Cyber Security Implementation: A Report on Threats to ABC Technology
VerifiedAdded on 2023/01/05
|14
|3807
|72
Report
AI Summary
This report examines the critical aspects of cyber security within the context of ABC Technology, a large-scale organization heavily reliant on advanced technologies. It identifies the significance of cyber security measures in today's digital landscape and evaluates their relevance to ABC Technology's operations. The report delves into potential data breaching scenarios, security vulnerabilities associated with cloud storage, and risks stemming from ICT implementation. Furthermore, it outlines possible security threats such as malware attacks, ransomware, and denial-of-service attacks, offering a comprehensive overview of the challenges and potential solutions for maintaining a robust cyber security posture within the organization. The report concludes with recommendations aimed at enhancing the overall security framework of ABC Technology.

Running head: CYBER SECURITY IN ORGANIZATION
CYBER SECURITY IN ORGANIZATION
Name of the Student:
Name of the University:
Author Note:
CYBER SECURITY IN ORGANIZATION
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
CYBER SECURITY IN ORGANIZATION
Executive summary
The area of digital dependency has been found to play a crucial part to enhance technology at the
current marketplace. For the current case, the ABC technology is selected. Here, the business has
been operating at a large scale and dealing with a greater level of technology. This requires
suitable maintenance with smart security measures. In this study the cybersecurity and its
importance are identified. Next, the importance of cyber security under the technology’s business
is evaluated. Further, discussions are made on data breaching and security vulnerabilities within
cloud. Next, the study demonstrates the vulnerabilities related to the ICT implementation. At
last, the probable security threats under the business are identified.
CYBER SECURITY IN ORGANIZATION
Executive summary
The area of digital dependency has been found to play a crucial part to enhance technology at the
current marketplace. For the current case, the ABC technology is selected. Here, the business has
been operating at a large scale and dealing with a greater level of technology. This requires
suitable maintenance with smart security measures. In this study the cybersecurity and its
importance are identified. Next, the importance of cyber security under the technology’s business
is evaluated. Further, discussions are made on data breaching and security vulnerabilities within
cloud. Next, the study demonstrates the vulnerabilities related to the ICT implementation. At
last, the probable security threats under the business are identified.

2
CYBER SECURITY IN ORGANIZATION
Table of Contents
Introduction......................................................................................................................................2
Discussion........................................................................................................................................2
Cyber Security and its significance.............................................................................................2
Relevance of cyber security in ABC Technology.......................................................................3
Data Breaching............................................................................................................................3
Security vulnerability in cloud.....................................................................................................4
Vulnerability regarding the implementation of ICT....................................................................5
Possible security threats in the organization................................................................................5
Recommendations........................................................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10
CYBER SECURITY IN ORGANIZATION
Table of Contents
Introduction......................................................................................................................................2
Discussion........................................................................................................................................2
Cyber Security and its significance.............................................................................................2
Relevance of cyber security in ABC Technology.......................................................................3
Data Breaching............................................................................................................................3
Security vulnerability in cloud.....................................................................................................4
Vulnerability regarding the implementation of ICT....................................................................5
Possible security threats in the organization................................................................................5
Recommendations........................................................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10

3
CYBER SECURITY IN ORGANIZATION
Introduction
Digital dependency plays an important role for the development of the technology in the
industry. It has been seen that with the increase in the digital dependency, there raises the
concern about maintain the cyber security. The advancement of the technology has allowed the
use of the emerging technologies like the Internet of Things (Kuypers,Maillart& Pate-
Cornell,2016). Apart from that many new concepts of doing the work has been implemented. In
this context, the use of the “Bring your own device” policy can be mentioned.
Concerning all these things it has been seen that the cyber security attacks has been
increased significantly. In most of the cases, the security attacks are exploiting the security
vulnerabilities of the emerging technologies. In order to prevent this certain measures are needed
to be taken like the use of the VPN. Apart from that the awareness among the users regarding
maintaining the cyber security is also important. The main objective of this paper is to evaluate
the different aspects of the cyber security and the measures those are needed to be taken in the
organizations so that the functioning of the organization can be secured. The selected
organization in this case is ABC technology (Perakslis& Stanley,2016). The company is
currently operating in large scale and is dealing with the high level technology that needs the
proper maintenance and the security measures. The factors discussed in the paper will indicate
the conclusion.
