Special Issues
Table of Content

Blockchain in Cybersecurity Threats and Cyber-Risk Assessment

Submission Deadline: 01 January 2025 View: 725 Submit to Special Issue

Guest Editors

Prof. Mohammed Almaiah, University of Jordan, Jordan
Prof. Yassine Maleh, Sultan Moulay Slimane University, Morocco

Summary

The special issue discusses the innovative application of blockchain technology in the realm of cyber-risk management. This chapter explores how blockchain, originally developed as the underlying technology for cryptocurrencies, is being leveraged to address cybersecurity challenges, enhance data integrity, and fortify risk management practices in various industries. The chapter also addresses the challenges and considerations associated with implementing blockchain for cyber-risk management. These may include scalability limitations, interoperability issues, regulatory compliance, governance frameworks, and the need for robust cybersecurity measures to protect blockchain networks from cyber attacks and vulnerabilities. 


Keywords

· Blockchain in Cybersecurity risk assessment
· Machine Learning in Security
· Artificial Intelligence Security
· Cloud Security
· Digital and Information Forensics
· Quantum Security
· Cyber–Physical System Security
· Network and Mobile Security
· IoT Security
· Security Risk and Engineering
· Management, Policies, and Human Factors in Security
· Privacy and Cyber Threat
· Anonymity and Privacy
· Cryptography and Cryptology
· Authentication and Access Control
· Biometrics
· Malware analysis

Published Papers


  • Open Access

    ARTICLE

    Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems

    Mohammed Amin Almaiah, Leen Mohammad Saqr, Leen Ahmad Al-Rawwash, Layan Ahmed Altellawi, Romel Al-Ali, Omar Almomani
    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3189-3220, 2024, DOI:10.32604/cmc.2024.057673
    (This article belongs to the Special Issue: Blockchain in Cybersecurity Threats and Cyber-Risk Assessment)
    Abstract Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding… More >

Share Link