Organizational Resilience Approaches to Cyber Security

2019 ◽  
pp. 1189-1199
Author(s):  
David Gould

This article includes a perspective on cyber security through the lens of the World Economic Forum Resilience Framework. As cyber threats are a continual threat to organizations, it may be useful to consider resilience as a complementary approach to technological responses. The problem is that organizations cannot generate a sufficient number and types of responses to cyber security threats as the number of threats and associated costs continues to increase. The purpose of this article is to explore some possible practices and approaches to counter the ongoing and escalating cyber security threats, with the understanding and wisdom that not all threats will be possible to stop. Resilience is a complementary factor to directly countering threats by taking actions to backup information, having access to additional equipment as needed, by budgeting for failure, preparing for unexpected circumstances among other activities. Concepts from evolution and game theory are introduced within the resilience discussion.

2018 ◽  
Vol 9 (4) ◽  
pp. 53-62
Author(s):  
David Gould

This article includes a perspective on cyber security through the lens of the World Economic Forum Resilience Framework. As cyber threats are a continual threat to organizations, it may be useful to consider resilience as a complementary approach to technological responses. The problem is that organizations cannot generate a sufficient number and types of responses to cyber security threats as the number of threats and associated costs continues to increase. The purpose of this article is to explore some possible practices and approaches to counter the ongoing and escalating cyber security threats, with the understanding and wisdom that not all threats will be possible to stop. Resilience is a complementary factor to directly countering threats by taking actions to backup information, having access to additional equipment as needed, by budgeting for failure, preparing for unexpected circumstances among other activities. Concepts from evolution and game theory are introduced within the resilience discussion.


2017 ◽  
Vol 4 (4) ◽  
pp. 267-274
Author(s):  
Farzana Zaheer Syed ◽  
Saba Javed

Deterrence as an approach aims to prevent a non-state actor who is planning to threat and harm a nation state externally and internally. The present study designed to find out that to what extent Deterrence as security strategy is effective against non-traditional threats in Pakistan?, and Whether the deterrence as security strategy remains effective against non-traditional threats of terrorism and cyber threats in Pakistan? The world has redefined and reorganized the security strategies after 9/11terroists attacks. The fourth wave in the deterrence theory has extended the deterrence security concept and added up the non-traditional threats as necessary part in security planning. Non-Traditional threats, terrorism, ambiguous warfare, cyber threats, water security, human security and energy crises etc now have equal importance with the border security. To protect the state from these actors, Pakistan is now reassessing and reorganized its security strategies. But these policies need more deliberate efforts to deal with such internal and external factors that are slowly and constantly weakening the state.Int. J. Soc. Sc. Manage. Vol. 4, Issue-4: 267-274


2022 ◽  
Author(s):  
Usman Akanbi

The Covid-19 pandemic is an unforeseen occurrence that took the world by storm. Governments and businesses were unprepared, hence the large-scale impact it continuously has on the planet. It has permanently revolutionised how we live, work and interact with technology. With this new way of living, businesses and governments had to adapt to a new form of survival, and so did cybercriminals; there was a surge in cyber threats due to our newfound dependence on technology. This paper emphasises the common types of cyber threats and the targeted industries. These attacks were more successful because people were uneasy and desperate, which gave the criminals more incentive to attack businesses. To avoid being a cyber target, I have provided recommendations against future threats.


2021 ◽  
pp. 19-27
Author(s):  
Nazar Demchyshak ◽  
Anastasiia Shkyria

Purpose. The aim of the article is substantiation of approaches of domestic and foreign scientists to risk management in the financial sector of Ukraine in the context of cyber threats and the need to ensure national security and post-pandemic economic recovery. Methodology of research. General scientific and special methods of scientific research are used in the article, in particular: induction, deduction, scientific abstraction - to reveal the essence of the concepts of "cyber threat", “cyber security" and "digitalization"; statistical and graphical methods - to assess the current situation in the field of cyber defence in the world and the national cyber security index; methods of analysis and synthesis - in substantiating the conclusions of the research. Finding. Definitions of cyber risk, approaches to its interpretation and classification were considered. The importance of cyber security in the digitalization of the national economy was argued. The Strategy of Ukrainian Financial Sector Development until 2025 is analysed. The world statistics of frequency and losses due to cyber-attacks are studied and the cyber threats that caused the greatest losses in Ukraine are identified. The analysis of Ukraine’s positions in the National Cyber Security Index 2020 is carried out. The directions of cyber threat prevention that can be useful for Ukrainian companies are substantiated. Originality. The author’s definition of the term "cyber risk" is proposed, in which special attention in focused on the effects of cyber threats. The importance of cyber risk management in the conditions of inevitability of digitalization in the financial sector of Ukraine is substantiated. Approaches to the prevention of cyber-attacks, the implementation of which is necessary for the successful digital transformation of Ukraine, are proposed. Practical value. The results of the research will contribute to the formation of an effective risk management system in the financial sector of Ukraine in terms of digitalization of the financial space and post-pandemic recovery of the national economy. Key words: national security, cyber risk, cyber threat, cyber defence, digitalization, post-pandemic recovery, fintech.