Discussion
Cyber Security and its significance
Cyber security is defined by the activities those are needed to be carried out for the
protecting the system and the information stored in the system from the external threats. It has
CYBER SECURITY IN ORGANIZATION
Introduction
Digital dependency plays an important role for the development of the technology in the
industry. It has been seen that with the increase in the digital dependency, there raises the
concern about maintain the cyber security. The advancement of the technology has allowed the
use of the emerging technologies like the Internet of Things (Kuypers,Maillart& Pate-
Cornell,2016). Apart from that many new concepts of doing the work has been implemented. In
this context, the use of the “Bring your own device” policy can be mentioned.
Concerning all these things it has been seen that the cyber security attacks has been
increased significantly. In most of the cases, the security attacks are exploiting the security
vulnerabilities of the emerging technologies. In order to prevent this certain measures are needed
to be taken like the use of the VPN. Apart from that the awareness among the users regarding
maintaining the cyber security is also important. The main objective of this paper is to evaluate
the different aspects of the cyber security and the measures those are needed to be taken in the
organizations so that the functioning of the organization can be secured. The selected
organization in this case is ABC technology (Perakslis& Stanley,2016). The company is
currently operating in large scale and is dealing with the high level technology that needs the
proper maintenance and the security measures. The factors discussed in the paper will indicate
the conclusion.
Discussion
Cyber Security and its significance
Cyber security is defined by the activities those are needed to be carried out for the
protecting the system and the information stored in the system from the external threats. It has
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
CYBER SECURITY IN ORGANIZATION
been seen, in most of the cases, the transfer of the information between two devices are done
through the internet connection. Apart from that the use of the emerging technologies needs the
internet connectivity for the proper operation. In this situation , there is a possibility that the
potential external threats can make the system damage or violate the proper transformation of the
data. All these activities can be regarded as cyber threats. The measures for the prevention of the
cyber threats can be mentioned as the cyber security. There are different kinds of threats like
internal threats or external threats. In that case, the external threats can be the attacks by the
malicious codes or the ransom ware. On the other hand the internal threats can be access of the
important system through the illegal use of the username and password for the modification of
the important data in the system. The main objective of the cyber security is to prevent those
threats so that the system along with its functionality can run in a proper way.
Cyber Security and ABC Technology
ABC Technology is currently working on the products those are based on the emerging
technology. Apart from that the organization is also into the manufacturing of the hardware those
can support the use of the emerging technology. The organization can be defined as the medium
organization as, there are 10,000 employees work in the organization. In this situation it is the
responsibility of the organization to maintain the data and information related to the client and
the organization in a proper way so that the functionality and the confidentiality are not
hampered. Apart from that as the organization is working through online and is investing money
for the development of the merging technology, there is a chance that the research data can be
stolen form the online system, Considering all these factors it is important for the organization to
develop a cyber-security system that will help the organization to maintain the proper security.
CYBER SECURITY IN ORGANIZATION
been seen, in most of the cases, the transfer of the information between two devices are done
through the internet connection. Apart from that the use of the emerging technologies needs the
internet connectivity for the proper operation. In this situation , there is a possibility that the
potential external threats can make the system damage or violate the proper transformation of the
data. All these activities can be regarded as cyber threats. The measures for the prevention of the
cyber threats can be mentioned as the cyber security. There are different kinds of threats like
internal threats or external threats. In that case, the external threats can be the attacks by the
malicious codes or the ransom ware. On the other hand the internal threats can be access of the
important system through the illegal use of the username and password for the modification of
the important data in the system. The main objective of the cyber security is to prevent those
threats so that the system along with its functionality can run in a proper way.
