Managing Information Technology Security in the Context of Cyber Crime Trends

Authors

  • Diana-Elena Neghina Institute of Doctoral Studies - ASE
  • Emil Scarlat Academy of Economic Studies

Keywords:

Cybercrime, IT security, risk assessment, vulnerability management

Abstract

Cyber-attacks can significantly hurt an organization’s IT environment, leading to serious operational disruptions, from simply damaging the first layers of IT security up to identity theft, data leakage and breaking down networks. Moreover, the dangers through which current cybercrimes practices affect organizations present a tendency of developing more rapidly that decision makers can assess them and find countermeasures. Because cyber threats are somewhat new thus a critical source of risks, within the context of the constantly changing IT environments (e.g. cloud services integration) organizations may not effectively implement and manage cyber threat risk assessment processes. This paper highlights the importance of designing effective security strategies and proactively addressing cybercrime issues as key elements within the organizational risk management approaches.
Malware rises constantly in impact and complexity and has surpassed the traditional security model. One of the main ideas of the study is to present the main areas of risks related to cyber security to which an organization is subject to and provide a baseline of an analysis model that would adequately evaluate input data, rank priorities and represent the results and solutions to decrease these risks. The importance of this study is to increase awareness efforts and to highlight the critical importance of using the full extent of resources provided. Each member of an organization has a significant role in decreasing the exposure to the vulnerabilities created by cyber-attacks.

References

Gregg Schudel, Bradley Wood, Modeling Behavior of the Cyber-Terrorist, in http://www.dli.gov.in/data/HACKING_INFORMATION/PRINTED20PAPERS/Modeling20Behavior20of20cyber20terrorist.pdf.

Tim Shimeall, Phil Williams, Models of Information Security Trend Analysis, in http://www.dli.gov.in/data/HACKING_INFORMATION/PRINTED20PAPERS/models20for20inf20security20TREND20ANALYSIS.pdf.

M. E. Kabay, MA Brief History of Computer Crime, in http://www.mekabay.com/overviews/history.pdf.

Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang, Editors, Cyber situational awareness: Issues and Research, in Springer International Series on ADVANCES IN INFORMATION SECURITY.

Sumit Ghosh, Elliot Turrini, Editors, Cybercrimes: A Multidisciplinary Analysis, in Springer-Verlag Berlin Heidelberg, 2010.

Martin C. Libicki, Cyberdeterrance and Cyberwar, Rand Corporation, 2009.

Jean-Marc Seigneur, Adam Slagell, Collaborative Computer Security and Trust Management, in Information Science Reference (an imprint of IGI Global), 2010.

Published

2012-11-13

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.