11,379 research outputs found

    Implementation of Business Continuity Planning Methodology in Making Business Continuity Planning Documents at PT. XYZ

    Get PDF
    PT. XYZ is a company engaged in the communication sector. As a company with a national scale, PT. XYZ has various risks that must be faced, ranging from natural disasters, human disturbances, and disruption due to technology. The existence of disruption risks can disrupt the company's operational activities. A business continuity plan document is created to find out what steps the company must take to minimize damage due to disruption. Making a business continuity plan or BCP starts from the project initiation stage, risk assessment, business impact analysis, mitigation strategy development, plan development, training, testing, auditing. The results obtained from this research are in the form of BCP documents used by PT. XYZ in response to a disturbance. With the BCP, PT. XYZ can respond to a disruption that occurs and quickly restore business operations

    A Novel Cyber Resilience Framework – Strategies and Best Practices for Today's Organizations

    Get PDF
    Cyber resilience refers to an organization's ability to maintain its essential functions, services despite cyber-attacks and swiftly recover from any disruptions. It involves proactive measures like gathering threat intelligence and managing risks, as well as reactive measures such as incident response planning, data backup and recovery. To achieve cyber resilience, organizations must implement robust cyber security measures, regularly update their incident response plans, and educate employees on safe online practices. Furthermore, having a comprehensive backup and recovery strategy in place is crucial to swiftly restore critical systems and data in the event of an attack. Overall, the proposed framework emphasizes cyber resilience as a continuous and proactive approach for managing cyber security risks and safeguarding against the growing threat of cyber-attacks

    Toward Remaking Software Development to Secure It

    Get PDF
    Modern software development depends on tools and techniques to represent implied information processing logic to the human engineer, relying chiefly on effortful human reasoning to best determine critical properties of the software system. Current conceptualization, visualization and contextualization of software in development amounts to a significant under-utilization of already limited development resources directed to optimization, prevention, and addressing fundamental security properties of the software system. As a step toward increasing such utilization as a basis for a global ecosystem of secure software, this work explores and evaluates an alternative representation of software source code for the sake of secure development, manifesting universal, critical properties of the system to enhance control of security factors while the bulk of the properties of the system are being determined and the costly skills of the developer are directed to the many aspects of the task

    Cybersecurity Hygiene in the Era of Internet of Things (IoT): Best Practices and Challenges

    Get PDF
    The rapid growth of the Internet of Things (IoT) has resulted in an increasing number of interconnected devices, creating new opportunities for data collection and automation. However, this expansion also brings with it unique cybersecurity challenges. This research paper aims to investigate the best practices for maintaining cybersecurity hygiene in the IoT environment and explore the challenges that need to be addressed to ensure robust security for these connected devices. This study will delve into the vulnerabilities associated with IoT devices, their impact on overall system security, and the potential solutions that can be implemented to enhance cybersecurity hygiene in the IoT environment

    Strategies for Mitigating Cyberattacks Against Small Retail Businesses

    Get PDF
    Abstract Small retail businesses are increasingly becoming targets for social media cyberattacks, often losing profitability when forced to close operations after a cyberattack. Small retail business leaders are concerned with the negative impact of cyberattacks on firms’ viability and competitiveness. Grounded in general systems theory, the purpose of this qualitative multiple-case study was to explore strategies retail leaders use to deter social media cyberattacks. The participants were 11 small retail business leaders. Data were collected using semistructured interviews and analyzed using thematic analysis. Three themes emerged: using multiple strategies to deter social media cyberattacks, importance of training regarding cybersecurity best practices, and the need for a contingency plan. A key recommendation is for small retail business leaders to provide employees and customers with training regarding proper cybersecurity protocols. The implications for positive social change include the potential to improve cybersecurity measures and enhance a small business’ viability and employment opportunities, positively impacting local communities and tax revenues

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies
    • …
    corecore