Logo Goletty

Managing Information Technology Security in the Context of Cyber Crime Trends
Journal Title International Journal of Computers Communications & Control
Journal Abbreviation ijccc
Publisher Group Agora University Publishing House: Journals (Agora University)
Website http://univagora.ro/jour/index.php/ijccc
PDF (231 kb)
   
Title Managing Information Technology Security in the Context of Cyber Crime Trends
Authors Neghina, Diana-Elena; Scarlat, Emil
Abstract Cyber-attacks can significantly hurt an organization’s IT environment, leading to serious operational disruptions, from simply damaging the first layers of IT security up to identity theft, data leakage and breaking down networks. Moreover, the dangers through which current cybercrimes practices affect organizations present a tendency of developing more rapidly that decision makers can assess them and find countermeasures. Because cyber threats are somewhat new thus a critical source of risks, within the context of the constantly changing IT environments (e.g. cloud services integration) organizations may not effectively implement and manage cyber threat risk assessment processes. This paper highlights the importance of designing effective security strategies and proactively addressing cybercrime issues as key elements within the organizational risk management approaches.Malware rises constantly in impact and complexity and has surpassed the traditional security model. One of the main ideas of the study is to present the main areas of risks related to cyber security to which an organization is subject to and provide a baseline of an analysis model that would adequately evaluate input data, rank priorities and represent the results and solutions to decrease these risks. The importance of this study is to increase awareness efforts and to highlight the critical importance of using the full extent of resources provided. Each member of an organization has a significant role in decreasing the exposure to the vulnerabilities created by cyber-attacks.
Publisher Agora University of Oradea
Date 2012-11-13
Source International Journal of Computers Communications & Control Vol 8, No 1 (2013): INT J COMPUT COMMUN
Rights Copyright Transfer FormThe undersigned Author(s) of the above mentioned Paper here by transfer any and all copyright-rights in and to The Paper to The Publisher.The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author´s responsibility to obtain written permission to quote material that has been previously published in any form.The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author´s personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is withdrawn by the author(s) before acceptance by the Publisher.

 

See other article in the same Issue


Goletty © 2024