12 research outputs found

    Using Fuzzy Cognitive Maps (FCMs) to Evaluate the Vulnerabilities with ICT Assets Disposal Policies

    Get PDF
    Abstract-- This paper evaluates the possible vulnerabilities of ICT assets disposal policies and the associated impact that can affect the SMEs. A poorly implemented policy or unenforced policy is “potentially the weakest link ” in the cyber-security chain. Do SMEs have an idea of vulnerabilities or threats due to assets disposal? In the event of breaches, the SMEs pay for the cost of notifying the concerned stakeholders, compensate affected parties, invest in improved mitigation technologies and also may be subjected to unwarranted public scrutiny. ICT assets at the end-of-useful life span usually have data left on the hard disk drives or storage media, which is a source of data confidentiality vulnerability. SMEs were surveyed in developing economies on their assets disposal policies. The perceived correlations were analyzed using fuzzy cognitive maps (FCMs) to ascertain if any cyber-security vulnerabilities inherent in a particular policy have implications on others. The study endeavored to show that, SMEs ought to have appropriate assets disposal policies in place. Then, these policies ought to be signed off by all stakeholders as a matter of responsibility. By employing the FCM approach with fuzzy matrix operations, the results indicate positive correlations exist amongst the policy constructs. Thus, vulnerabilities with one policy have implications on others

    Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availability (CIA)

    Get PDF

    Cloud Computing: The Emergence of Application Service Providers (ASPs) in Developing Economies

    Get PDF
    Abstract — The Cloud Computing paradigm has triggered a major shake-up in the way ICT infrastructure is delivered, priced and consumed. The underlying factors for this phenomenon are highly abstracted or virtualized infrastructure, a variable OPEX-based model (determined by usage requirements), support for multi-tenant user model and immediate computing resource scalability. This paper provides an insight into the Cloud computing eco-system in a developing economy, with Ghana as case example. It reveals that there is positive experience with this computing model from the consumer standpoint. It also reveals that virtualization, which has been identified to be the stepping stone to full Cloud services, is in demand. Hybrid deployment models also represent an opportunity area due to the paucity of deployed instances
    corecore