Preparing for Cyber Threats with Information Security Policies

被引:0
|
作者
Ilvonen, Ilona [1 ]
Virtanen, Pasi [1 ]
机构
[1] Tampere Univ Technol, Tampere, Finland
关键词
Cyber Threats; Information Security Management Tools; Information Security Policy; Organisations; Security Policy;
D O I
10.4018/ijcwt.2013100103
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
Contemporary organisations in any industry are increasingly dependent on information systems. Today most organisations are online all the time, and their internal systems are used in environments that are already or easily connected to the internet. The paper analyses cyber threats and their potential effect on the operations of different organisations with the use of scenario analysis. The scenarios are built based on a literature review. One outcome of the analysis is that to an organisation it is irrelevant where a cyber threat originates from and who it is targeted for. If the threat is specifically targeted to the organisation or if the threat is collateral in nature is not important; preparing for the threat is important in both cases. The paper discusses the pressures that the cyber threats pose to information security policies, and what the role of the information security policy could be in preparing for the threats.
引用
收藏
页码:22 / 31
页数:10
相关论文
共 50 条
  • [31] Generative AI in Cyber Security of Cyber Physical Systems: Benefits and Threats
    Mavikumbure, Harindra S.
    Cobilean, Victor
    Wickramasinghe, Chathurika S.
    Drake, Devin
    Manic, Milos
    2024 16TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION, HSI 2024, 2024,
  • [32] Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds
    Presekal, Alfan
    Jorjani, Mohsen
    Rajkumar, Vetrivel Subramaniam
    Goyel, Himanshu
    Cibin, Nicola
    Semertzis, Ioannis
    Stefanov, Alexandru
    Palensky, Peter
    IEEE ACCESS, 2024, 12 : 165756 - 165773
  • [33] Cyberattacks, cyber threats, and attitudes toward cybersecurity policies
    Snider, Keren L. G.
    Shandler, Ryan
    Zandani, Shay
    Canetti, Daphna
    JOURNAL OF CYBERSECURITY, 2021, 7 (01):
  • [34] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    COMPUTERS & SECURITY, 2013, 38 : 97 - 102
  • [35] Cyber threats: taxonomy, impact, policies, and way forward
    Malik, Annas W.
    Abid, Adnan
    Farooq, Shoaib
    Abid, Irfan
    Nawaz, Naeem A.
    Ishaq, Kashif
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (07): : 2425 - 2458
  • [36] Cyber Security Defence Policies: A Proposed Guidelines for Organisations Cyber Security Practices
    Oyelami, Julius Olusegun
    Kassim, Azleena Mohd
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) : 131 - 138
  • [37] MECHANISM FOR INFORMATION SUPPORTING THE FINANCIAL AND ECONOMIC SECURITY OF INFORMATION AND TELECOMMUNICATION ENTERPRISES UNDER THE INFLUENCE OF MODERN CYBER THREATS
    Kryshtanovych, Myroslav
    Batiuk, Oleg
    Panfilova, Tetiana
    Burnatnyi, Vitalii
    Sporyshev, Kostiantyn
    FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2024, 2 (55): : 461 - 473
  • [38] Measuring Cyber Essentials Security Policies
    Bartha, Sandor
    Ballantine, Russell
    Aspinall, David
    PROCEEDINGS OF 17TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP, CSET 2024, 2024, : 8 - 17
  • [39] Threats to Health Information Security
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 540 - 543
  • [40] EVOLUTION OF AMERICAN CYBER SECURITY POLICIES
    Sharikov, Pavel A.
    MIROVAYA EKONOMIKA I MEZHDUNARODNYE OTNOSHENIYA, 2019, 63 (10): : 51 - 58