Identifying and Analyzing the Latent Cyber Threats in Developing Economies

Author(s):  
Atul Bamrara

Internet usage has increased significantly across developing economies in last decade and most of the enterprises are extensively reliable on computer networks for electronic mails to payment gateways. But, the scenario we live in today has become more and more connected, sophisticated and risk-prone to our network-delivered society. Nevertheless, it remains critical for enterprises to exploit the full potential of available technologies such as mobile computing, smart computing and cloud computing. A cyber security related gaffe in any of these rapidly emerging domains may lead to lost productivity and grave concerns to the enterprise. The chapter highlights the various concerns associated to cyber security, viz., how an attack may be operated and offered measures to secure the network and information technology resources within and outside the enterprise. In most of the developing economies no synchronized activities in this regard are taking place which opens the opportunity to cyber criminals intrude into the system and compromise the resources.

2018 ◽  
pp. 1044-1059
Author(s):  
Atul Bamrara

Internet usage has increased significantly across developing economies in last decade and most of the enterprises are extensively reliable on computer networks for electronic mails to payment gateways. But, the scenario we live in today has become more and more connected, sophisticated and risk-prone to our network-delivered society. Nevertheless, it remains critical for enterprises to exploit the full potential of available technologies such as mobile computing, smart computing and cloud computing. A cyber security related gaffe in any of these rapidly emerging domains may lead to lost productivity and grave concerns to the enterprise. The chapter highlights the various concerns associated to cyber security, viz., how an attack may be operated and offered measures to secure the network and information technology resources within and outside the enterprise. In most of the developing economies no synchronized activities in this regard are taking place which opens the opportunity to cyber criminals intrude into the system and compromise the resources.


Author(s):  
Malgorzata Pankowska

Nowadays business organizations seem to be involved in the processes of sustainable development. Therefore, not only economic indicators of performance are considered but also – the environmental responsibility is equally important. The environmental responsibility covers social responsibility and natural environment responsibility. The last one demands taking into account promotion of sustainable use of renewable natural resources, reducing the emissions and wastages, and decrease of energy consumption. The first part of the chapter includes presentation of benefits resulting from IT (Information Technology) resources virtualization, Grid computing and cloud computing development. The second part contains a model of IT governance for sustainability. The main important factors included in the model concern IT strategy, business strategy, IT management, business agreements.


Author(s):  
Malgorzata Pankowska

Today, business organizations seem to be involved in the processes of sustainable development. Therefore, not only economic indicators of performance are considered but also the environmental responsibility is equally important. The environmental responsibility covers social responsibility and natural environment responsibility. The latter demands taking into account promotion of sustainable use of renewable natural resources, reducing the emissions and wastages, decrease of energy consumption. The first part of the paper includes presentation of benefits resulting from IT (Information Technology) resources virtualization, grid computing and cloud computing development. The second part contains a model of IT governance for sustainability.


2022 ◽  
pp. 424-439
Author(s):  
Galit Klein ◽  
Moti Zwilling ◽  
Dušan Lesjak

With the COVID-19 pandemic, many organizations and institutions moved to e-learning and to e-working from home. With the increase in internet usage, the rate of cyber-attacks have also increased, and this was followed by the request for more cyber security behaviors from employees and students. In the current study, the authors explore the connection between cyber security awareness, cyber knowledge, and cyber security behavior. The authors measured the behaviors among students in two similar countries: Israel and Slovenia. Results show that students felt they had adequate awareness on cyber threat but apply only a few protective measures to protect their devices, usually relatively common and simple ones. The study findings also show that awareness to cyber threats mediate the connection between knowledge and protection behaviors, but only in the case that the knowledge is specific with regard to IT protection courses. Results, implications, and recommendations for effective cyber security training programs for organizations and academic institutions are presented and discussed.


Author(s):  
Galit Klein ◽  
Moti Zwilling ◽  
Dušan Lesjak

With the COVID-19 pandemic, many organizations and institutions moved to e-learning and to e-working from home. With the increase in internet usage, the rate of cyber-attacks have also increased, and this was followed by the request for more cyber security behaviors from employees and students. In the current study, the authors explore the connection between cyber security awareness, cyber knowledge, and cyber security behavior. The authors measured the behaviors among students in two similar countries: Israel and Slovenia. Results show that students felt they had adequate awareness on cyber threat but apply only a few protective measures to protect their devices, usually relatively common and simple ones. The study findings also show that awareness to cyber threats mediate the connection between knowledge and protection behaviors, but only in the case that the knowledge is specific with regard to IT protection courses. Results, implications, and recommendations for effective cyber security training programs for organizations and academic institutions are presented and discussed.


