Frauds and Cyber Security Issues in the Finance Sector

Frauds and Cyber Security Issues in the Finance Sector

Rajeev Tripathi, Smita Tripathi
Copyright: © 2024 |Pages: 25
ISBN13: 9798369315033|ISBN13 Softcover: 9798369348192|EISBN13: 9798369315040
DOI: 10.4018/979-8-3693-1503-3.ch008
Cite Chapter Cite Chapter

MLA

Tripathi, Rajeev, and Smita Tripathi. "Frauds and Cyber Security Issues in the Finance Sector." Transforming the Financial Landscape With ICTs, edited by Dharmendra Singh, et al., IGI Global, 2024, pp. 165-189. https://doi.org/10.4018/979-8-3693-1503-3.ch008

APA

Tripathi, R. & Tripathi, S. (2024). Frauds and Cyber Security Issues in the Finance Sector. In D. Singh, G. Malik, & S. Aggarwal (Eds.), Transforming the Financial Landscape With ICTs (pp. 165-189). IGI Global. https://doi.org/10.4018/979-8-3693-1503-3.ch008

Chicago

Tripathi, Rajeev, and Smita Tripathi. "Frauds and Cyber Security Issues in the Finance Sector." In Transforming the Financial Landscape With ICTs, edited by Dharmendra Singh, Garima Malik, and Shalini Aggarwal, 165-189. Hershey, PA: IGI Global, 2024. https://doi.org/10.4018/979-8-3693-1503-3.ch008

Export Reference

Mendeley
Favorite

Abstract

In today's digital age, the importance of cybersecurity cannot be overstated, as it directly affects an individual's or organization's ability to protect themselves from various types of fraud. Organizations and individuals must stay vigilant, continuously update their security practices, and invest in cybersecurity technologies to minimize the risk of falling victim to fraudsters. Cybersecurity is the proactive defense against digital threats, while fraud prevention involves safeguarding against deceptive and dishonest activities. To effectively combat fraud, individuals and organizations must implement robust cybersecurity measures, stay informed about emerging threats, and educate themselves and their employees about the tactics used by fraudsters. Fraud and cyber security are two closely related topics that revolve around protecting sensitive information, assets, and systems from unauthorized access, manipulation, or theft.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.