Cybersecurity threats in FinTech: A systematic review

被引:8
作者
Javaheri, Danial [1 ]
Fahmideh, Mahdi [2 ]
Chizari, Hassan [3 ]
Lalbakhsh, Pooia [4 ]
Hur, Junbeom [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 02841, South Korea
[2] Univ Southern Queensland, Sch Business, Springfield, Qld 4300, Australia
[3] Univ Gloucestershire, Sch Business Comp & Social Sci, Pk Campus, Gloucester GL50 2RH, England
[4] Monash Univ, Fac Informat Technol, Dept Data Sci & Artificial Intelligence, Clayton, Vic 3168, Australia
基金
新加坡国家研究基金会;
关键词
Banking trojan; Business sustainability; Cyber-attacks; Data privacy; Financial technology; BANKING; RANSOMWARE; BLOCKCHAIN; ATTACKS; TECHNOLOGY; INNOVATION; RISKS;
D O I
10.1016/j.eswa.2023.122697
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI) advancements have given rise to sophisticated cyber threats that traditional methods cannot counteract. Cyber threats are extremely critical in financial technology (FinTech) as a data-centric sector expected to provide 24/7 services. This paper introduces a novel and refined taxonomy of security threats in FinTech and conducts a comprehensive systematic review of defensive strategies. Through PRISMA methodology applied to 74 selected studies and topic modeling, we identified 11 central cyber threats, with 43 papers detailing them, and pinpointed 9 corresponding defense strategies, as covered in 31 papers. This in-depth analysis offers invaluable insights for stakeholders ranging from banks and enterprises to global governmental bodies, highlighting both the current challenges in FinTech and effective countermeasures, as well as directions for future research.
引用
收藏
页数:31
相关论文
共 138 条
  • [1] Do Data Almost Always Eventually Leak?
    Ahmad, Norita
    [J]. COMPUTER, 2021, 54 (02) : 70 - 74
  • [2] Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model
    Airehrour, David
    Nair, Nisha Vasudevan
    Madanian, Samaneh
    [J]. INFORMATION, 2018, 9 (05)
  • [3] EVHA: Explainable Vision System for Hardware Testing and Assurance-An Overview
    Al Hasan, Md. Mahfuz
    Mostafiz, Mohammad Tahsin
    Le, Thomas An
    Julia, Jake
    Vashistha, Nidish
    Taheri, Shayan
    Asadizanjani, Navid
    [J]. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (03)
  • [4] Enterprise Credential Spear-phishing attack detection
    Al-Hamar, Yuosuf
    Kolivand, Hoshang
    Tajdini, Mostafa
    Saba, Tanzila
    Ramachandran, Varatharajan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 94
  • [5] Alahmari S., 2022, Moving beyond cyber security awareness and training to engendering security knowledge sharing, DOI DOI 10.1007/S10257-022-00575-2, Patent No. 0123456789
  • [6] Consumer-facing technology fraud: Economics, attack methods and potential solutions
    Ali, Mohammed Aamir
    Azad, Muhammad Ajmal
    Centeno, Mario Parreno
    Hao, Feng
    van Moorsel, Aad
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 408 - 427
  • [7] A formal verification approach for composite smart contracts security using FSM
    Almakhour, Mouhamad
    Sliman, Layth
    Samhat, Abed Ellatif
    Mellouk, Abdelhamid
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (01) : 70 - 86
  • [8] Ambore S., 2017, Journal of Cyber Security Technology, V1, P202, DOI [10.1080/23742917.2017, DOI 10.1080/23742917.2017, https://doi.org/10.1080/23742917.2017.1386483, DOI 10.1080/23742917.2017.1386483]
  • [9] [Anonymous], 2015, Network Security, V2015, P1, DOI DOI 10.1016/S1353-4858(15)70001-2
  • [10] [Anonymous], 2016, Computer Fraud & Security, P1, DOI DOI 10.1016/S1361-3723(16)30011-2