Preparing for Cyber Threats with Information Security Policies

被引:0
|
作者
Ilvonen, Ilona [1 ]
Virtanen, Pasi [1 ]
机构
[1] Tampere Univ Technol, Tampere, Finland
关键词
Cyber Threats; Information Security Management Tools; Information Security Policy; Organisations; Security Policy;
D O I
10.4018/ijcwt.2013100103
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The scenarios are built based on a literature review. One outcome of the analysis is that to an organisation it is irrelevant where a cyber threat originates from and who it is targeted for. If the threat is specifically targeted to the organisation or if the threat is collateral in nature is not important; preparing for the threat is important in both cases. The paper discusses the pressures that the cyber threats pose to information security policies, and what the role of the information security policy could be in preparing for the threats.
引用
收藏
页码:22 / 31
页数:10
相关论文
共 50 条
  • [1] Information security economics: cyber security threats
    Hojda, Mihaela Hortensia
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, 2022, 16 (01): : 584 - 592
  • [2] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [3] Cyber security information exchange to gain insight into the effects of cyber threats and incidents
    Fransen, F.
    Smulders, A.
    Kerkdijk, R.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2015, 132 (02): : 106 - 112
  • [4] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [5] Aviation and Cyber security threats
    Lehto, Martti
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 197 - 197
  • [6] A Survey on Cyber Security Threats
    Gulshan
    Chauhan, Sansar Singh
    Proceedings of International Conference on Technological Advancements and Innovations, ICTAI 2021, 2021, : 218 - 223
  • [7] An Investigation on Cyber Security Threats and Security Models
    Thakur, Kutub
    Qiu, Meikang
    Gai, Keke
    Ali, Md Liakat
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 307 - 311
  • [8] Aviation cyber security: legal aspects of cyber threats
    Klenka, Michal
    JOURNAL OF TRANSPORTATION SECURITY, 2021, 14 (3-4) : 177 - 195
  • [9] Aviation cyber security: legal aspects of cyber threats
    Michal Klenka
    Journal of Transportation Security, 2021, 14 : 177 - 195
  • [10] Categorising Cyber Security Threats for Standardisation
    Khan, Zubeida Casmod
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 189 - 196