Table 2 Meaning of the 12 financial risk indicators.
From: Comprehensive assessment of privacy security of financial services in cloud environment
Indicators | Significance | Example |
---|---|---|
I1 | Risk of privacy leakage due to malicious behavior of internal employees | Selling User Information |
I2 | Security vulnerabilities in software or applications | Vulnerabilities in apps allow hackers to steal users’ personal information |
I3 | Abusive collection of permissions by third-party applications | User preferences collection |
I4 | Data leakage due to internal system or platform errors | An error in the platform caused the services to shut down |
I5 | Data Store or Server Authentication Vulnerability | Unauthorized users are able to access sensitive data |
I6 | Insecure network connections during data transmission | Insecure WiFi connection, vulnerable to hacker interception to steal data |
I7 | Privacy disclosure due to services providers data loss | Loss of storage device by the services provider |
I8 | Vulnerabilities in operating systems or end devices | Malware exploits operating system vulnerabilities, leading to the theft of users’ personal information |
I9 | User rights not properly configured or managed by internal personnel | Incorrect authorization |
I10 | Third-party application vulnerabilities posing a risk to user privacy | Third-party applications hacked |
I11 | Risk of privacy leakage due to vulnerabilities in encryption mechanisms | Insecure encryption algorithms |
I12 | Risk of privacy leakage resulting from inadequate key management | Information leakage due to lost keys or simple password settings |