CYBER 101

  • Alerts
  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Join our newsletter

FOLLOW US

  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial

Distributed Ledger Technology (DLT) and Blockchain

By World Bank

1 min read
in Document, Report

The financial sector is currently undergoing a major transformation, brought about by the rapid development and spread of new technologies. The confluence of ‘finance’ and ‘technology’ is often referred to as ‘Fintech’, typically describing companies or innovations that employ new technologies to improve or innovate financial services. ‘Fintech’ developments are seen across all areas of the financial sector, including payments and financial infrastructures, consumer and SME lending, insurance, investment management, and venture financing. This note on distributed ledger technology (DLT) and blockchains is part of a series of short notes that explore new trends and developments in Fintech and analyze their potential relevance for WBG activities. Forthcoming notes in this series will cover marketplace lending, ‘InsureTech’, and other topics. This note outlines the mechanisms, origins, and key characteristics of DLT; the difference between ‘public’ and ‘private’ DLT; the technology’s main advantages, challenges, and risks; relevant examples of DLT applications (with a focus on financial sector applications); and a brief overview of activities by governments, multilateral organization, and other stakeholders in this space. Finally, this note proposes next steps for the World Bank to study and evaluate areas where DLT could potentially be integrated into World Bank financial sector operations.

Read full report

Related

Tags: Blockchain DocumentsReportWorld Bank
0
VIEWS
ADVERTISEMENT

Related Posts

Cybersecurity: Incident Response Short Student Guide

Cybersecurity: Incident Response Short Student Guide

August 11, 2022
Cyber Security Incident Response Plan

Cyber Security Incident Response Plan

August 11, 2022
Sample Incident Handling Checklist

Sample Incident Handling Checklist

August 11, 2022
Incident Response Cheat Sheet

Incident Response Cheat Sheet

August 11, 2022

More Articles

Book

Key Risk Indicator A Complete Guide – 2021 Edition

June 22, 2022
Entertainment

Become CxO (CIO, CISO, or CTO) podcast

March 10, 2022
Document

Quantum Computing: Lecture Notes

December 13, 2020
Podcast

Lex Fridman Podcas‪t‬

March 18, 2021
Incidents

Hackers access mySA GOV digital licence accounts, prompting warning from state government

November 5, 2021

Data breach at US restaurant and gambling chain Dotty’s may have leaked sensitive customer information

September 7, 2021
Alerts

VMware Releases Security Updates for Multiple Products 

August 25, 2021
Incidents

Anonymous claims to have hacked German subsidiary of Rosneft

March 14, 2022
Load More

Security through data

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
Search

More...

Generic filters
Filter by Categories
Alerts
Blog
Book
Incidents
Quotes
Tutorials
Certification
Cheat Sheet
Course
Game
Meme
Movie
Paper
Podcast
Report
Software
TV Show

Try these: DDoSGDPRMalware

  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Join our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.