Managing Information Technology Security in the Context of Cyber Crime Trends
Keywords:Cybercrime, IT security, risk assessment, vulnerability management
Cyber-attacks can significantly hurt an organization’s IT environment, leading to seriousÂ operational disruptions, from simply damaging the first layers of IT security upÂ to identity theft, data leakage and breaking down networks. Moreover, the dangersÂ through which current cybercrimes practices affect organizations present a tendencyÂ of developing more rapidly that decision makers can assess them and find countermeasures.Â Because cyber threats are somewhat new thus a critical source of risks,Â within the context of the constantly changing IT environments (e.g. cloud servicesÂ integration) organizations may not effectively implement and manage cyber threatÂ risk assessment processes. This paper highlights the importance of designing effectiveÂ security strategies and proactively addressing cybercrime issues as key elementsÂ within the organizational risk management approaches.
Malware rises constantly in impact and complexity and has surpassed the traditionalÂ security model. One of the main ideas of the study is to present the main areas of risksÂ related to cyber security to which an organization is subject to and provide a baselineÂ of an analysis model that would adequately evaluate input data, rank priorities andÂ represent the results and solutions to decrease these risks. The importance of thisÂ study is to increase awareness efforts and to highlight the critical importance of usingÂ the full extent of resources provided. Each member of an organization has a significantÂ role in decreasing the exposure to the vulnerabilities created by cyber-attacks.
Gregg Schudel, Bradley Wood, Modeling Behavior of the Cyber-Terrorist, in http://www.dli.gov.in/data/HACKING_INFORMATION/PRINTED20PAPERS/Modeling20Behavior20of20cyber20terrorist.pdf.
Tim Shimeall, Phil Williams, Models of Information Security Trend Analysis, in http://www.dli.gov.in/data/HACKING_INFORMATION/PRINTED20PAPERS/models20for20inf20security20TREND20ANALYSIS.pdf.
M. E. Kabay, MA Brief History of Computer Crime, in http://www.mekabay.com/overviews/history.pdf.
Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang, Editors, Cyber situational awareness: Issues and Research, in Springer International Series on ADVANCES IN INFORMATION SECURITY.
Sumit Ghosh, Elliot Turrini, Editors, Cybercrimes: A Multidisciplinary Analysis, in Springer-Verlag Berlin Heidelberg, 2010.
Martin C. Libicki, Cyberdeterrance and Cyberwar, Rand Corporation, 2009.
Jean-Marc Seigneur, Adam Slagell, Collaborative Computer Security and Trust Management, in Information Science Reference (an imprint of IGI Global), 2010.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.