Cyber-Security- Roseon Finance

Zmira Wonders
3 min readAug 31, 2021

The technique of protecting computers, servers, mobile devices, electronic systems, networks, and data from hostile intrusions is known as cyber security.

It’s also known as electronic information security or information technology security.

The phrase is used in a range of contexts, ranging from business to mobile computing, and it may be broken down into a few categories.

Network security is the process of protecting a computer network against intruders, whether they be targeted attackers or opportunistic malware.

Application Security: This focuses on preventing attacks from infecting software and devices.

A hacked application could allow access to the data it was supposed to secure.

Security starts throughout the design phase, long before a program or device is deployed.

Information security ensures that data integrity and privacy are protected while in storage and in transit.

Safety and Security in the Workplace:

This comprises the procedures and decisions used to manage and safeguard data assets.

The protocols that dictate how and where data may be kept or exchanged, as well as the permissions users have while accessing a network, all fall under this umbrella.

Disaster Recovery and Business Continuity: This refers to how a company reacts in the case of a cyber-security breach or any other event that results in a loss of operations or data.

Disaster recovery policies define how an organization returns operations and information to the same operational capabilities as before the disaster.

Business continuity is the plan that an organization uses when it is unable to operate due to a lack of resources.

End-user Training

This covers the most unpredictably unpredictable aspect of cyber-security: people.

By failing to follow appropriate security measures, anyone can unintentionally introduce a virus into an otherwise protected system.

It is critical for every organization’s security to teach users to delete suspicious email attachments, not plug in unrecognized USB drives, and a variety of other key teachings.

Roseon Finance Cyber-Security

To maintain the Roseon ecosystem’s functioning and success, we must ensure that all deposit funds from all sources are kept secure; several levels of security and wallets will be used to avoid a single point of failure. Multi-signature wallets, offline storage, and quarterly audits of our reserves are examples of custodian solutions.

Only the necessary cash will be held on a number of hot wallets to manage everyday operations and ensure that they take place without delay, while the remainder of the funds will be kept offline, requiring a majority of authorized-signers to approve a transaction.

For the continued success of Roseon, here are the measures we take to ensure that all funds are kept secure:

  • All security measures within the Roseon ecosystem are ALWAYS improved by our security team. Data encryption is part of our high security standards.
  • To prevent intrusion, we store login data for analysis as well as implement IP analysis. Any abnormal pattern will result in an immediate freeze of withdrawals, which requires manual intervention by the administrator.
  • Custodianship solutions include multi-signature wallets, offline storage, and quarterly audits of our reserves.
  • Only the necessary currency will be maintained in a few of wallets to handle daily operations and ensure that they occur without delay, while the rest monies will be held offline, requiring approval from a majority of authorized-signers.
  • We integrate server-side security monitoring and establish a strong internal communication mechanism to respond quickly and minimize any attack vector.
  • Any smart contract that interacts with Roseon’s ecosystem must be audited and verified on the public explorer, and the source code must be provided on a Git repository with extensive written guidance.
  • Roseon Finance will be licensed soon, which means we’ll take whatever measures authorities deem necessary to keep things operating smoothly and protect our customers’ comfort and security throughout transactions.

--

--