2016 ◽  
pp. 2197-2220
Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Cloud computing, characterized by on demand availability of resources is gaining a lot of popularity in the present day business scenario. This new computing paradigm is predicted to revolutionize the Information Technology industry with its dynamic and scalable capabilities. Cloud computing is catering to the needs of a wide variety of users, across the different parts of the world with its huge number of offerings. Information technology resources are offered as services over the Internet, which leads to a number of technical and management concerns. Data is stored away from the users' premises, leading to various challenges in maintaining security, privacy and regulatory compliances. Therefore, cloud computing does not involve single discipline rather multi-discipline. Considering this multi-disciplinary involvement, current work focuses on identification of research issues in the cloud computing environment, and categorizing these issues in the technical, legal and management domains. Work further discusses the multi-disciplinary research areas where cloud computing is currently focused and suggests the potential areas for further research.


2014 ◽  
Vol 7 (3) ◽  
pp. 32-53 ◽  
Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Cloud computing, characterized by on demand availability of resources is gaining a lot of popularity in the present day business scenario. This new computing paradigm is predicted to revolutionize the Information Technology industry with its dynamic and scalable capabilities. Cloud computing is catering to the needs of a wide variety of users, across the different parts of the world with its huge number of offerings. Information technology resources are offered as services over the Internet, which leads to a number of technical and management concerns. Data is stored away from the users' premises, leading to various challenges in maintaining security, privacy and regulatory compliances. Therefore, cloud computing does not involve single discipline rather multi-discipline. Considering this multi-disciplinary involvement, current work focuses on identification of research issues in the cloud computing environment, and categorizing these issues in the technical, legal and management domains. Work further discusses the multi-disciplinary research areas where cloud computing is currently focused and suggests the potential areas for further research.


The usage and management of information technology resources and services are revolutionized with the arrival of Cloud Computing. But, the revolution always comes with problems. Authentication is one such problem. Especially for Graphical Password Authentication System, there is a threat of shoulder surfing attack. This research presents a multi-level graphical password authentication mechanism by extending an existing method. UGPSCCCT (User guided Graphical Password Scheme for Cloud using Caesar Cipher Technique) is the existing method and this method is extended in this paper such that another level of security is added. The user credentials in this method are transmitted to the server in encryption format. A key is generated for every login to encrypt user details. The analysis of the proposed method is done by calculating the computational cost and communication cost of the proposed method


2011 ◽  
Vol 2 (2) ◽  
pp. 35-48
Author(s):  
Malgorzata Pankowska

Today, business organizations seem to be involved in the processes of sustainable development. Therefore, not only economic indicators of performance are considered but also the environmental responsibility is equally important. The environmental responsibility covers social responsibility and natural environment responsibility. The latter demands taking into account promotion of sustainable use of renewable natural resources, reducing the emissions and wastages, decrease of energy consumption. The first part of the paper includes presentation of benefits resulting from IT (Information Technology) resources virtualization, grid computing and cloud computing development. The second part contains a model of IT governance for sustainability.


CCIT Journal ◽  
2019 ◽  
Vol 12 (2) ◽  
pp. 138-148
Author(s):  
H. Abdul Hamid Arribathi ◽  
Dedeh Supriyanti ◽  
Lusyani Sunarya

Information technology is increasingly developing and has a positive impact on the world of education. The implementation of student counseling with a Knowledge Management System is one of the contributions of information technology in the world of education. Many benefits provided by the Student Counseling Knowledge Management System, in managing the knowledge needed by the counselor section to document student consultations. The development and implementation of a KMS counseling system costs more to employ professional staff to maintain and improve; KMS student counseling application; For this reason, it is necessary to design a Cloud Computing-based Student Counseling Knowledge Management System. The research method carried out in the first stage is to collect data and information about Knowledge Management and Student Counseling, and how to use it to create a Knowledge Management System Application, Student Counseling Based on cloud computing. Furthermore, conducting a literature study and literature review, system design is in the form of data architecture compounding, process design, network design, and user interface design. The design results of this system can facilitate educational institutions in conducting online cloud computing-based student counseling


Sign in / Sign up

Export Citation Format

Share Document