Cyber Security and ABC Technology
ABC Technology is currently working on the products those are based on the emerging
technology. Apart from that the organization is also into the manufacturing of the hardware those
can support the use of the emerging technology. The organization can be defined as the medium
organization as, there are 10,000 employees work in the organization. In this situation it is the
responsibility of the organization to maintain the data and information related to the client and
the organization in a proper way so that the functionality and the confidentiality are not
hampered. Apart from that as the organization is working through online and is investing money
for the development of the merging technology, there is a chance that the research data can be
stolen form the online system, Considering all these factors it is important for the organization to
develop a cyber-security system that will help the organization to maintain the proper security.

5
CYBER SECURITY IN ORGANIZATION
Loss of Data
There are certain drawbacks those can be turned into security vulnerability for the ABC
Technology. It has been seen that the organization is operating the policy regarding the “bring
your own device”. In this policy the employees can bring their own system at work place and can
use those system for the further improvisation of the process. This can become a security threat
for the ABCT. The organization is not aware about the configuration of all the devices carried by
the employees. It can be possible that there is a security vulnerability in one of the systems of the
employees (Staheli et al., 2016). The breaching of the data can be done through that system
which is not desirable for the organization. Apart from that some of the employees in the
organization can illegally pass the confidential data to the other organization through their
system. There would be a lack of monitoring from the organization’s end on the activities of the
employees as well as their systems.
Security vulnerability in cloud
The second identified vulnerability is the use of the cloud storage architecture. There is
no specification of the cloud deployment model the organization is using. In that case, it can be
assumed that the ABCT is using the public cloud. Storing data in public cloud may be a cost
effective solution for the company but there can be lack of security in storing the data in public
cloud. The maintenance of the security in the public cloud is carried out by the cloud providing
company (Busby, Green&Hutchison, 2017). In that case, if the organization does not have the
proper maintenance or security policy there is a chance for the breaching of the data (Kramer,
Walsh&Theunissen, 2017). As the organization is operating on the high end technologies, the
breaching of the data is not a desired thing. In this case, the organization should be careful about
CYBER SECURITY IN ORGANIZATION
Loss of Data
There are certain drawbacks those can be turned into security vulnerability for the ABC
Technology. It has been seen that the organization is operating the policy regarding the “bring
your own device”. In this policy the employees can bring their own system at work place and can
use those system for the further improvisation of the process. This can become a security threat
for the ABCT. The organization is not aware about the configuration of all the devices carried by
the employees. It can be possible that there is a security vulnerability in one of the systems of the
employees (Staheli et al., 2016). The breaching of the data can be done through that system
which is not desirable for the organization. Apart from that some of the employees in the
organization can illegally pass the confidential data to the other organization through their
system. There would be a lack of monitoring from the organization’s end on the activities of the
employees as well as their systems.
Security vulnerability in cloud
The second identified vulnerability is the use of the cloud storage architecture. There is
no specification of the cloud deployment model the organization is using. In that case, it can be
assumed that the ABCT is using the public cloud. Storing data in public cloud may be a cost
effective solution for the company but there can be lack of security in storing the data in public
cloud. The maintenance of the security in the public cloud is carried out by the cloud providing
company (Busby, Green&Hutchison, 2017). In that case, if the organization does not have the
proper maintenance or security policy there is a chance for the breaching of the data (Kramer,
Walsh&Theunissen, 2017). As the organization is operating on the high end technologies, the
breaching of the data is not a desired thing. In this case, the organization should be careful about

6
CYBER SECURITY IN ORGANIZATION
the selection of the cloud deployment architecture. Apart from that the ABCT needs to negotiate
about the security policies with the cloud service provider.
Vulnerability regarding the implementation of ICT
The third identified problem ABCT facing is regarding the rules and the regulation. The
organizations those are dealing with the technology and technology driven services need to have
the proper ICT rules and regulations. There are certain ethical standards mentioned by different
approved organizations those are needed to be maintained by all the organizations (Min, Chai&
Han,2015). Apart from that the organizations have their own set of rules and regulations
regarding the use of ICT in the organization. In this case, it has been seen that there is no
mention of specific rules and regulations regarding the use of technology in ABCT. This will
lead to the misunderstanding and the wrong implementation of the ICT (Ganesan, Jajodia&
Cam,2017). Apart from that the products and the services may not be of standard quality in this
case. Sue of the lack of rules and regulations the improvisation of the cyber security can become
tough. The external threats in this case can exploit the absence of particular rules and regulations
of the organization. Apart from that managing all 10,000 employees in the organization can be
tough for the ABCT without proper rules and regulations.
