Cyber Security and Business Growth

Author(s):  
Akanksha Sharma ◽  
Prashant Tandekar

Information and Communications Technologies (ICTs), particular the Internet, have been an increasingly important aspect of global social, political and economic life, and are the backbone of the global information society today. Their evolution and development has brought many benefits along with the threat of serious cyber-attacks that had been demonstrated over the past few years. Due to cybercrime business world drains huge money each year and incurs a large amount in resolving a single attack. It also damages organization's reputation and brand image, loss of intellectual property and sensitive data, loss of customer trust etc. Addressing major threats and challenges begins with setting up information security policy to ensure confidentiality, integrity and availability of company information and communication. Since telecom Sector is on its boom, a technological solution can solve the immediate challenges of identifying, investigating, and prosecuting computer- related crimes and changes required for long-term problem solving.

2018 ◽  
pp. 1208-1221
Author(s):  
Akanksha Sharma ◽  
Prashant Tandekar

Information and Communications Technologies (ICTs), particular the Internet, have been an increasingly important aspect of global social, political and economic life, and are the backbone of the global information society today. Their evolution and development has brought many benefits along with the threat of serious cyber-attacks that had been demonstrated over the past few years. Due to cybercrime business world drains huge money each year and incurs a large amount in resolving a single attack. It also damages organization's reputation and brand image, loss of intellectual property and sensitive data, loss of customer trust etc. Addressing major threats and challenges begins with setting up information security policy to ensure confidentiality, integrity and availability of company information and communication. Since telecom Sector is on its boom, a technological solution can solve the immediate challenges of identifying, investigating, and prosecuting computer- related crimes and changes required for long-term problem solving.


2011 ◽  
Vol 1 (1) ◽  
pp. 24-34 ◽  
Author(s):  
Christian Czosseck ◽  
Rain Ottis ◽  
Anna-Maria Talihärm

At the time of the state-wide cyber attacks in 2007, Estonia was one of the most developed nations in Europe regarding the ubiquitous use of information and communication technology (ICT) in all aspects of society. Relaying on the Internet for conducting a range of business transactions is common practice. But naturally, the more a society depends on ICT, the more it becomes vulnerable to cyber attacks. Unlike other research on the Estonian incident, this paper does not focus on the analysis of the events themselves. Instead, the authors examine Estonia’s cyber security policy and subsequent changes made in response to the cyber attacks. As such, the authors provide a comprehensive overview of the strategic, legal, and organisational changes based on lessons learned by Estonia after the 2007 cyber attacks. The analysis is based on a review of national security governing strategies, changes in the Estonia’s legal framework, and organisations with direct impact on cyber security. The paper discusses six important lessons learned and manifested in actual changes: each followed by a set of cyber security policy recommendations appealing to national security analysts as well as nation states developing their own cyber security strategy.


2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


2017 ◽  
Vol 4 (2) ◽  
pp. 205316801771593 ◽  
Author(s):  
Sarah Kreps ◽  
Debak Das

Accusations of Russian hacking in the 2016 US presidential election has raised the salience of cyber security among the American public. However, there are still a number of unanswered questions about the circumstances under which particular policy responses are warranted in response to a cyber-attack and the public’s attitudes about the conditions that justify this range of responses. This research investigates the attributes of a cyber-attack that affect public support for retaliation. It finds that cyber-attacks that produce American casualties dramatically increase support for retaliatory airstrikes compared to attacks with economic consequences. Assessments of attribution that have bipartisan support increase support to a lesser extent but for a broader range of retaliatory measures. The findings have important implications for ongoing debates about cyber security policy.


2021 ◽  
Vol 10 (2) ◽  
pp. 38-45
Author(s):  
Saiida Lazaar

The great revolution of technology and its fast growth have led to a cyber space increasingly vulnerable to cyber-attacks. For this reason, cyber security becomes paramount to protect our cyber space by presenting and implementing important solutions to protect sensitive data from malicious persons. Thereby various measures of protection have been developed and aim to minimize the risks and damages of attacks. Among them, cryptography plays a vital and crucial role in protecting sensitive transmissions and electronic exchanges through complex networks. Numerous scientific studies have emerged with the advent of the cloud and the Internet of Things (IoT); all of them have expressed a strong need for building secure, efficient and fast cryptosystems targeting confidentiality, integrity and authentication. The last two objectives are essentially built on hash functions which are the main components of many applications and secure networks. The purpose of this paper is to give recent advances of lightweight cryptographic solutions that meet the requirements of constrained systems, and to present a study, in terms of security, energy-consuming and efficiency, of the main hash functions standardized by NIST (National Institute of Standards and Technology). In the end, the paper will give a comparison between the studied hash functions aiming to come up with a recommendation of good lightweight hash functions suitable for implementation in an IoT framework.


Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


2021 ◽  
pp. 77-87
Author(s):  
Sonia Ibrahim ◽  
◽  
◽  
◽  
◽  
...  

