safeguard private keys used to access digital wallets.
L #
L
Malware #
Malware
Malware is malicious software designed to disrupt, damage, or gain unauthorized… #
In the context of cryptocurrency security, malware can be used to steal private keys or manipulate transactions.
Multifactor Authentication (MFA) #
Multifactor Authentication (MFA)
Multifactor authentication is a security process that requires more than one met… #
In the context of cryptocurrency security, MFA enhances authentication by combining factors such as passwords, biometrics, or security tokens.
N #
N
Network Security #
Network Security
Network security refers to the measures taken to protect the integrity and confi… #
In the context of cryptocurrency security, network security is essential to prevent unauthorized access to digital assets or transactions.
O #
O
Open Source Software #
Open Source Software
Open #
source software is software with its source code made available and licensed with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. In the context of cryptocurrency security, open-source software can provide transparency and collaboration in developing secure solutions.
P #
P
Penetration Testing #
Penetration Testing
Penetration testing, also known as pen testing, is the practice of testing a com… #
In the context of cryptocurrency security, penetration testing helps organizations identify and remediate weaknesses in their systems.
Phishing #
Phishing
Phishing is a type of cyber attack where attackers use fraudulent emails or webs… #
In the context of cryptocurrency security, phishing attacks can lead to unauthorized access to digital wallets or trading platforms.
PKI (Public Key Infrastructure) #
PKI (Public Key Infrastructure)
Public Key Infrastructure is a set of roles, policies, and procedures needed to… #
In the context of cryptocurrency security, PKI is used to authenticate users and secure transactions through public and private key pairs.
Q #
Q
Quantum Computing #
Quantum Computing
Quantum computing is a type of computing that uses quantum #
mechanical phenomena such as superposition and entanglement to perform operations on data. In the context of cryptocurrency security, quantum computing poses a potential threat to traditional cryptographic algorithms used to secure digital assets.
R #
R
Ransomware #
Ransomware
Ransomware is a type of malware that encrypts a victim's files or systems and de… #
In the context of cryptocurrency security, ransomware attacks can result in the loss of access to digital wallets or trading platforms unless a ransom is paid.
Regulatory Compliance #
Regulatory Compliance
Regulatory compliance refers to the adherence to laws, regulations, and industry… #
In the context of fintech cybersecurity, regulatory compliance is essential to protect customer data and maintain the trust of stakeholders.
S #
S
Secure Socket Layer (SSL) #
Secure Socket Layer (SSL)
Secure Socket Layer is a standard security protocol for establishing encrypted l… #
In the context of cryptocurrency security, SSL is used to secure transactions and protect sensitive data on trading platforms or digital wallets.
Security Token #
Security Token
A security token is a digital asset that represents ownership in a company or re… #
In the context of cryptocurrency security, security tokens must comply with regulatory requirements to ensure investor protection and prevent fraud.
Social Engineering #
Social Engineering
Social engineering is a technique used by cyber attackers to manipulate individu… #
In the context of cryptocurrency security, social engineering attacks can deceive users into revealing private keys or passwords.
SQL Injection #
SQL Injection
SQL injection is a type of cyber attack where attackers insert malicious SQL cod… #
In the context of cryptocurrency security, SQL injection attacks can be used to steal sensitive information or manipulate transactions.
T #
T
Threat Actor #
Threat Actor
A threat actor is an individual, group, or organization that carries out malicio… #
In the context of cryptocurrency security, threat actors can include hackers, insiders, or state-sponsored entities.
Tokenization #
Tokenization
Tokenization is the process of substituting sensitive data with a non #
sensitive equivalent, known as a token, to protect the original data. In the context of cryptocurrency security, tokenization can be used to secure transactions and prevent unauthorized access to sensitive information.
Two #
Factor Authentication (2FA)
Two #
factor authentication is a security process that requires two methods of verifying a user's identity. In the context of cryptocurrency security, 2FA adds an extra layer of protection by combining something the user knows (password) with something they have (security token or biometric).
U #
U
User Access Control #
User Access Control
User access control refers to the process of managing and restricting user permi… #
In the context of cryptocurrency security, user access control helps prevent unauthorized users from gaining access to digital wallets or trading platforms.
V #
V
Vulnerability Assessment #
Vulnerability Assessment
A vulnerability assessment is the process of identifying, quantifying, and prior… #
In the context of cryptocurrency security, vulnerability assessments help organizations proactively address weaknesses in their systems to prevent exploitation by attackers.
W #
W
Web Application Firewall (WAF) #
Web Application Firewall (WAF)
A web application firewall is a security solution that monitors and filters HTTP… #
In the context of cryptocurrency security, WAFs are used to prevent attacks targeting digital wallets or trading platforms.
X #
X
XSS (Cross #
Site Scripting)
Cross #
Site Scripting is a type of web application vulnerability where attackers inject malicious scripts into web pages viewed by other users. In the context of cryptocurrency security, XSS attacks can be used to steal sensitive information or manipulate transactions on trading platforms.
Y #
Y
YubiKey #
YubiKey
YubiKey is a hardware authentication device that provides secure access to onlin… #
In the context of cryptocurrency security, YubiKeys can be used as a form of two-factor authentication to protect digital wallets from unauthorized access.
Z #
Z
Zero #
Day Exploit
A zero #
day exploit is a cyber attack that targets previously unknown vulnerabilities in software or hardware before a patch or fix is available. In the context of cryptocurrency security, zero-day exploits can be used to gain unauthorized access to digital wallets or trading platforms.