2020 ◽  
Vol 2 (1) ◽  
pp. 62-65
Author(s):  
Alexander. P

The present study defines automated solutions in safety and security in the emerging world. As there are large number of cyber security threats in the world there have been large number of solutions and one such solution is the use of automation in safety and security. Hence, the presented report display the role and importance of automation.


2019 ◽  
Vol 02 (01) ◽  
pp. 1950002
Author(s):  
Buddhi Prasad Sharma ◽  
Raunab Singh Khatri

Over the last three and half decades, China’s rapid advancement in development efforts has been accompanied by a conscious effort in projecting itself as a major frontrunner in the economy. Despite being a developing country (Huang, 2015), Chinese President Xi Jinping’s announcement in World Economic Forum (WEF) (Bruce-Lockhart, 2017) had hinted China’s growing interest in the development of trade and network among countries. The Belt and Road Initiative (BRI) is also one such development put forward to institutionalize China’s soft power presence in the world and create harmony with rest of the world. The Initiative has been placed as synonymous to a way of friendly cooperation signaling the project as “Road for Peace” (Kasturi, 2017). China has placed a tremendous amount of effort for its “charm offensive” approach with an estimated US$10 billion spending every year on its global soft power presence (Kurlantzick, 2017). Under the project, China has placed initiatives in approaching for regional connectivity in the South Asia region with China–Pakistan Economic Corridor (CPEC) being regarded as its flagship program. As it goes, of all the projects China has undertaken in the BRI, its ventures in South Asia are considered challenging and need strong cooperation (Stratfor Enterprises, 2017). The unstable geo-politics and security threats in the region pose Beijing with a lot to consider before it can preach about the peaceful connectivity. Most significant of all, the problems in the region will be with India as it has openly expressed its dissatisfaction towards BRI. India not only observes the initiative as a security threat with CPEC corridor passing through the controversial Kashmir area, but also sees it as an initiative to undermine its traditional influence in the region. As such, this paper tries to provide an analytical view of BRI with China’s soft power presence in the South Asia region.


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Mohammed Daffalla Elradi ◽  
Khalid Abass Abdelmaged ◽  
Mutaz Osman Mohammad

As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwide, cyber security professionals need to cope up with such a highly demanding environment. Security teams, such as Security operation Centre (SOC), Incident Response (IR) and Threat management teams are the people responsible for dealing with cyber security threats and attacks from detection to containment and preventing future incidents; which encompasses some significant challenges that might impose some limitations to the efficiency and effectiveness of activities cyber security professionals conduct, as these processes are time-consuming. In this paper we propose an integrated platform to help cyber security professionals to proactively manage cyber security threats and emerging incidents by providing an automated functionality that can optimize the workflow. The proposed security platform is supposed to diminish the average time taken by cyber security professionals to respond to cyber incidents with an average of 42%. This study can be used as a preliminary design for such an integrated platform.


2020 ◽  
Author(s):  
Pranav C

Abstract: With rapid computerisation of all walks of life, cyber security has become a major challenge to the mankind. Cyber security is all about security of anything in cyber realm, while information security is all about security of information regardless of the realm. Cybercrimes are perpetrated by using computers and related devices / networks by individuals with sophisticated knowledge in the field of computers. Cybercrime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cybercrime has assumed rather sinister implications. Cybercrime perpetrators are keeping pace with innovations in technology and are way ahead of security measures taken to curb them. With huge money involved in cybercrimes, it has become a major concern. This research paper briefly defines cyber security and deals in detail with cybercrime and five major cyber security threats currently plaguing the world.


Author(s):  
Vaishnavi Ambalavanan ◽  
Shanthi Bala P.

Cyberspace plays a dominant role in the world of electronic communication. It is a virtual space where the interconnecting network has an independent technology infrastructure. The internet is the baseline for the cyberspace which can be openly accessible. Cyber-security is a set of techniques used to protect network integrity and data from vulnerability. The protection mechanism involves the identification of threats and taking precaution by predicting the vulnerabilities in the environment. The main cause of security violation will be threats, that are caused by the intruder who attacks the network or any electronic devices with the intention to cause damage in the communication network. These threats must be taken into consideration for the mitigation process to improve the system efficiency and performance. Machine learning helps to increase the accuracy level in the detection of threats and their mitigation process in an efficient way. This chapter describes the way in which threats can be detected and mitigated in cyberspace with certain strategies using machine learning.


Sign in / Sign up

Export Citation Format

Share Document