Possible security threats in the organization
Attack from the malware: There is a potential chances for the systems in ABCT system
to get attacked by the malware. Generally, the intruders can get the information about the system
through the malware attack. The malware can enter into the system through different ways.
However, in most of the cases, it has been seen that the intruders are sending the malicious links
to the users. In case, if the users are clicking on those links the malware gets activated in the
system. Malware can be defined as the piece of code that will help the intruders to get the
CYBER SECURITY IN ORGANIZATION
the selection of the cloud deployment architecture. Apart from that the ABCT needs to negotiate
about the security policies with the cloud service provider.
Vulnerability regarding the implementation of ICT
The third identified problem ABCT facing is regarding the rules and the regulation. The
organizations those are dealing with the technology and technology driven services need to have
the proper ICT rules and regulations. There are certain ethical standards mentioned by different
approved organizations those are needed to be maintained by all the organizations (Min, Chai&
Han,2015). Apart from that the organizations have their own set of rules and regulations
regarding the use of ICT in the organization. In this case, it has been seen that there is no
mention of specific rules and regulations regarding the use of technology in ABCT. This will
lead to the misunderstanding and the wrong implementation of the ICT (Ganesan, Jajodia&
Cam,2017). Apart from that the products and the services may not be of standard quality in this
case. Sue of the lack of rules and regulations the improvisation of the cyber security can become
tough. The external threats in this case can exploit the absence of particular rules and regulations
of the organization. Apart from that managing all 10,000 employees in the organization can be
tough for the ABCT without proper rules and regulations.
Possible security threats in the organization
Attack from the malware: There is a potential chances for the systems in ABCT system
to get attacked by the malware. Generally, the intruders can get the information about the system
through the malware attack. The malware can enter into the system through different ways.
However, in most of the cases, it has been seen that the intruders are sending the malicious links
to the users. In case, if the users are clicking on those links the malware gets activated in the
system. Malware can be defined as the piece of code that will help the intruders to get the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
CYBER SECURITY IN ORGANIZATION
information entered by the users in the system. Apart from that the confidential information can
also be collected through installing the malicious codes in the system.
In order to mitigate the chances of the system affecting by the malware attacks, the
organizations can increase the awareness program regarding cyber security among the employees
(Safa, VonSolms&Furnell, 2016). Apart from that the installation of the anti-virus software is
needed to be done in this case. From this context, it can also be said that the use of the original
and the updated software is required for the further implementation of the security in the system.
Attack from the ransomware: The attacks from the ransomware is another possible threats
that can be occurred in the system. The functionality of the ransomware is to captivate the
functions of the system. In this case, the users can not open or access the particular file or the
system (Anwar et al., 2017). In most of the cases, it has been seen that the ransomware attacks
are initiated by the intruders for the personal gain (Leuprecht, Skillicorn&Tait, 2016). After the
encryption of the data and information if the user’s computer or the system, the intruders demand
the money and in exchange they will free the data through the decryption technique. Regarding
the ransomware attack, the mention of the WannaCry can be taken.
In order to prevent the ransomware attack, the network of the system is needed to be
secured. Proper protocol is needed to be maintained during the implementation of the overall
system. Apart from that the use of the VPN and firewall are needed to be used in the system
(Mármol, Pérez& Pérez, 2016). The use of the VPN and Firewall will help the system to get rid
from the unnecessary traffics. Apart from that the users are needed to be aware about the
consequences of these attacks so that they can maintain the security while using the network in
the system.
CYBER SECURITY IN ORGANIZATION
information entered by the users in the system. Apart from that the confidential information can
also be collected through installing the malicious codes in the system.
In order to mitigate the chances of the system affecting by the malware attacks, the
organizations can increase the awareness program regarding cyber security among the employees
(Safa, VonSolms&Furnell, 2016). Apart from that the installation of the anti-virus software is
needed to be done in this case. From this context, it can also be said that the use of the original
and the updated software is required for the further implementation of the security in the system.
