Abstract

Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but also by national security. To safeguard an organization’s cyberenvironments, information, and communication technologies, many enterprises are investing substantially in cybersecurity these days. One part of the cyberdefense mechanism is building an enterprises’ security policies library, for consistent implementation of security controls. Significant and common cybersecurity policies of various enterprises are compared and explored in this study to provide robust and comprehensive cybersecurity knowledge that can be used in various enterprises. Several significant common security policies were identified and discussed in this comprehensive study. This study identified 10 common cybersecurity policy aspects in five enterprises: healthcare, finance, education, aviation, and e-commerce. We aimed to build a strong infrastructure in each business, and investigate the security laws and policies that apply to all businesses in each sector. Furthermore, the findings of this study reveal that the importance of cybersecurity requirements differ across multiple organizations. The choice and applicability of cybersecurity policies are determined by the type of information under control and the security requirements of organizations in relation to these policies.

Highlights

  • Received: 15 November 2021Cyberspace is a digital and virtual environment in which individuals may connect at any time and from any location by utilizing the Internet, computer networks, or other comparable tools

  • We identified a lot of studies in the fields of CS and Information and Communication Technology (ICT) security policies when we reviewed the literature due to the topic’s importance in everyday life

  • The worm travels from computer to computer, but unlike viruses, it may travel without the need for human intervention; Trojan Horse: A Trojan is a software that looks to perform a helpful purpose but performs a secret function that poses a security risk; Spyware: Spyware is a type of harmful software that infiltrates computer systems to collect personal information from users. It usually comes through compromised computers or websites; Impersonation: In an impersonation attack, the attacker poses as a real user or server and provides false or harmful services to genuine users; Man-in-the-Middle: The attacker in a Man-in-the-Middle attack surreptitiously transmits and maybe changes messages between communicators without disclosing them to legitimate users; Denial of Service Attack (DoS): A DoS, known as a distributed DoS (DDoS) attack, is a type of website assault in which an attacker floods victim’s computer with a huge amount of data packets

Read more

Summary

Introduction

Received: 15 November 2021Cyberspace is a digital and virtual environment in which individuals may connect at any time and from any location by utilizing the Internet, computer networks, or other comparable tools. Due to financial and criminal objectives, many economic businesses and cultural/educational institutions are vulnerable to a variety of threats (e.g., viruses, worms, Trojan horses, and spyware), resulting in a tarnished company reputation, large financial losses, and the leakage of personal data belonging to users or consumers [3] For all of these reasons, it has become vital for each organization to have certain security policies to safeguard their operations [4]. We present the existing work and literature on the research topic and reviews the advancements and limitations of the main subjects linked to the research It develops the research context by outlining the five most typical sectors that provide Internet services. Many individuals have benefited from significant health advances as a result of technological breakthroughs in recent decades, including clinical portals and patient portals [14] Patients may view their personal health information at any time and from any location. E-healthcare has become the best option for reaching far-flung areas

Objectives
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.