没有合适的资源?快使用搜索试试~ 我知道了~
网络安全和中央银行数字货币的挑战(英).pdf
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 51 浏览量
2022-11-28
10:03:13
上传
评论
收藏 4.66MB PDF 举报
温馨提示
试读
55页
网络安全和中央银行数字货币的挑战(英).pdf
资源推荐
资源详情
资源评论
PROACTIVELY COUNTERING NORTH KOREA’S ADVANCING NUCLEAR THREATS
2 ATLANTIC COUNCIL
ACKNOWLEDGMENTS
This report is written and published in accordance with the Atlantic Council Policy
on Intellectual Independence. The authors are solely responsible for its analysis and
recommendations. The Atlantic Council and its donors do not determine, nor do they
necessarily endorse or advocate for, any of this report’s conclusions.
ISBN13: 9781619772366
Cover: iStock
June 2022
© 2022 The Atlantic Council of the United States. All rights reserved. No part of this
publication may be reproduced or transmitted in any form or by any means without
permission in writing from the Atlantic Council, except in the case of brief quotations in news
articles, critical articles, or reviews. Please direct inquiries to:
Atlantic Council, 1030 15th Street NW, 12th Floor, Washington, DC 20005
MISSING KEY:
The Challenge of Cybersecurity
and Central Bank Digital Currency
Lead Authors:
Giulia Fanti and Kari Kostiainen
Contributing Authors:
William Howlett, Josh Lipsky, Ole Moehr,
John Paul Schnapper-Casteras, and Josephine Wol
The GeoEconomics Center works at the nexus of economics, finance, and foreign
policy with the goal of helping shape a better global economic future.
The Center is organized around three pillars - Future of Capitalism, Future of Money,
and the Economic Statecraft Initiative.
Foreword .............................................................................................................................................................................................1
Executive Summary ...................................................................................................................................................................2
Background: How the United States Currently Secures Its Payment Systems ........................ 5
Payments Overview ...................................................................................................................................................... 5
Looking Ahead to CBDCs ........................................................................................................................................... 6
Chapter 1: Cybersecurity of CBDCs—Threats and Design Options .................................................. 7
Roles and Trust Assumptions ............................................................................................................................................ 7
Threat Model ............................................................................................................................................................................9
CBDC Design Variants .......................................................................................................................................................13
Additional Key Design Choices .....................................................................................................................................26
Chapter 2: Policy Recommendations—
Principles for Future Legislation and Regulation ........................................................................................... 32
Principle 1: Where possible, use existing risk management frameworks and regulations ...................... 32
Principle 2: Privacy can strengthen security ............................................................................................................. 33
Principle 3: Test, test, and test some more................................................................................................................35
Principle 4: Ensure accountability ................................................................................................................................. 36
Principle 5: Promote interoperability ........................................................................................................................... 37
Principle 6: When new legislation is appropriate, make it technology neutral............................................38
Conclusion .....................................................................................................................................................................................40
Appendix: Lessons from the Federal Reserve’s
Current Cybersecurity Measures for Deploying CBDCs ...........................................................................41
Public Wholesale Layers ....................................................................................................................41
Private Wholesale Layers .................................................................................................................. 43
Retail Payments ................................................................................................................................. 44
About the Authors ...................................................................................................................................................................46
Table of Contents
剩余54页未读,继续阅读
资源评论
王晓惠Pedole海苔
- 粉丝: 51
- 资源: 3万+
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功