TY - BOOK AU - Kaur,Gurdip AU - Habibi Lashkari,Arash AU - Sharafaldin,Iman AU - Habibi Lashkari,Ziba TI - Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends T2 - Financial Innovation and Technology, SN - 9783031233401 U1 - 332 23 PY - 2023/// CY - Cham PB - Springer International Publishing, Imprint: Springer KW - Financial engineering KW - Data protection KW - Business information services KW - Technological innovations KW - Financial Technology and Innovation KW - Data and Information Security KW - IT in Business KW - Innovation and Technology Management N1 - Chapter 1. The Origin of Modern Decentralized Finance -- Chapter 2. Introduction to Smart Contracts and DeFi -- Chapter 3. DeFi Platforms -- Chapter 4. Blockchain Security -- Chapter 5. Smart Contracts and DeFi Security and Threats -- Chapter 6. Challenges, Issues, and Basic Security Practices N2 - This book discusses understand cybersecurity management in decentralized finance (DeFi). It commences with introducing fundamentals of DeFi and cybersecurity to readers. It emphasizes on the importance of cybersecurity for decentralized finance by illustrating recent cyber breaches, attacks, and financial losses. The book delves into understanding cyber threats and adversaries who can exploit those threats. It advances with cybersecurity threat, vulnerability, and risk management in DeFi. The book helps readers understand cyber threat landscape comprising different threat categories for that can exploit different types of vulnerabilities identified in DeFi. It puts forward prominent threat modelling strategies by focusing on attackers, assets, and software. The book includes the popular blockchains that support DeFi include Ethereum, Binance Smart Chain, Solana, Cardano, Avalanche, Polygon, among others. With so much monetary value associated with all these technologies, the perpetrators are always lured to breach security by exploiting the vulnerabilities that exist in these technologies. For simplicity and clarity, all vulnerabilities are classified into different categories: arithmetic bugs, re-Entrancy attack, race conditions, exception handling, using a weak random generator, timestamp dependency, transaction-ordering dependence and front running, vulnerable libraries, wrong initial assumptions, denial of service, flash loan attacks, and vampire Since decentralized finance infrastructures are the worst affected by cyber-attacks, it is imperative to understand various security issues in different components of DeFi infrastructures and proposes measures to secure all components of DeFi infrastructures. It brings the detailed cybersecurity policies and strategies that can be used to secure financial institutions. Finally, the book provides recommendations to secure DeFi infrastructures from cyber-attacks UR - https://doi.org/10.1007/978-3-031-23340-1 ER -