Attack from the ransomware: The attacks from the ransomware is another possible threats
that can be occurred in the system. The functionality of the ransomware is to captivate the
functions of the system. In this case, the users can not open or access the particular file or the
system (Anwar et al., 2017). In most of the cases, it has been seen that the ransomware attacks
are initiated by the intruders for the personal gain (Leuprecht, Skillicorn&Tait, 2016). After the
encryption of the data and information if the user’s computer or the system, the intruders demand
the money and in exchange they will free the data through the decryption technique. Regarding
the ransomware attack, the mention of the WannaCry can be taken.
In order to prevent the ransomware attack, the network of the system is needed to be
secured. Proper protocol is needed to be maintained during the implementation of the overall
system. Apart from that the use of the VPN and firewall are needed to be used in the system
(Mármol, Pérez& Pérez, 2016). The use of the VPN and Firewall will help the system to get rid
from the unnecessary traffics. Apart from that the users are needed to be aware about the
consequences of these attacks so that they can maintain the security while using the network in
the system.

8
CYBER SECURITY IN ORGANIZATION
Denial of Service attack: The denial of service attack is a form of cyber-attack that will
take the control of the system from the users. In this case, the users cannot manage or handle the
system. This attack is initiated by sending the large amount of the requests in the network of the
system (Almeshekah&Spafford, 2016). The overloading of the request will make the
functionality of the system for the processing violated (Almuhammadi& Alsaleh,2017).
Exploiting this vulnerability the intruder can take the charge of the system. There are different
types of denial of service attack such as distributed denial of service attack. Moreover, it has
been seen that using this denial of service attacks the other attacks are also exploiting the system.
The name of one such attack is the memcache attack.
In order to prevent the denial of service attacks the network of the organization is needed
to be secured. Apart from that with the improvement of the network security in the organization,
there is a need for the upgradation of the system (He&Johnson, 2017). The upgradation of the
software provides the updated software patch of the security. In this case, the system can be
secured from the advanced threats.
Password spoofing: Spoofing of the password is another type of cyber security threat for
the organization. The password spoofing can be regarded as both internal and external threat. It
has been seen that through the password spoofing the username and the password of the system
can be known to the intruders (Park, Suh & Park, 2016). There are different password spoofing
techniques those can be used by the intruders. In order to prevent this the organizations has to
maintain some of the rules and regulations so that the security regarding the cyber space can be
maintained in a proper way.
Breaching of the data: Breaching of the data can be regarded as one of the security threats
for both the organizations and the users. It has been seen that through the use of the different
CYBER SECURITY IN ORGANIZATION
Denial of Service attack: The denial of service attack is a form of cyber-attack that will
take the control of the system from the users. In this case, the users cannot manage or handle the
system. This attack is initiated by sending the large amount of the requests in the network of the
system (Almeshekah&Spafford, 2016). The overloading of the request will make the
functionality of the system for the processing violated (Almuhammadi& Alsaleh,2017).
Exploiting this vulnerability the intruder can take the charge of the system. There are different
types of denial of service attack such as distributed denial of service attack. Moreover, it has
been seen that using this denial of service attacks the other attacks are also exploiting the system.
The name of one such attack is the memcache attack.
In order to prevent the denial of service attacks the network of the organization is needed
to be secured. Apart from that with the improvement of the network security in the organization,
there is a need for the upgradation of the system (He&Johnson, 2017). The upgradation of the
software provides the updated software patch of the security. In this case, the system can be
secured from the advanced threats.
Password spoofing: Spoofing of the password is another type of cyber security threat for
the organization. The password spoofing can be regarded as both internal and external threat. It
has been seen that through the password spoofing the username and the password of the system
can be known to the intruders (Park, Suh & Park, 2016). There are different password spoofing
techniques those can be used by the intruders. In order to prevent this the organizations has to
maintain some of the rules and regulations so that the security regarding the cyber space can be
maintained in a proper way.
