Managing Information Technology Security in the Context of Cyber Crime Trends

被引:0
|
作者
Neghina, D. [1 ]
Scarlat, E. [2 ]
机构
[1] Inst Doctoral Studies ASE, Bucharest, Romania
[2] Acad Econ Studies, Dept Econ Cybernet, Bucharest, Romania
关键词
Cybercrime; IT security; risk assessment; vulnerability management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks can significantly hurt an organization's IT environment, leading to serious operational disruptions, from simply damaging the first layers of IT security up to identity theft, data leakage and breaking down networks. Moreover, the dangers through which current cybercrimes practices affect organizations present a tendency of developing more rapidly that decision makers can assess them and find countermeasures. Because cyber threats are somewhat new thus a critical source of risks, within the context of the constantly changing IT environments (e.g. cloud services integration) organizations may not effectively implement and manage cyber threat risk assessment processes. This paper highlights the importance of designing effective security strategies and proactively addressing cybercrime issues as key elements within the organizational risk management approaches. Malware rises constantly in impact and complexity and has surpassed the traditional security model. One of the main ideas of the study is to present the main areas of risks related to cyber security to which an organization is subject to and provide a baseline of an analysis model that would adequately evaluate input data, rank priorities and represent the results and solutions to decrease these risks. The importance of this study is to increase awareness efforts and to highlight the critical importance of using the full extent of resources provided. Each member of an organization has a significant role in decreasing the exposure to the vulnerabilities created by cyber-attacks.
引用
收藏
页码:97 / 104
页数:8
相关论文
共 50 条
  • [1] Managing Information Technology Security Risk
    Gilliam, DP
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 296 - 317
  • [2] Cyber-Security Issues in Healthcare Information Technology
    Langer, Steve G.
    [J]. JOURNAL OF DIGITAL IMAGING, 2017, 30 (01) : 117 - 125
  • [3] Cyber-Security Issues in Healthcare Information Technology
    Steve G. Langer
    [J]. Journal of Digital Imaging, 2017, 30 : 117 - 125
  • [4] Curtailing cyber and information security vulnerabilities through situational crime prevention
    Sameer Hinduja
    Brandon Kooi
    [J]. Security Journal, 2013, 26 : 383 - 402
  • [5] Curtailing cyber and information security vulnerabilities through situational crime prevention
    Hinduja, Sameer
    Kooi, Brandon
    [J]. SECURITY JOURNAL, 2013, 26 (04) : 383 - 402
  • [6] Managing Context Information for Adaptive Security in IoT environments
    Hernandez-Ramos, Jose L.
    Bernabe, Jorge Bernal
    Skarmeta, Antonio F.
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 676 - 681
  • [7] Context information based cyber security defense of protection system
    Su, Sheng
    Duan, Xianzhong
    Zeng, Xiangjun
    Chan, W. L.
    Li, K. K.
    [J]. 2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 294 - 294
  • [8] Present & Future Paradigms of Cyber Crime & Security Majors Growth & Rising Trends
    Gunjan, Vinit Kumar
    Kumar, Amit
    Rao, Allam Appa
    [J]. PROCEEDINGS 2014 4TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE WITH APPLICATIONS IN ENGINEERING AND TECHNOLOGY ICAIET 2014, 2014, : 89 - 94
  • [9] Trends in information security technology - Cryptography in the limelight
    Suzuki, M
    Hayashi, S
    Murata, Y
    [J]. NTT REVIEW, 1996, 8 (01): : 24 - 31
  • [10] Trends of international standards for information security technology
    Moriai, S
    Fujioka, A
    [J]. NTT REVIEW, 2003, 15 (02): : 47 - 52