Cyber security practices mainly involve the prevention of external threats to software, hardware, server data, and other assets which are connected to the internet. Organizations follow a lot of cyber security practices to protect their systems and databases from malicious cyber actors. Cybercriminals use different techniques like spear-phishing, phishing, password attack, denial of service, ransomware, etc. to cause harm to people, organizations, and governments and steal important information from them. We analyzed the use of deep learning algorithms to deal with cyber-attacks. Deep neural networks or deep learning consist of machine learning procedures to support the network to fix complex issues and learn from unmanaged data. In addition, we also analyzed some of the cyber security laws and practices implemented in the US and Saudi Arabia to work collaboratively against cyber threats. It is observed that both countries are doing well against cyberthreats, but they need to work even more to provide training and support to professionals in the public sector who handle sensitive data about cyber security.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 389
Author(s):  
T Sreeja ◽  
Dr Manna Sheela Rani Chetty ◽  
Sekhar Babu Boddu

The spiking landscape of cyber-attacks is reflecting its trend towards invoking vulnerabilities in a web application. The vulnerabilities seem to be over-growing second by second beside being over-coming time to time. The reason behind is, new attack vectors are often being deployed by the threat actors. The global cyber security market alone has brought a turnover of about $350 billion, which shows how wide the attack landscape is and how expensive it is to detect, protect and respond to the cyber issues. Most of the security experts have quoted that, the average cost of a data breach will exceed to $150million by 2020 and about 80 percent of the global demography were nowhere aware of such attacks. From the past few years, SQL injection is acting as a major vector in breaching the sensitive data. Detecting SQL injection through log correlation is the most effective methodology utilized under adaptive environments seeking no tool investigation. This paper exposes a detection methodology of an SQL injection attack without any mere concentration on automated tools. The paper goes with a motto of detection through configuring the available resources like web server,database,and an IDS in a way of creating adaptable environment that can bring the entire attacker information through log analysis. The paper would represent the attacker phases in a finite automata.  


2021 ◽  
Vol 17 (3) ◽  
pp. 3-13
Author(s):  
Antonina Yerina ◽  
Ihor Honchar ◽  
Svitlana Zaiets

Introduction. The scale and destructive consequences of the unlawful impact on cyberspace is a key problem of modern geopolitics, and cyber reliability is recognized as one of the most important security priorities by the subjects of international relations.Problem Statement. Monitoring of cyber incidents and anomalies in information and communication systems and prompt response to risks determined by cyber threats require the development of a system of indicators and criteria for cybersecurity assessment.Purpose. Summarize the international experience of assessing the cybersecurity, to position countries by their level of development in the global space, to identify strengths and weaknesses in cybersecurity management, and to ensure effective protection of cyberspace at the national level.Materials and Methods. Used the component indices of the international rankings characterizing the potential of the digital economy (ICT IDI, NRI, EGDI) and the participation of countries in the field of cybersecurity(GCI and NCSI).Results. It has been argued that cybersecurity ratings play the role of a kind of identifier of the relative advantages and vulnerabilities of the national cyber strategies, and indicate the need for their review in order tostrengthen protection against cyber-attacks and improve the cyber risk management system. In countries with a high level of economic development, which is largely based on the contribution of IT technologies to the national production, the cybersecurity potential is significantly higher, regardless of geolocation. The discovered correlation between GCI, information society development indices (IDI, NRI, EGDI) and GDPper capita confirms that the digital transformation of the economy and society acts as a key driver of economicdevelopment if the information- and cyber-security are assured only. The best practices are highlighted, andcritically weak segments of the national cybersecurity are identified.Conclusions. Using the NCSI indicators, the preparedness of Georgia and Ukraine to prevent the implementation of fundamental cyber threats and to manage cyber incidents and large-scale cyber crises is assessed.


2021 ◽  
pp. 84-94
Author(s):  
Mohammed. I. Alghamdi ◽  

The cyber security risks on Intellectual Property (IP) have unfortunately become the center of media attention quite recently. The cyber domain has risen to the front position of national security policy in the United States. This growth has created room for developing a lot of innovative technologies to prevent IP cyber-attacks. Usually, cyber-attacks target private data. But cyber-attacks have recently expanded their threat level to intellectual property. These threats affect companies, people, and even national security. Cyber threats to IP will be victimized by globalization. Hence, this article is aimed to explore existing innovative technologies used to prevent IP cyber-attacks and their future scope. To find out the existing technologies used in the prevention of cyber-attacks, secondary data will be used from recent reports by various public and government organizations, research papers, and news portals, and other relevant sources. Since cyber threats are increasing, a comprehensive, multinational strategy is needed for making better cyber security infrastructure. This strategy would improve international relations, protect international supply chains, innovation, and reduce financial losses.


Sign in / Sign up

Export Citation Format

Share Document