Breaching of the data: Breaching of the data can be regarded as one of the security threats
for both the organizations and the users. It has been seen that through the use of the different

9
CYBER SECURITY IN ORGANIZATION
advanced technology the intruder can get the access of the system. After getting access of the
system the breaching of the data is possible for the intruders (Murdoch & Leaver, 2015). The
data stored in the system of the organization can be confidential in nature. Apart from that those
data can be used by the intruders in an illegal way. This can be a threat for both the organization
and the consumers of the organization.
In order to prevent the breaching of the data, certain security measures are needed to be
implemented in a proper way. Apart from that the users and the employees in the organizations
are needed to make aware about the consequences of the data breaching (Brown, Gommers&
Serrano, 2015). Along with the organization, it is also the responsibility of the users to follow the
security rules while using the cyber space in order to prevent the breaching of the data.
Recommendations
There are certain recommendations those can be made on the basis of the discussion in
the paper. It has been seen that the threats can be of different types. Apart from that the cyber
threats are applicable for both the systems at the office space and the systems owned by the
individuals. In this context, the threats for the organization can be both internal and external
(Trim & Upton, 2016). In this context, making the users aware about the use of the cyber space
in a proper way is needed. Apart from that the anti-virus software are needed to be installed in
the systems so that it can inform the system about the presence of the malicious codes or the
links (Limba et al., 2019). The users should not open the suspicious links as those can be a
source of the external threats (Safa et al., 2015). In order to secure the network, the use of VPN
along with the firewall can be done. The use of the firewall will prevent the intrusion of the
unnecessary network traffic in the system. Apart from that the use of VPN will allow the
organization to transfer data through a private network. The use of the original software is
CYBER SECURITY IN ORGANIZATION
advanced technology the intruder can get the access of the system. After getting access of the
system the breaching of the data is possible for the intruders (Murdoch & Leaver, 2015). The
data stored in the system of the organization can be confidential in nature. Apart from that those
data can be used by the intruders in an illegal way. This can be a threat for both the organization
and the consumers of the organization.
In order to prevent the breaching of the data, certain security measures are needed to be
implemented in a proper way. Apart from that the users and the employees in the organizations
are needed to make aware about the consequences of the data breaching (Brown, Gommers&
Serrano, 2015). Along with the organization, it is also the responsibility of the users to follow the
security rules while using the cyber space in order to prevent the breaching of the data.
Recommendations
There are certain recommendations those can be made on the basis of the discussion in
the paper. It has been seen that the threats can be of different types. Apart from that the cyber
threats are applicable for both the systems at the office space and the systems owned by the
individuals. In this context, the threats for the organization can be both internal and external
(Trim & Upton, 2016). In this context, making the users aware about the use of the cyber space
in a proper way is needed. Apart from that the anti-virus software are needed to be installed in
the systems so that it can inform the system about the presence of the malicious codes or the
links (Limba et al., 2019). The users should not open the suspicious links as those can be a
source of the external threats (Safa et al., 2015). In order to secure the network, the use of VPN
along with the firewall can be done. The use of the firewall will prevent the intrusion of the
unnecessary network traffic in the system. Apart from that the use of VPN will allow the
organization to transfer data through a private network. The use of the original software is
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
CYBER SECURITY IN ORGANIZATION
needed for the systems so that the systems can get update in proper time. The update of the
system or the software contains the security patches. In that case, the upgraded security patches
will help to prevent the advanced security threats for the organization.
Conclusion
The discussion is regarding the use of the security measures in the organization. It has
been seen that ABCT organization is a medium organization which is dealing with the smart and
the emerging technologies. There are certain security vulnerabilities those are needed to be
identified in the process. In this context, the mention of the three security vulnerabilities are
mentioned in the discussion. Apart from that the discussion regarding the possible threats in the
system are also mentioned in the discussion. The mitigation plan is mentioned through the
recommendations. In this case, it can be said there are certain security measures those are needed
to be taken so that the functioning of the organization can be safe and secured.
CYBER SECURITY IN ORGANIZATION
needed for the systems so that the systems can get update in proper time. The update of the
system or the software contains the security patches. In that case, the upgraded security patches
will help to prevent the advanced security threats for the organization.
