Corporate finance transaction and Quantum key distribution: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
(Create page - source - ICAEW - https://www.treasurers.org/system/files/ICAEW%20Cyber%20security%20guideline%20V5a%20WEB%20FILE.pdf)
 
(Expand quote - source - NCSC - https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies)
 
Line 1: Line 1:
''Corporate finance.''
''Information technology - cybersecurity.''


A major corporate transaction such as an acquisition, merger, disposal or refinancing.
(QKD).


"Quantum Key Distribution is a mechanism for agreeing encryption keys between remote parties, relying on the properties of quantum mechanics to ensure that key has not been observed or tampered with in transit.


:<span style="color:#4B0082">'''''Cyber risk in corporate finance transactions'''''</span>
Since traditional public key cryptography algorithms may be vulnerable to a future large-scale quantum computer, new approaches are required that do not share this vulnerability. QKD claims to offer a potential mitigation since its security properties are based on the laws of physics rather than the hardness of some underlying mathematical problems.


:"For the purposes of this publication, corporate finance transactions are those where an organisation’s capital structure may be changed to acquire or dispose of elements of that business, or invest and develop areas of the business. These include refinancing through to the introduction of new equity or debt...
QKD protocols provide a mechanism for two remote parties to agree a shared secret key, where the key cannot be observed or tampered with by an adversary without alerting the original parties. However, because QKD protocols do not provide authentication, they are vulnerable to physical man-in-the-middle attacks in which an adversary can agree individual shared secret keys with two parties who believe they are communicating with each other.


:Cyber Security in Corporate Finance aims to help businesses understand and manage cyber risks during a corporate finance transaction...
For this reason, QKD protocols must be deployed alongside cryptographic mechanisms that ensure authentication. These cryptographic mechanisms must also be secure against the quantum threat."


:[This] guide highlights the questions a business should be asking of itself, and advisers should be asking the business, about cyber risk, and points readers towards further guidance. It sets out good practice and cyber security considerations businesses should address within the context of a corporate finance transaction.
''(Source - Quantum security technologies - UK National Cyber Security Centre.)''
 
:While not prescriptive, the considerations should be discussed at board level as they relate to a significant business risk."
 
:''Cyber Security in Corporate Finance - ICAEW - January 2024.''




== See also ==
== See also ==
* [[Acquisition]]
* [[Cryptography]]
* [[Business risk]]
* [[Cybersecurity]]
* [[Capital ]]
* [[Dual key]]
* [[Capital structure]]
* [[Encryption]]
* [[Corporate]]
* [[Information technology]]
* [[Corporate finance]]
* [[Key]]
* [[Corporate Finance Institute]]
* [[Key Attributes]]
* [[Corporate financial management]]
* [[Key control indicator]] (KPI)
* [[Corporate treasury]]
* [[Key Information Document]]
* [[Cyber risk]]
* [[Key performance indicator]] (KPI)
* [[Cyber security]]
* [[Key risk indicator]] (KPI)
* [[Debt]]
* [[Man-in-the-middle attack]]
* [[Disposal]]
* [[National Cyber Security Centre]] (NCSC)
* [[Equity]]
* [[Private key]]
* [[Finance]]
* [[Public]]
* [[Financial planning and analysis]]
* [[Public key ]]
* [[Merger]]
* [[Public key encryption]]
* [[Project finance]]
* [[Public key infrastructure]]
* [[Refinancing]]
* [[Quantum computing]]
* [[Shareholder value]]
* [[RSA encryption]]
* [[Transaction]]
* [[Security]]




==Other resource==
==Other resource==
*[https://www.treasurers.org/system/files/ICAEW%20Cyber%20security%20guideline%20V5a%20WEB%20FILE.pdf Cyber Security in Corporate Finance - ICAEW - January 2024]
*[https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies Quantum security technologies - UK National Cyber Security Centre]


[[Category:Accounting,_tax_and_regulation]]
[[Category:Accounting,_tax_and_regulation]]
[[Category:Long_term_funding]]
[[Category:Identify_and_assess_risks]]
[[Category:The_business_context]]
[[Category:The_business_context]]


[[Category:Accounting,_tax_and_regulation]]
[[Category:Accounting,_tax_and_regulation]]
[[Category:Long_term_funding]]
[[Category:Identify_and_assess_risks]]
[[Category:The_business_context]]
[[Category:The_business_context]]

Revision as of 01:04, 3 February 2024

Information technology - cybersecurity.

(QKD).

"Quantum Key Distribution is a mechanism for agreeing encryption keys between remote parties, relying on the properties of quantum mechanics to ensure that key has not been observed or tampered with in transit.

Since traditional public key cryptography algorithms may be vulnerable to a future large-scale quantum computer, new approaches are required that do not share this vulnerability. QKD claims to offer a potential mitigation since its security properties are based on the laws of physics rather than the hardness of some underlying mathematical problems.

QKD protocols provide a mechanism for two remote parties to agree a shared secret key, where the key cannot be observed or tampered with by an adversary without alerting the original parties. However, because QKD protocols do not provide authentication, they are vulnerable to physical man-in-the-middle attacks in which an adversary can agree individual shared secret keys with two parties who believe they are communicating with each other.

For this reason, QKD protocols must be deployed alongside cryptographic mechanisms that ensure authentication. These cryptographic mechanisms must also be secure against the quantum threat."

(Source - Quantum security technologies - UK National Cyber Security Centre.)


See also


Other resource