全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

The Impact of Cyber Security on Business: How to Protect Your Business

DOI: 10.4236/ojsst.2023.132003, PP. 51-65

Keywords: Cyber Security, Business

Full-Text   Cite this paper   Add to My Lib

Abstract:

This book presents knowledge and grasp of numerous sorts of computer attacks, as well as the reasons and targets of those attacks. The introduction of the article includes a brief dictionary of relevant terms that are laid out in a manner that is simple to comprehend. Following this, the paper analyzes “the patterns and severities of cyber attacks and their impact on routine computer-based operations, the furtherance of business, and electronic commerce, as well as on some Critical National Infrastructure (CNI), which supports such essential areas as power, transportation, communications, defense, and banking and finance”. In the field of cyber security, which is now a highly popular topic of debate, the definition of cyberspace or cyber risk is currently a prominent issue of controversy. The major goal of this article is to educate the audience about the dilemma that is offered by cyber security and to make them aware of the possible attacks and cyber threats that now exist in the world of information technology or cyberspace. This piece will also make them aware of the attacks and cyber threats that now exist in the realm of information technology or cyberspace.

References

[1]  Jain, A.K., et al. (2021) Biometric Recognition: Challenges in Forensics.
http://biometrics.cse.msu.edu
[2]  Bank of England (2017) Systemic Risk Survey Results—2017 H2. London.
https://www.bankofengland.co.uk/systemic-risk-survey/2017/2017-h2
[3]  Bholat, D., Hansen, S., Santos, P. and Schonhardt-Bailey, C. (2015) Text Mining for Central Banks. Centre for Central Banking Studies.
https://doi.org/10.2139/ssrn.2624811
[4]  Cashell, B., Jackson, W.D., Jickling, M. and Webel, B. (2004) The Economic Impact of Cyber Attacks (April), Congressional Research Service Web Report.
https://sgp.fas.org/crs/misc/RL32331.pdf
[5]  Fifthen, K. (2013) Internet Denial of Service Attacks and the Federal Response,
https://cdt.org/wp-content/uploads/security/000229judiciary.shtml
[6]  World, E. (2022) Business Leaders Warn of Cybercrime Threat to Internet Development.
[7]  M. Butler (2017) Effective Global Regulation in Capital Markets. Speech at the ICI Conference, London, 5 December 2017.
https://www.fca.org.uk/news/speeches/effective-global-regulation-capital-markets
[8]  Clarke, A. and Hancock, J. (2012) Payment System Design and Participant Operational Disruptions. Journal of Financial Market Infrastructures, 2, 1-25.
https://doi.org/10.21314/JFMI.2013.023
[9]  Franklin, I. (2001) A Can of Worms. Computer Fraud & Security, 2001, 12-13.
https://doi.org/10.1016/S1361-3723(01)01218-0
[10]  Gengler, G. (2017) Paypal’s Anti-Fraud Team, Computer Fraud & Security, 2002, 5.
https://doi.org/10.1016/S1361-3723(02)00311-1
[11]  Glaser, M. and Haene, P. (2007) Simulation of Participant-Level Operational Disruption in Swiss Interbank Clearing: Significant Systemic Effects and Implications of Participants’ Behavior. Payment and Settlement Simulations Seminar, Helsinki, 28 August 2007.
https://www.suomenpankki.fi/globalassets/en/financial-stability/payment-and-settelement-system-simulator/events/2007_06_glaser_member-level-disruption-in-sic.pdf
[12]  G.A., de Oliveira Alves, L.F.R., da Costa Carmo and A.C.R.D., de Almeida (2006) Enterprise Security Governance: A Practical Guide to Implement and Control Information Security Governance (ISG) The First IEEE/IFIP International Workshop on Business-Driven IT Management, Vancouver, 3-7 April 2006, 71-80.
[13]  Harris, G. (2016) Compsec 2016: Watching the Threat from without Science Direct, Queen Elizabeth II Centre, London, 19.
[14]  Holm, H., Sommested, T., Ekstedt, M. and Nordstrom, L. (2013) CySeMol: A Tool for Cyber Security Analysis of Enterprises. The 22nd International Conference and Exhibition on Electricity Distribution, Stockholm, 10-13 June 2013.
https://doi.org/10.1049/cp.2013.1077
[15]  Joel Kayode Theophilus (2006) The Nigerian Police Cyber Crime Containment Prospects. West African Chief of Police Conference Abuja.
[16]  Kopp, E., Kaffenberger, L. and Wilson, C. (2017) Cyber Risk, Market Failures, and Financial Stability. IMF Working Paper No. 2017/185.
https://doi.org/10.5089/9781484313787.001
[17]  Mark Brown, Director for Advisory Risk & Information Security at Ernst & Young. Enterprise Security Architecture. Computer Weekly.
[18]  Menezes, A.J., van Oorschot, P.C. and Vanstone, S.A. (1996) Handbook of Applied Cryptography. CRC Press, Boca Raton.
http://www.cacr.math.uwaterloo.ca/hac
[19]  Miller, A. (2015) More than Half of IT Managers Are Ignorant of Rising Cybercrime Threat.
[20]  von Solms, R. and van Niekerk, J. (2013) From Information Security to Cyber Security. Computers & Security, 38, 97-102.
https://doi.org/10.1016/j.cose.2013.04.004%

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133