Conclusion
The discussion is regarding the use of the security measures in the organization. It has
been seen that ABCT organization is a medium organization which is dealing with the smart and
the emerging technologies. There are certain security vulnerabilities those are needed to be
identified in the process. In this context, the mention of the three security vulnerabilities are
mentioned in the discussion. Apart from that the discussion regarding the possible threats in the
system are also mentioned in the discussion. The mitigation plan is mentioned through the
recommendations. In this case, it can be said there are certain security measures those are needed
to be taken so that the functioning of the organization can be safe and secured.

11
CYBER SECURITY IN ORGANIZATION
References
Almeshekah, M. H., &Spafford, E. H. (2016). Cyber security deception. In Cyber deception (pp.
23-50). Springer, Cham.
Almuhammadi, S., &Alsaleh, M. (2017). Information Security Maturity Model for Nist Cyber
Security Framework. Computer Science & Information Technology, 51.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees'
cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.
Brown, S., Gommers, J., & Serrano, O. (2015, October). From cyber security information
sharing to threat management. In Proceedings of the 2nd ACM workshop on information
sharing and collaborative security (pp. 43-49). ACM.
Busby, J. S., Green, B., & Hutchison, D. (2017). Analysis of affordance, time, and adaptation in
the assessment of industrial control system cybersecurity risk. Risk Analysis, 37(7), 1298-
1314.
Ganesan, R., Jajodia, S., & Cam, H. (2017). Optimal scheduling of cybersecurity analysts for
minimizing risk. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4),
52.
He, Y., & Johnson, C. (2017). Challenges of information security incident learning: An industrial
case study in a Chinese healthcare organization. Informatics for Health and Social
Care, 42(4), 393-408.
CYBER SECURITY IN ORGANIZATION
References
Almeshekah, M. H., &Spafford, E. H. (2016). Cyber security deception. In Cyber deception (pp.
23-50). Springer, Cham.
Almuhammadi, S., &Alsaleh, M. (2017). Information Security Maturity Model for Nist Cyber
Security Framework. Computer Science & Information Technology, 51.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees'
cybersecurity behaviors. Computers in Human Behavior, 69, 437-443.
Brown, S., Gommers, J., & Serrano, O. (2015, October). From cyber security information
sharing to threat management. In Proceedings of the 2nd ACM workshop on information
sharing and collaborative security (pp. 43-49). ACM.
Busby, J. S., Green, B., & Hutchison, D. (2017). Analysis of affordance, time, and adaptation in
the assessment of industrial control system cybersecurity risk. Risk Analysis, 37(7), 1298-
1314.
Ganesan, R., Jajodia, S., & Cam, H. (2017). Optimal scheduling of cybersecurity analysts for
minimizing risk. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4),
52.
He, Y., & Johnson, C. (2017). Challenges of information security incident learning: An industrial
case study in a Chinese healthcare organization. Informatics for Health and Social
Care, 42(4), 393-408.

12
CYBER SECURITY IN ORGANIZATION
Kramer, K., Walsh, W. P., &Theunissen, E. (2017). From the Editors of the Special Issue on
Cyber Security in Aerospace. IEEE Aerospace and Electronic Systems Magazine, 32(11),
3-3.
Kuypers, M. A., Maillart, T., & Pate-Cornell, E. (2016). An empirical analysis of cyber security
incidents at a large organization. Department of Management Science and Engineering,
Stanford University, School of Information, UC Berkeley, http://fsi. stanford.
edu/sites/default/files/kuypersweis_v7. pdf, accessed July, 30.
Leuprecht, C., Skillicorn, D. B., & Tait, V. E. (2016). Beyond the Castle Model of cyber-risk and
cyber-security. Government Information Quarterly, 33(2), 250-257.
Limba, T., Plėta, T., Agafonov, K., &Damkus, M. (2019). Cyber security management model for
critical infrastructure.
Mármol, F. G., Pérez, M. G., & Pérez, G. M. (2016, July). I don’t trust ICT: Research challenges
in cyber security. In IFIP International Conference on Trust Management (pp. 129-136).
Springer, Cham.
Min, K. S., Chai, S. W., & Han, M. (2015). An international comparative study on cyber security
strategy. International Journal of Security and Its Applications, 9(2), 13-20.
Murdoch, S., & Leaver, N. (2015, October). Anonymity vs. trust in cyber-security collaboration.
In Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative
Security (pp. 27-29). ACM.
Park, J., Suh, Y., & Park, C. (2016). Implementation of cyber security for safety systems of
nuclear facilities. Progress in Nuclear Energy, 88, 88-94.
CYBER SECURITY IN ORGANIZATION
Kramer, K., Walsh, W. P., &Theunissen, E. (2017). From the Editors of the Special Issue on
Cyber Security in Aerospace. IEEE Aerospace and Electronic Systems Magazine, 32(11),
3-3.
Kuypers, M. A., Maillart, T., & Pate-Cornell, E. (2016). An empirical analysis of cyber security
incidents at a large organization. Department of Management Science and Engineering,
Stanford University, School of Information, UC Berkeley, http://fsi. stanford.
edu/sites/default/files/kuypersweis_v7. pdf, accessed July, 30.
Leuprecht, C., Skillicorn, D. B., & Tait, V. E. (2016). Beyond the Castle Model of cyber-risk and
cyber-security. Government Information Quarterly, 33(2), 250-257.
Limba, T., Plėta, T., Agafonov, K., &Damkus, M. (2019). Cyber security management model for
critical infrastructure.
Mármol, F. G., Pérez, M. G., & Pérez, G. M. (2016, July). I don’t trust ICT: Research challenges
in cyber security. In IFIP International Conference on Trust Management (pp. 129-136).
Springer, Cham.
Min, K. S., Chai, S. W., & Han, M. (2015). An international comparative study on cyber security
strategy. International Journal of Security and Its Applications, 9(2), 13-20.
Murdoch, S., & Leaver, N. (2015, October). Anonymity vs. trust in cyber-security collaboration.
In Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative
Security (pp. 27-29). ACM.
Park, J., Suh, Y., & Park, C. (2016). Implementation of cyber security for safety systems of
nuclear facilities. Progress in Nuclear Energy, 88, 88-94.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13
CYBER SECURITY IN ORGANIZATION
Perakslis, E. D., & Stanley, M. (2016). A cybersecurity primer for translational research. Science
translational medicine, 8(322), 322ps2-322ps2.
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., &Herawan, T. (2015).
Information security conscious care behaviour formation in organizations. Computers &
Security, 53, 65-78.
Safa, N. S., Von Solms, R., &Furnell, S. (2016). Information security policy compliance model
in organizations. Computers & Security, 56, 70-82.
Staheli, D., Mancuso, V., Harnasch, R., Fulcher, C., Chmielinski, M., Kearns, A., ...&Vuksani,
E. (2016). Collaborative data analysis and discovery for cyber security. In Twelfth
Symposium on Usable Privacy and Security ({SOUPS} 2016).
Trim, P., & Upton, D. (2016). Cyber security culture: Counteracting cyber threats through
organizational learning and training. Routledge.
CYBER SECURITY IN ORGANIZATION
Perakslis, E. D., & Stanley, M. (2016). A cybersecurity primer for translational research. Science
translational medicine, 8(322), 322ps2-322ps2.
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., &Herawan, T. (2015).
Information security conscious care behaviour formation in organizations. Computers &
Security, 53, 65-78.
Safa, N. S., Von Solms, R., &Furnell, S. (2016). Information security policy compliance model
in organizations. Computers & Security, 56, 70-82.
Staheli, D., Mancuso, V., Harnasch, R., Fulcher, C., Chmielinski, M., Kearns, A., ...&Vuksani,
E. (2016). Collaborative data analysis and discovery for cyber security. In Twelfth
Symposium on Usable Privacy and Security ({SOUPS} 2016).
Trim, P., & Upton, D. (2016). Cyber security culture: Counteracting cyber threats through
organizational learning and training. Routledge.
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.